Date

Displaying 121 to 150 of 187

Scarlet Mimic

Unit 42, the Palo Alto Networks® threat intelligence team, recently released a report identifying and tracking “Scarlet Mimic,” a series of sophisticated cyber espionage attacks which targeted Uyghur and Tibetan activists, their supporters, and entities that collect information on such groups. The attacks, which date back to 2009, have evolved over the past six years to compromise users of Windows®, Mac® OS X® and Android™ devices, indicating that they are the work of a well-resourced, sophisticated and persistent adversary group.

  • 6
  • 685

Ponemon Executive Advisory Report

Cybersecurity has become so pervasive in headlines across the globe that scarcely a week passes without another high-profile breach. While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks, given the heavily technical nature of the issue.

  • 5
  • 502

The Power of the Next-Generation Security Platform

Integrating best-of-breed network, cloud and endpoint security with industry-leading threat intelligence, Palo Alto Networks® Next-Generation Security Platform delivers the visibility, security and control customers require to enhance their security posture without compromising business efficiency. Customers can now confidently detect cyberthreats and prevent breaches at every stage of the attack lifecycle in a highly automated manner.

  • 6
  • 1265

How Malware Eats Cookies

Palo Alto Networks threat researchers are constantly analyzing different facets of advanced threats looking for new ways to both identify and prevent compromise. In this research paper, the team analyzes changes in cookies to understand how they’re effected by malware in an effort to determine whether cookie behavior can be used to determine maliciousness and infection.

  • 1
  • 999

Best Practices: Inspecting Encrypted Traffic

This document outlines Palo Alto Networks methodology for selectively decrypting traffic and our best practices for balancing risk and user privacy.

  • 2
  • 1335

Uncover SSL-Encrypted Attacks in Government Networks

A comprehensive security strategy for federal and other government agencies requires in-depth analysis of encrypted traffic to detect and prevent hidden attacks and data leakage. As more Internet traffic is encrypted, increasing numbers of attackers, including state-sponsored actors, are using this technology to hide malware, and botnet-based command and control traffic to exfiltrate data and escalate the likelihood of successful attacks. Palo Alto Networks Next-Generation Security Platform provides a combination of advanced capabilities to prevent undesired applications and malicious content, including the decryption and scrutinization of encrypted communications, along with Hardware Security Module (HSM) support for enhanced performance and security of certificate and key management.

  • 1
  • 549

Moving Beyond Proxies

This whitepaper highlights the short comings of proxies, and showcases how a next generation security platform can provide faster, simpler and more comprehensive security.

  • 7
  • 2852

Best Practices: Securing the Network by Application

Our best practices for securing the network by application helps you reduce your organization’s attack surface and provides security policy strategies.

  • 4
  • 684

Best Practices: Securing the Network by Application

Our best practices for securing the network by application helps you reduce your organization’s attack surface and provides security policy strategies.

  • 0
  • 60

Heart of the Network – Data Center Defense

Feds need to protect the data center from internal and external threats as they transition to cloud environments. How are they managing the transition?

  • 0
  • 297

Endpoint Epidemic Report

Federal agencies are facing an explosion of endpoints in both volume and variety. How are Federal IT managers handling this endpoint epidemic? What¹s the best approach to building an effective, practical, and enforceable endpoint strategy? What are the challenges and what¹s the path forward? To find out, MeriTalk and Palo Alto Networks examined endpoint security strategies and efforts across the U.S. Federal government, surveying 100 Federal IT managers and 100 non-IT Federal employees.

  • 2
  • 305

Managed Network Security Services

Evolution of Next-Generation Managed Network Security Services For almost twenty years, the centerpiece of any corporate security strategy has been the firewall. As soon as there were appliances, there were services providers who offered to manage the firewall.

  • 5
  • 443

Navigating the Digital Age

Read tips about protecting our digital way of life and the future of prevention from Mark McLaughlin, CEO of Palo Alto Networks.

  • 4
  • 1287

Application Usage and Threat Report

The AUTR provides visibility into the real-world threat and application landscape, helping security teams to understand how adversaries are attempting to attack organizations around the world and build proactive, actionable controls. Built by the Unit 42 threat research team, the report correlates data from more than 7,000 enterprise organizations, providing broad visibility into critical trends.

Santa Clara
  • 29
  • 8451

Single-Pass Architecture

Outlines the benefits of intelligently integrating security functions into your firewall, why past approaches have failed, and how Palo Alto Networks succeeded with our single-pass architecture approach.

  • 5
  • 12377

Endpoint Security Takes Center Stage

Forrester conducted a survey of 125 organizations to determine the current challenges and trends in endpoint security. The survey determined that organizations have a need for zero-day exploit and unknown malware prevention, and a desire for endpoint solutions that integrate with network and cloud components. Furthermore, organizations use products that provide varying prevention capabilities on the endpoint. This paper compares and contrasts these approaches to endpoint protection.

  • 3
  • 1549

Advanced Endpoint Protection For Dummies

Malware and exploits have evolved. This e-book outlines a new approach to protect endpoints from advanced threats.

  • 10
  • 11913

Cybersecurity Buyers Guide

The Cybersecurity Buyer’s Guide outlines the 10 things you need to know to choose a cohesive cybersecurity solution.

  • 0
  • 773

Palo Alto Networks in the Data Center

This paper examines modern endpoint protection, describing how the evolution of malware has created a need for a modernized approach to endpoint protection. It also looks at the role of Palo Alto Networks Traps offering in this critical market.

  • 0
  • 1571

Conquering Network Security Challenges in Distributed Enterprises

Read this SANS survey that shows how IT organizations don’t have the level of visibility they need to both detect and respond to threats in a timely manner.

  • 0
  • 1116

Security Considerations for Private vs. Public Clouds

This whitepaper, written by the Cloud Security Alliance, provides an in-depth discussion of the security considerations for public and private clouds.

  • 5
  • 2330

Threat Intelligence Cloud

Download this white paper to learn how the Palo Alto Networks Threat Intelligence Cloud detects unknown threats and converts them into known, stoppable threats.

  • 2
  • 5476

Reduce Costs with a Platform Approach to Security

This paper examines three different organizations, the Palo Alto Networks enterprise security platform they deployed, and the substantial savings they realized.

  • 0
  • 663

Next-Generation Data Center Security Implementation Guidelines

Get this white paper for implementation guidelines and recommendations to deploy the PA-7050, the VM-Series for NSX and Panorama to protect your datacenter.

  • 5
  • 2974

GlobalProtect Deployment Guide

Read how organizations can use Palo Alto Networks GlobalProtect to provide a secure environment for the increasingly mobile workforce.

  • 7
  • 11928

Traps NERC-CIP Version 5 Compliance

Read how Palo Alto Networks Traps provides Advanced Endpoint Protection to help organizations achieve Version 5 CIP Cyber Security compliance.

  • 3
  • 807

Breaking the Cyber Attack Lifecycle

The Enterprise Security Platform from Palo Alto Networks helps companies remain agile against advanced attacks and defend enterprises against cyber criminals.

  • 0
  • 3672

Traps Advanced Endpoint Protection Technology Overview

With today's growing cyber threats, you undoubtedly have multiple layers of security in place to ensure your data is protected. The problem is that the existing endpoint technologies are just not adequate, leaving you to spend much of your time trying to keep up with patches, then detecting, remediating, and often re-imaging systems when you should be preventing these breaches. This whitepaper will introduce you to a better way, Traps, Palo Alto Networks Advanced Endpoint Protection is not only a product like no other, but an entirely new category that is going to change the way you think about endpoint protection.

  • 4
  • 18967

Zero Trust on the Endpoint

This white paper outlines how Palo Alto Networks Traps Advanced Endpoint Protection extends the Zero Trust methodology to your endpoint security.

  • 5
  • 5063

The Advanced Attack Challenge: Creating a Government Private Threat Intelligence Cloud

One of the most prominent and advanced threats to government networks is advanced delivery and execution of zero-day malware. The adversary effectively utilizes technology and has enhanced their ability to create and deliver highly effective unknown or zero-day malware through advanced persistent threats (APTs). To improve defense and resilience, governments are creating their own private threat intelligence clouds based on Palo Alto Networks WildFire™. This architecture enables immediate analysis of the unknown threats and swiftly pushes prevention to all of the physical and virtual Palo Alto Networks platforms from data center to endpoint within the network. By employing Palo Alto Networks® Traps™ Advanced Endpoint Protection as a compensating control, businesses can keep Windows Server 2003 systems compliant and secure, even after EOS.

  • 2
  • 720
Displaying 121 to 150 of 187