Date

Displaying 121 to 150 of 270

How Palo Alto Networks Next-Generation Security Platform Supports Use of the NIST Cybersecurity framework

Since the release of the Cybersecurity Framework (CSF) by the U.S. National Institute of Standards and Technology (NIST), organizations worldwide have implemented the framework to better understand and manage cyber risk. The CSF can be applied to businesses of all sizes, across regions and industries, and is being incorporated into national risk frameworks around the globe. Given its proven ability to aid in risk management and reduction, some industries have even begun to mandate its implementation. Namely, the White House recently issued an executive order requiring all federal agencies to immediately begin using the CSF to assess and manage cyber risk to protect critical infrastructure in their enterprises. Designed to foster positive and productive risk and cybersecurity management dialogue among internal and external business stakeholders, the CSF provides a common language for all appropriate teams, spanning IT, operations, security, finance, C-suite and board of directors. Based on this open dialogue, organizations can more effectively quantify risk and prioritize investments to mitigate it. Palo Alto Networks® Next-Generation Security Platform aligns with the CSF’s primary directive of enabling critical infrastructure operations to effectively identify, manage and reduce cyber risk. Rooted in prevention, the Next-Generation Security Platform is natively integrated to counter cyberattacks before they manifest in an organization’s environment. With full visibility into traffic – across the network, endpoints and the cloud – organizations can prevent cyberattacks based on how or where applications and data reside or are being used. This allows critical infrastructure organizations to identify the most serious ongoing threats to key business operations and reduce overall cybersecurity risk. Download this white paper to explore the benefits of the CSF and how Palo Alto Networks Next-Generation Security Platform capabilities map to and fulfill CSF subcategories.
  • 1
  • 1084

Streamline PCI Compliance With Next-Generation Security

Establishing, maintaining, and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for everyone in payment card processing—including merchants, processors, acquirers, issuers, and service providers, as well as companies that store, process or transmit cardholder data (CHD) and/or sensitive authentication data. With approximately three hundred individual requirements to address, organizations subject to the standard have their work cut out for them. This white paper will explain how Palo Alto Networks® Next Generation Security Platform allows PCI system operators to significantly enhance security and exceed PCI DSS requirements through segmentation and mitigating risks of malware and unpatched systems.
  • 2
  • 3749

网络安全 平台必做的 5 件事

网络安全的传统方法侧重于恶意活动的检测和补救,导致操作环境变得复杂化,而在当前随着攻击数量以及复杂性的增加,凭借这种操作环境无法帮助组织实现抵御攻击的目的。为了防止攻击得逞,组织必须采用一个依靠原生设计的技术来阻止已知和未知威胁的网络安全平台。
  • 0
  • 943

Protecting the Extended Perimeter with GlobalProtect Cloud Service

Your Perimeter Is Everywhere. The world you need to secure is undergoing tremendous transformation. Global expansion, mobile workforces and cloud computing are shifting the location of your applications, data and users. These changes introduce new opportunities for business, but they also create a set of cybersecurity risks. These tectonic shifts in location strain an organization’s ability to protect data and stop threats consistently. The mandate for security has not changed, but the ability to deliver protection at each location is at a crossroads. Many organizations, faced with the rising costs of extending the perimeter using conventional methods, are left with few other choices. These consequences place organizations at risk. It is important to understand where the risks lie to evaluate what must be done to bring security back into balance.
  • 0
  • 4917

Protecting the Extended Perimeter with GlobalProtect Cloud Service

Your Perimeter Is Everywhere. The world you need to secure is undergoing tremendous transformation. Global expansion, mobile workforces and cloud computing are shifting the location of your applications, data and users. These changes introduce new opportunities for business, but they also create a set of cybersecurity risks. These tectonic shifts in location strain an organization’s ability to protect data and stop threats consistently. The mandate for security has not changed, but the ability to deliver protection at each location is at a crossroads. Many organizations, faced with the rising costs of extending the perimeter using conventional methods, are left with few other choices. These consequences place organizations at risk. It is important to understand where the risks lie to evaluate what must be done to bring security back into balance.
  • 0
  • 63

Apply Network Segmentation in the Virtualized Data Center

Read how Palo Alto Networks applies network segmentation to increase security and protect applications and data in a virtualized data center.
  • 0
  • 92

Machine Learning and Endpoint Security

The most promising weapon in the endpoint security arsenal is machine learning with its ability to quickly learn, make instant decisions, and enable rapid response to prevent threats rather than dealing with them during execution or after the fact. One of the main advantages of machine learning is that it can capture minor deviations in an executable in a way that signature based approaches cannot. As with any new approach, vendors have been quick to jump on the bandwagon and claim the benefits of machine learning for their products. With all the buzz in the market, it’s important to understand the role machine learning can and should play, and how to separate hype from reality in effectively preventing malware.
  • 1
  • 1825

Navigating the Digital Age

Navigating the Digital Age includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials.
  • 1
  • 1446

The GDPR and How the Next-Generation Security Platform Can Help

Palo Alto Networks does not claim to address all aspects of GDPR compliance, but our Next-Generation Security Platform should be viewed essential for GDPR compliance.
  • 0
  • 38

Navigating the Digital Age (Benelux Edition)

Navigating the Digital Age (Benelux Edition) includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials.
  • 1
  • 433

Three Questions to Ask Your CIO About Public Cloud Security

If your CIO has been planning ahead, you probably have a plan for secure collaboration with public cloud service providers. But if not, ask why not.
  • 0
  • 262

Navigating the Digital Age for Singapore

Navigating the Digital Age includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials for Singapore.
  • 0
  • 339

Navigating the Digital Age for the United Kingdom

Navigating the Digital Age includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials for the UK.
  • 0
  • 432

Navigating the Digital Age for Australia

Navigating the Digital Age includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials for Australia.
  • 0
  • 263

Navigating the Digital Age for France

La nouvelle législation de l'Union Européenne autour de la directive SRI et de la réforme de la protection des données progresse.
  • 0
  • 300

Comprehensive Data Security in the Cloud

This white paper outlines three steps organizations can follow to effectively secure business-critical data in the cloud.
  • 0
  • 1053

Comparing Palo Alto Networks With Proxy-Based Products

Comparison of Palo Alto Networks next-generation firewall technology with proxies.
  • 1
  • 27614

The Next Board Problem: Automatic Enterprise Security Orchestration — A Radical Change in Direction

Commercial boards and senior government officials may be the only groups capable of kick-starting this new and necessary direction in the evolution of cybersecurity...
  • 1
  • 468

The Next Board Problem: Automatic Enterprise Security Orchestration — A Radical Change in Direction

Commercial boards and senior government officials may be the only groups capable of kick-starting this new and necessary direction in the evolution of cybersecurity...
  • 0
  • 39

Cloud Adoption Risk and Compliance

Public cloud adoption poses risks. Senior leaders should understand and manage those risks in a way that is in line with the organization’s risk appetite.
  • 0
  • 444

Cloud Adoption Risk and Compliance

Public cloud adoption poses risks. Senior leaders should understand and manage those risks in a way that is in line with the organization’s risk appetite.
  • 0
  • 48

Protect IoT Opportunity with Network-Based Security

Palo Alto Networks® Next-Generation Security Platform provides advanced network-based security mechanisms that protect service provider networks, IoT systems, and interconnected networks and infrastructure. The platform identifies infected devices, prevents security attacks targeting IoT systems (controllers and devices), and establishes the basis for adding significant value to the services offered to consumers. With this capability, service providers can grow their market share in the IoT market while providing deep protection for their own infrastructure and interconnected networks.
  • 0
  • 1520

The Need for a Next-Generation Platform Approach in Mobile Networks

Read how Palo Alto Networks that helps mobile operators get ahead of cybercriminal capability and urgent mobile operator pain points.
  • 2
  • 528

Security Reference Blueprint for K-12 Education IT (2017)

The Security Reference Blueprint for K-12 Education suggests a framework to augment the security of existing infrastructure while reducing the operational demands on IT and security teams. Using this blueprint enables education security and IT professionals to keep students, staff, and their data safe while providing appropriate network security for diverse groups of users, detect and automatically block ransomware and other threats, and comply with applicable policies and regulations.
  • 1
  • 620

Palo Alto Networks & Ecessa

Ecessa and Palo Alto Networks customers can capitalize on unprecedented protection against today’s sophisticated attacks for superior network performance.
  • 0
  • 224

Security Reference Blueprint for Higher Education IT

The Security Reference Blueprint for Higher Education outlines security principles and a framework using the preventative capabilities of the Palo Alto Networks Next-Generation Security Platform. Using this blueprint enables education security and IT professionals to protect PII and IP data, maintain a high-performance, high-availability learning environment, and prepare to meet new and emerging technological challenges while reducing security threats.
  • 2
  • 731

8 Imperatives for Governments to Defeat Advanced Threats

Advanced attacks are organized campaigns that leverage multiple techniques. Don’t be the government organization flying blind to attacks against your organization.
  • 0
  • 361

Security Platform for Financial Services

Read how thousands of banks, institutional investors, asset managers, broker-dealers and financial institutions across the globe prevent successful cyberattacks.
  • 0
  • 1026

Today’s Cybersecurity Challenges in Government

Palo Alto Networks meets the cybersecurity needs of its government customers by providing a future-proof platform with visibility, prevention and resilience.
  • 0
  • 999

Government Brochure 

Governments around the world are undergoing change. Whether reducing data center footprints, virtualizing existing services to reduce costs and "go green", or advancing security strategies to thwart advanced attacks in the field or at home, governments are demanding more from their cybersecurity solutions today.
  • 8
  • 1441
Displaying 121 to 150 of 270