• Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Intelligence

Use Case

Government use case: Maintain the integrity of election systems

Nov 01, 2019
asset thumbnail

In the United States, state and local governments are responsible for maintaining democratic processes by ensuring the availability and resiliency of election systems, the integrity and accuracy of balloting and vote tabulation, and the confidentiality of individual citizens’ votes. Since the Department of Homeland Security deemed election systems to be critical infrastructure, State and Local election boards must take additional steps to ensure the integrity of the vote at every level. Aging infrastructure and targeted attacks are key challenges 

Read this use case for a real-world example of how a U.S. state agency is taking steps to secure the vote with Palo Alto Networks. The benefits they have realized include: 

Operational Benefits 

  • Reduce risk with granular visibility into the users, applications, and traffic of election systems infrastructure
  • Enable States to offer secure networking services for elections for underfunded or understaffed local governments
  • Improve cybersecurity efficiency by automatically consuming and sharing threat insights and indicators from multiple intelligence feeds, safeguarding assets and keeping them up to date

Security Benefits 

  • Protect unpatched voting machines and systems for tabulating and reporting election results
  • Limit exposure of voter registration database with network segmentation
  • Prevent credential theft and data exfiltration
  • Enforce access controls and the principle of least privilege with user identification and multi-factor authentication (MFA)
For more information on how Palo Alto Networks serves state, city, county, and municipal governments, visit our cybersecurity for state and local governments page at  www.paloaltonetworks.com/cybersecurity-for-state-local-government
Download
Share page on facebook Share page on linkedin Share page by an email
Related Resources

Access a wealth of educational materials, such as datasheets, whitepapers, critical threat reports, customer stories, informative cybersecurity topics, and top research analyst reports

See all resources

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved