Displaying 121 to 150 of 178

Navigating the Digital Age

Read tips about protecting our digital way of life and the future of prevention from Mark McLaughlin, CEO of Palo Alto Networks.

  • 4
  • 1255

Application Usage and Threat Report

The AUTR provides visibility into the real-world threat and application landscape, helping security teams to understand how adversaries are attempting to attack organizations around the world and build proactive, actionable controls. Built by the Unit 42 threat research team, the report correlates data from more than 7,000 enterprise organizations, providing broad visibility into critical trends.

Santa Clara
  • 29
  • 7525

Single-Pass Architecture

Outlines the benefits of intelligently integrating security functions into your firewall, why past approaches have failed, and how Palo Alto Networks succeeded with our single-pass architecture approach.

  • 5
  • 10976

Endpoint Security Takes Center Stage

Forrester conducted a survey of 125 organizations to determine the current challenges and trends in endpoint security. The survey determined that organizations have a need for zero-day exploit and unknown malware prevention, and a desire for endpoint solutions that integrate with network and cloud components. Furthermore, organizations use products that provide varying prevention capabilities on the endpoint. This paper compares and contrasts these approaches to endpoint protection.

  • 3
  • 1441

Advanced Endpoint Protection For Dummies

Malware and exploits have evolved. This e-book outlines a new approach to protect endpoints from advanced threats.

  • 10
  • 11648

Cybersecurity Buyers Guide

The Cybersecurity Buyer’s Guide outlines the 10 things you need to know to choose a cohesive cybersecurity solution.

  • 0
  • 697

Palo Alto Networks in the Data Center

This paper examines modern endpoint protection, describing how the evolution of malware has created a need for a modernized approach to endpoint protection. It also looks at the role of Palo Alto Networks Traps offering in this critical market.

  • 0
  • 1430

Conquering Network Security Challenges in Distributed Enterprises

Read this SANS survey that shows how IT organizations don’t have the level of visibility they need to both detect and respond to threats in a timely manner.

  • 0
  • 1080

Security Considerations for Private vs. Public Clouds

This whitepaper, written by the Cloud Security Alliance, provides an in-depth discussion of the security considerations for public and private clouds.

  • 5
  • 2012

Threat Intelligence Cloud

Download this white paper to learn how the Palo Alto Networks Threat Intelligence Cloud detects unknown threats and converts them into known, stoppable threats.

  • 2
  • 4901

Reduce Costs with a Platform Approach to Security

This paper examines three different organizations, the Palo Alto Networks enterprise security platform they deployed, and the substantial savings they realized.

  • 0
  • 644

Next-Generation Data Center Security Implementation Guidelines

Get this white paper for implementation guidelines and recommendations to deploy the PA-7050, the VM-Series for NSX and Panorama to protect your datacenter.

  • 5
  • 2841

GlobalProtect Deployment Guide

Read how organizations can use Palo Alto Networks GlobalProtect to provide a secure environment for the increasingly mobile workforce.

  • 6
  • 9214

Traps NERC-CIP Version 5 Compliance

Read how Palo Alto Networks Traps provides Advanced Endpoint Protection to help organizations achieve Version 5 CIP Cyber Security compliance.

  • 3
  • 775

Breaking the Cyber Attack Lifecycle

The Enterprise Security Platform from Palo Alto Networks helps companies remain agile against advanced attacks and defend enterprises against cyber criminals.

  • 0
  • 3130

Zero Trust on the Endpoint

This white paper outlines how Palo Alto Networks Traps Advanced Endpoint Protection extends the Zero Trust methodology to your endpoint security.

  • 5
  • 4713

Traps Advanced Endpoint Protection Technology Overview

With today's growing cyber threats, you undoubtedly have multiple layers of security in place to ensure your data is protected. The problem is that the existing endpoint technologies are just not adequate, leaving you to spend much of your time trying to keep up with patches, then detecting, remediating, and often re-imaging systems when you should be preventing these breaches. This whitepaper will introduce you to a better way, Traps, Palo Alto Networks Advanced Endpoint Protection is not only a product like no other, but an entirely new category that is going to change the way you think about endpoint protection.

  • 4
  • 18962

The Advanced Attack Challenge: Creating a Government Private Threat Intelligence Cloud

One of the most prominent and advanced threats to government networks is advanced delivery and execution of zero-day malware. The adversary effectively utilizes technology and has enhanced their ability to create and deliver highly effective unknown or zero-day malware through advanced persistent threats (APTs). To improve defense and resilience, governments are creating their own private threat intelligence clouds based on Palo Alto Networks WildFire™. This architecture enables immediate analysis of the unknown threats and swiftly pushes prevention to all of the physical and virtual Palo Alto Networks platforms from data center to endpoint within the network. By employing Palo Alto Networks® Traps™ Advanced Endpoint Protection as a compensating control, businesses can keep Windows Server 2003 systems compliant and secure, even after EOS.

  • 2
  • 687

Top 10 Zero-day Exploits of 2015: How to Prevent Security Breaches That Leverage Unknown Exploits

Threat actors who pursue the most effective means to circumvent existing endpoint security measures rely on exploits, especially those that leverage unknown software vulnerabilities (commonly referred to as “zero-day exploits”). Embedded in specially crafted data files and content, such as Adobe® PDF and Microsoft® Word documents, zero-day exploits subvert legitimate applications to carry out nefarious activities. Their ability to evade traditional antivirus solutions, and a lack of vendor security patches, often leave organizations with little in terms of preventive measures against zero-day exploits, which generally serve as the initial stage of a targeted attack. This paper provides a list of the Top 10 Zero-Day Exploits of 2015, offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns, and discusses three particularly effective zero-day exploits in brief case studies. The paper then introduces the reader to a technical solution that prevents security breaches which leverage zero-day exploits, including the Top 10 Zero-Day Exploits of 2015 that are listed in this document, without prior knowledge of the application vulnerabilities which they exploit. The solution safely enables organizations to continue the use of their applications regardless of the existence of zero-day exploits, the discovery of application vulnerabilities, or the deployment of security patches.

  • 0
  • 813

Palo Alto Networks — Delivering Network Security for IPv6 Networks

In this paper we will explore the adoption of IPv6, outline security considerations and concerns, and cover the support of IPv6 on the Palo Alto Networks next-generation firewall. Regardless of where you appear on the spectrum for IPv6 adoption, making the switch to the next-generation platform provides tremendous benefit by enabling organizations to implement security services, control errant and unmonitored usage of IPv6, provide a path to consistently secure traffic, and ease migration.

  • 1
  • 2905

Controlling Modern Malware

Today's networks are under attack from a new breed of threats and malware. These threats are highly evasive, capable of persisting in your network for long periods of time, and skilled at avoiding traditional antivirus and IPS technologies. This paper provides background on these challenges and introduces WildFire: Palo Alto Networks new solution to detect and stop targeted and unknown threats attacking your network.

  • 1
  • 317

Palo Alto Networks and Citrix: Securing your Virtual Desktop Infrastructure

Read how deploying Citrix NetScaler with Palo Alto Networks security platforms can ensure performance and scalability in virtual desktop infrastructures.

  • 0
  • 350

Palo Alto Networks VM-Series and Citrix NetScaler Deployment Guide

Read this guide to learn how to accelerate and secure your Citrix XenDesktop environment using Citrix NetScaler and Palo Alto Networks next-generation firewalls.

  • 1
  • 1260

Forrester Total Economic Impact Survey

This document highlights the Total Economic Impact of implementing an Enterprise Security Platform from Palo Alto Networks. This survey has been conducted by Forrester.

  • 0
  • 990

PA-7050 Performance Validation Report

This 3rd party test validates the performance of the PA-7050 when security services are enabled when classifying and inspecting applications – not just protocols – that are commonly found on corporate networks. Executed by Network Test, a well-known testing facility, using Breaking Point test tools, this report is the first-ever next-generation firewall performance test that extends beyond the use of a single protocol.

  • 0
  • 1046

How Palo Alto Networks Can Help With ASD's Top Cyber Intrusion Mitigation Strategies

The Australian Signals Directorate (ASD) plays a lead role in protecting Australia’s critical infrastructure from cyber intrusions that pose real and present threats to Australia’s national security. ASD has recommended 35 and mandated that four of the mitigation strategies be implemented in every government agency.

  • 1
  • 243

Defining the 21st Century Cybersecurity Protection Platform for ICS

In this paper Mario Chiock, Cybersecurity & Disruptive Technology Executive Adviser and Del Rodillas Senior Manager, SCADA and Industrial Controls Cybersecurity go through the nine core capabilities that define this 21st century security platform for industrial control systems.

  • 2
  • 3886

2014 NSS NGFW Report

The 2014 NSS Product Analysis Report shows the Palo Alto Networks PA-3020 achieved a 92.5% security effectiveness rating and passed all security tests.

  • 2
  • 6685

Building A Next-Generation Security Architecture

Read this paper to gain valuable perspectives on how to bring network, cloud and endpoint security together into a tightly integrated architecture.

  • 0
  • 4471

Technical White Paper on VMware NSX and Palo Alto Networks VM-Series Integration

This technical document provides details of the VMware NSX and Palo Alto Networks integration, including descriptions of the components of the solution, and key use cases.

  • 4
  • 6961
Displaying 121 to 150 of 178