Date

Displaying 121 to 150 of 186

The Power of the Next-Generation Security Platform

Integrating best-of-breed network, cloud and endpoint security with industry-leading threat intelligence, Palo Alto Networks® Next-Generation Security Platform delivers the visibility, security and control customers require to enhance their security posture without compromising business efficiency. Customers can now confidently detect cyberthreats and prevent breaches at every stage of the attack lifecycle in a highly automated manner.

  • 6
  • 1241

How Malware Eats Cookies

Palo Alto Networks threat researchers are constantly analyzing different facets of advanced threats looking for new ways to both identify and prevent compromise. In this research paper, the team analyzes changes in cookies to understand how they’re effected by malware in an effort to determine whether cookie behavior can be used to determine maliciousness and infection.

  • 1
  • 991

Best Practices: Inspecting Encrypted Traffic

This document outlines Palo Alto Networks methodology for selectively decrypting traffic and our best practices for balancing risk and user privacy.

  • 2
  • 1260

Uncover SSL-Encrypted Attacks in Government Networks

A comprehensive security strategy for federal and other government agencies requires in-depth analysis of encrypted traffic to detect and prevent hidden attacks and data leakage. As more Internet traffic is encrypted, increasing numbers of attackers, including state-sponsored actors, are using this technology to hide malware, and botnet-based command and control traffic to exfiltrate data and escalate the likelihood of successful attacks. Palo Alto Networks Next-Generation Security Platform provides a combination of advanced capabilities to prevent undesired applications and malicious content, including the decryption and scrutinization of encrypted communications, along with Hardware Security Module (HSM) support for enhanced performance and security of certificate and key management.

  • 1
  • 528

Moving Beyond Proxies

This whitepaper highlights the short comings of proxies, and showcases how a next generation security platform can provide faster, simpler and more comprehensive security.

  • 6
  • 2715

Best Practices: Securing the Network by Application

Our best practices for securing the network by application helps you reduce your organization’s attack surface and provides security policy strategies.

  • 4
  • 621

Best Practices: Securing the Network by Application

Our best practices for securing the network by application helps you reduce your organization’s attack surface and provides security policy strategies.

  • 0
  • 12

Endpoint Epidemic Report

Federal agencies are facing an explosion of endpoints in both volume and variety. How are Federal IT managers handling this endpoint epidemic? What¹s the best approach to building an effective, practical, and enforceable endpoint strategy? What are the challenges and what¹s the path forward? To find out, MeriTalk and Palo Alto Networks examined endpoint security strategies and efforts across the U.S. Federal government, surveying 100 Federal IT managers and 100 non-IT Federal employees.

  • 2
  • 295

Heart of the Network – Data Center Defense

Feds need to protect the data center from internal and external threats as they transition to cloud environments. How are they managing the transition?

  • 0
  • 288

Managed Network Security Services

Evolution of Next-Generation Managed Network Security Services For almost twenty years, the centerpiece of any corporate security strategy has been the firewall. As soon as there were appliances, there were services providers who offered to manage the firewall.

  • 5
  • 396

Navigating the Digital Age

Read tips about protecting our digital way of life and the future of prevention from Mark McLaughlin, CEO of Palo Alto Networks.

  • 4
  • 1266

Application Usage and Threat Report

The AUTR provides visibility into the real-world threat and application landscape, helping security teams to understand how adversaries are attempting to attack organizations around the world and build proactive, actionable controls. Built by the Unit 42 threat research team, the report correlates data from more than 7,000 enterprise organizations, providing broad visibility into critical trends.

Santa Clara
  • 29
  • 7814

Single-Pass Architecture

Outlines the benefits of intelligently integrating security functions into your firewall, why past approaches have failed, and how Palo Alto Networks succeeded with our single-pass architecture approach.

  • 5
  • 11480

Endpoint Security Takes Center Stage

Forrester conducted a survey of 125 organizations to determine the current challenges and trends in endpoint security. The survey determined that organizations have a need for zero-day exploit and unknown malware prevention, and a desire for endpoint solutions that integrate with network and cloud components. Furthermore, organizations use products that provide varying prevention capabilities on the endpoint. This paper compares and contrasts these approaches to endpoint protection.

  • 3
  • 1483

Advanced Endpoint Protection For Dummies

Malware and exploits have evolved. This e-book outlines a new approach to protect endpoints from advanced threats.

  • 10
  • 11762

Cybersecurity Buyers Guide

The Cybersecurity Buyer’s Guide outlines the 10 things you need to know to choose a cohesive cybersecurity solution.

  • 0
  • 718

Palo Alto Networks in the Data Center

This paper examines modern endpoint protection, describing how the evolution of malware has created a need for a modernized approach to endpoint protection. It also looks at the role of Palo Alto Networks Traps offering in this critical market.

  • 0
  • 1496

Conquering Network Security Challenges in Distributed Enterprises

Read this SANS survey that shows how IT organizations don’t have the level of visibility they need to both detect and respond to threats in a timely manner.

  • 0
  • 1090

Security Considerations for Private vs. Public Clouds

This whitepaper, written by the Cloud Security Alliance, provides an in-depth discussion of the security considerations for public and private clouds.

  • 5
  • 2144

Threat Intelligence Cloud

Download this white paper to learn how the Palo Alto Networks Threat Intelligence Cloud detects unknown threats and converts them into known, stoppable threats.

  • 2
  • 5100

Reduce Costs with a Platform Approach to Security

This paper examines three different organizations, the Palo Alto Networks enterprise security platform they deployed, and the substantial savings they realized.

  • 0
  • 647

GlobalProtect Deployment Guide

Read how organizations can use Palo Alto Networks GlobalProtect to provide a secure environment for the increasingly mobile workforce.

  • 7
  • 10185

Next-Generation Data Center Security Implementation Guidelines

Get this white paper for implementation guidelines and recommendations to deploy the PA-7050, the VM-Series for NSX and Panorama to protect your datacenter.

  • 5
  • 2901

Breaking the Cyber Attack Lifecycle

The Enterprise Security Platform from Palo Alto Networks helps companies remain agile against advanced attacks and defend enterprises against cyber criminals.

  • 0
  • 3318

Traps NERC-CIP Version 5 Compliance

Read how Palo Alto Networks Traps provides Advanced Endpoint Protection to help organizations achieve Version 5 CIP Cyber Security compliance.

  • 3
  • 783

Zero Trust on the Endpoint

This white paper outlines how Palo Alto Networks Traps Advanced Endpoint Protection extends the Zero Trust methodology to your endpoint security.

  • 5
  • 4859

Traps Advanced Endpoint Protection Technology Overview

With today's growing cyber threats, you undoubtedly have multiple layers of security in place to ensure your data is protected. The problem is that the existing endpoint technologies are just not adequate, leaving you to spend much of your time trying to keep up with patches, then detecting, remediating, and often re-imaging systems when you should be preventing these breaches. This whitepaper will introduce you to a better way, Traps, Palo Alto Networks Advanced Endpoint Protection is not only a product like no other, but an entirely new category that is going to change the way you think about endpoint protection.

  • 4
  • 18964

The Advanced Attack Challenge: Creating a Government Private Threat Intelligence Cloud

One of the most prominent and advanced threats to government networks is advanced delivery and execution of zero-day malware. The adversary effectively utilizes technology and has enhanced their ability to create and deliver highly effective unknown or zero-day malware through advanced persistent threats (APTs). To improve defense and resilience, governments are creating their own private threat intelligence clouds based on Palo Alto Networks WildFire™. This architecture enables immediate analysis of the unknown threats and swiftly pushes prevention to all of the physical and virtual Palo Alto Networks platforms from data center to endpoint within the network. By employing Palo Alto Networks® Traps™ Advanced Endpoint Protection as a compensating control, businesses can keep Windows Server 2003 systems compliant and secure, even after EOS.

  • 2
  • 698

Top 10 Zero-day Exploits of 2015: How to Prevent Security Breaches That Leverage Unknown Exploits

Threat actors who pursue the most effective means to circumvent existing endpoint security measures rely on exploits, especially those that leverage unknown software vulnerabilities (commonly referred to as “zero-day exploits”). Embedded in specially crafted data files and content, such as Adobe® PDF and Microsoft® Word documents, zero-day exploits subvert legitimate applications to carry out nefarious activities. Their ability to evade traditional antivirus solutions, and a lack of vendor security patches, often leave organizations with little in terms of preventive measures against zero-day exploits, which generally serve as the initial stage of a targeted attack. This paper provides a list of the Top 10 Zero-Day Exploits of 2015, offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns, and discusses three particularly effective zero-day exploits in brief case studies. The paper then introduces the reader to a technical solution that prevents security breaches which leverage zero-day exploits, including the Top 10 Zero-Day Exploits of 2015 that are listed in this document, without prior knowledge of the application vulnerabilities which they exploit. The solution safely enables organizations to continue the use of their applications regardless of the existence of zero-day exploits, the discovery of application vulnerabilities, or the deployment of security patches.

  • 3
  • 820

Palo Alto Networks — Delivering Network Security for IPv6 Networks

In this paper we will explore the adoption of IPv6, outline security considerations and concerns, and cover the support of IPv6 on the Palo Alto Networks next-generation firewall. Regardless of where you appear on the spectrum for IPv6 adoption, making the switch to the next-generation platform provides tremendous benefit by enabling organizations to implement security services, control errant and unmonitored usage of IPv6, provide a path to consistently secure traffic, and ease migration.

  • 1
  • 2984
Displaying 121 to 150 of 186