Date

Displaying 121 to 150 of 165

Tech Tips User-ID

Read our best practices for deploying user-based policies on your Palo Alto Networks Next-Generation Firewall and tips for a smooth and successful implementation.
  • 3
  • 1778

Traps for Windows Server 2003

Learn how businesses can keep Windows Server 2003 systems compliant and secure, even after EOS, by using Palo Alto Networks Traps Advanced Endpoint Protection.
  • 1
  • 2443

Best Practices

Implementing a central management system to view and preside over your many firewall deployments can give you full visibility into your entire network and help you to orchestrate detection and protection based on real-time intelligence. This chapter highlights Palo Alto Networks’ methodology for implementing Panorama and our best practices for managing multiple firewalls.
  • 1
  • 1951

Secure Windows XP with Traps

Windows® XP end-of-life is a critical threat exposure for XP users. Security was one of the major drivers for Microsoft’s decision to end support for this operating system. No doubt, the intention was to urge enterprises to upgrade their systems. In reality, however, Windows XP systems are still deployed in many organizations. This technical brief outlines how Traps secures endpoint systems that run Windows XP, while enabling you to manage your XP upgrade policy at your own pace as you maintain acceptable levels of security and compliance.
  • 1
  • 1496

First Principles For Network Defenders: A Unified Theory For Security Practitioners

First principles in a designated problem space are so fundamental as to be self-evident; so true that no expert in the field can argue against them. Experts use them like building blocks to derive everything else that is worth -knowing in the problem domain. In this paper, we propose that the first principle for all network defenders is to prevent high-risk material impact to the organization.
  • 1
  • 1248

Traps HIPAA Compliance

Healthcare organizations are increasingly under attack by cybercriminals, putting sensitive patient information, such as medications, diagnoses and Social Security numbers, at risk. The Anthem breach in early 2015 exposed the fact that, despite substantial investments made in securing their networks to be HIPAA compliant, healthcare providers are not fully protected against advanced cyberattacks.
  • 4
  • 2333

Next-Generation Firewalls For Dummies

This book provides an in-depth overview of next-generation firewalls. It examines the evolution of network security, the rise of Enterprise 2.0 applications and their associated threats, the shortcomings of traditional firewalls, and the advanced capabilities found in next-generation firewalls.
  • 0
  • 4627

Network Security in Virtualized Datacenters For Dummies

To realize the benefits of virtualization you must adapt your security architecture to address new challenges, and today's application and threat landscape. 2nd Edition.
  • 0
  • 837

Securing the Unpatchable

This document presents two case studies that discuss the security, risk and compliance ramifications of operating unpatchable systems and applications
  • 3
  • 1087

Scarlet Mimic

Unit 42, the Palo Alto Networks® threat intelligence team, recently released a report identifying and tracking “Scarlet Mimic,” a series of sophisticated cyber espionage attacks which targeted Uyghur and Tibetan activists, their supporters, and entities that collect information on such groups. The attacks, which date back to 2009, have evolved over the past six years to compromise users of Windows®, Mac® OS X® and Android™ devices, indicating that they are the work of a well-resourced, sophisticated and persistent adversary group.
  • 6
  • 728

Best Practices: Inspecting Encrypted Traffic

This document outlines Palo Alto Networks methodology for selectively decrypting traffic and our best practices for balancing risk and user privacy.
  • 2
  • 1468

Uncover SSL-Encrypted Attacks in Government Networks

A comprehensive security strategy for federal and other government agencies requires in-depth analysis of encrypted traffic to detect and prevent hidden attacks and data leakage. As more Internet traffic is encrypted, increasing numbers of attackers, including state-sponsored actors, are using this technology to hide malware, and botnet-based command and control traffic to exfiltrate data and escalate the likelihood of successful attacks. Palo Alto Networks Next-Generation Security Platform provides a combination of advanced capabilities to prevent undesired applications and malicious content, including the decryption and scrutinization of encrypted communications, along with Hardware Security Module (HSM) support for enhanced performance and security of certificate and key management.
  • 1
  • 619

Moving Beyond Proxies

This whitepaper highlights the short comings of proxies, and showcases how a next generation security platform can provide faster, simpler and more comprehensive security.
  • 7
  • 3166

Heart of the Network – Data Center Defense

Feds need to protect the data center from internal and external threats as they transition to cloud environments. How are they managing the transition?
  • 0
  • 311

Managed Network Security Services

Evolution of Next-Generation Managed Network Security Services For almost twenty years, the centerpiece of any corporate security strategy has been the firewall. As soon as there were appliances, there were services providers who offered to manage the firewall.
  • 5
  • 536

Navigating the Digital Age

Read tips about protecting our digital way of life and the future of prevention from Mark McLaughlin, CEO of Palo Alto Networks.
  • 5
  • 1380

Application Usage and Threat Report

The AUTR provides visibility into the real-world threat and application landscape, helping security teams to understand how adversaries are attempting to attack organizations around the world and build proactive, actionable controls. Built by the Unit 42 threat research team, the report correlates data from more than 7,000 enterprise organizations, providing broad visibility into critical trends.
Santa Clara
  • 30
  • 8864

Single-Pass Architecture

Outlines the benefits of intelligently integrating security functions into your firewall, why past approaches have failed, and how Palo Alto Networks succeeded with our single-pass architecture approach.
  • 6
  • 13296

Cybersecurity Buyers Guide

The Cybersecurity Buyer’s Guide outlines the 10 things you need to know to choose a cohesive cybersecurity solution.
  • 0
  • 860

Palo Alto Networks in the Data Center

This paper examines modern endpoint protection, describing how the evolution of malware has created a need for a modernized approach to endpoint protection. It also looks at the role of Palo Alto Networks Traps offering in this critical market.
  • 0
  • 1658

Conquering Network Security Challenges in Distributed Enterprises

Read this SANS survey that shows how IT organizations don’t have the level of visibility they need to both detect and respond to threats in a timely manner.
  • 0
  • 1186

Security Considerations for Private vs. Public Clouds

This whitepaper, written by the Cloud Security Alliance, provides an in-depth discussion of the security considerations for public and private clouds.
  • 5
  • 2512

Next-Generation Data Center Security Implementation Guidelines

Get this white paper for implementation guidelines and recommendations to deploy the PA-7050, the VM-Series for NSX and Panorama to protect your datacenter.
  • 5
  • 3070

GlobalProtect Deployment Guide

Read how organizations can use Palo Alto Networks GlobalProtect to provide a secure environment for the increasingly mobile workforce.
  • 7
  • 13779

Traps NERC-CIP Version 5 Compliance

Read how Palo Alto Networks Traps provides Advanced Endpoint Protection to help organizations achieve Version 5 CIP Cyber Security compliance.
  • 3
  • 876

Breaking the Cyber Attack Lifecycle

The Enterprise Security Platform from Palo Alto Networks helps companies remain agile against advanced attacks and defend enterprises against cyber criminals.
  • 0
  • 4062

Traps Advanced Endpoint Protection Technology Overview

With today's growing cyber threats, you undoubtedly have multiple layers of security in place to ensure your data is protected. The problem is that the existing endpoint technologies are just not adequate, leaving you to spend much of your time trying to keep up with patches, then detecting, remediating, and often re-imaging systems when you should be preventing these breaches. This whitepaper will introduce you to a better way, Traps, Palo Alto Networks Advanced Endpoint Protection is not only a product like no other, but an entirely new category that is going to change the way you think about endpoint protection.
  • 4
  • 18970

Zero Trust on the Endpoint

This white paper outlines how Palo Alto Networks Traps Advanced Endpoint Protection extends the Zero Trust methodology to your endpoint security.
  • 5
  • 5146

Top 10 Zero-day Exploits of 2015: How to Prevent Security Breaches That Leverage Unknown Exploits

Threat actors who pursue the most effective means to circumvent existing endpoint security measures rely on exploits, especially those that leverage unknown software vulnerabilities (commonly referred to as “zero-day exploits”). Embedded in specially crafted data files and content, such as Adobe® PDF and Microsoft® Word documents, zero-day exploits subvert legitimate applications to carry out nefarious activities. Their ability to evade traditional antivirus solutions, and a lack of vendor security patches, often leave organizations with little in terms of preventive measures against zero-day exploits, which generally serve as the initial stage of a targeted attack. This paper provides a list of the Top 10 Zero-Day Exploits of 2015, offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns, and discusses three particularly effective zero-day exploits in brief case studies. The paper then introduces the reader to a technical solution that prevents security breaches which leverage zero-day exploits, including the Top 10 Zero-Day Exploits of 2015 that are listed in this document, without prior knowledge of the application vulnerabilities which they exploit. The solution safely enables organizations to continue the use of their applications regardless of the existence of zero-day exploits, the discovery of application vulnerabilities, or the deployment of security patches.
  • 4
  • 879

Palo Alto Networks — Delivering Network Security for IPv6 Networks

In this paper we will explore the adoption of IPv6, outline security considerations and concerns, and cover the support of IPv6 on the Palo Alto Networks next-generation firewall. Regardless of where you appear on the spectrum for IPv6 adoption, making the switch to the next-generation platform provides tremendous benefit by enabling organizations to implement security services, control errant and unmonitored usage of IPv6, provide a path to consistently secure traffic, and ease migration.
  • 1
  • 3306
Displaying 121 to 150 of 165