Date

Displaying 121 to 150 of 266

Navigating the Digital Age

Navigating the Digital Age includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials.
  • 1
  • 1280

The GDPR and How the Next-Generation Security Platform Can Help

Palo Alto Networks does not claim to address all aspects of GDPR compliance, but our Next-Generation Security Platform should be viewed essential for GDPR compliance.
  • 0
  • 12

Navigating the Digital Age (Benelux Edition)

Navigating the Digital Age (Benelux Edition) includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials.
  • 1
  • 403

Three Questions to Ask Your CIO About Public Cloud Security

If your CIO has been planning ahead, you probably have a plan for secure collaboration with public cloud service providers. But if not, ask why not.
  • 0
  • 233

Navigating the Digital Age for France

La nouvelle législation de l'Union Européenne autour de la directive SRI et de la réforme de la protection des données progresse.
  • 0
  • 260

Navigating the Digital Age for the United Kingdom

Navigating the Digital Age includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials for the UK.
  • 0
  • 389

Navigating the Digital Age for Singapore

Navigating the Digital Age includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials for Singapore.
  • 0
  • 308

Navigating the Digital Age for Australia

Navigating the Digital Age includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials for Australia.
  • 0
  • 232

Comprehensive Data Security in the Cloud

This white paper outlines three steps organizations can follow to effectively secure business-critical data in the cloud.
  • 0
  • 839

Rethink Your Strategy to Defeat Evasive Attacks

Understanding evasive malware and effective strategies for preventing this emerging threat type can protect your organization against financial, operational, legal, regulatory and compliance risks.
  • 2
  • 1104

Comparing Palo Alto Networks With Proxy-Based Products

Comparison of Palo Alto Networks next-generation firewall technology with proxies.
  • 1
  • 26245

The Next Board Problem: Automatic Enterprise Security Orchestration — A Radical Change in Direction

Commercial boards and senior government officials may be the only groups capable of kick-starting this new and necessary direction in the evolution of cybersecurity...
  • 1
  • 436

The Next Board Problem: Automatic Enterprise Security Orchestration — A Radical Change in Direction

Commercial boards and senior government officials may be the only groups capable of kick-starting this new and necessary direction in the evolution of cybersecurity...
  • 0
  • 10

Cloud Adoption Risk and Compliance

Public cloud adoption poses risks. Senior leaders should understand and manage those risks in a way that is in line with the organization’s risk appetite.
  • 0
  • 413

Cloud Adoption Risk and Compliance

Public cloud adoption poses risks. Senior leaders should understand and manage those risks in a way that is in line with the organization’s risk appetite.
  • 0
  • 13

Protect IoT Opportunity with Network-Based Security

Palo Alto Networks® Next-Generation Security Platform provides advanced network-based security mechanisms that protect service provider networks, IoT systems, and interconnected networks and infrastructure. The platform identifies infected devices, prevents security attacks targeting IoT systems (controllers and devices), and establishes the basis for adding significant value to the services offered to consumers. With this capability, service providers can grow their market share in the IoT market while providing deep protection for their own infrastructure and interconnected networks.
  • 0
  • 1333

The Need for a Next-Generation Platform Approach in Mobile Networks

Read how Palo Alto Networks that helps mobile operators get ahead of cybercriminal capability and urgent mobile operator pain points.
  • 2
  • 489

Security Reference Blueprint for K-12 Education IT (2017)

The Security Reference Blueprint for K-12 Education suggests a framework to augment the security of existing infrastructure while reducing the operational demands on IT and security teams. Using this blueprint enables education security and IT professionals to keep students, staff, and their data safe while providing appropriate network security for diverse groups of users, detect and automatically block ransomware and other threats, and comply with applicable policies and regulations.
  • 1
  • 520

Palo Alto Networks & Ecessa

Ecessa and Palo Alto Networks customers can capitalize on unprecedented protection against today’s sophisticated attacks for superior network performance.
  • 0
  • 199

Security Reference Blueprint for Higher Education IT

The Security Reference Blueprint for Higher Education outlines security principles and a framework using the preventative capabilities of the Palo Alto Networks Next-Generation Security Platform. Using this blueprint enables education security and IT professionals to protect PII and IP data, maintain a high-performance, high-availability learning environment, and prepare to meet new and emerging technological challenges while reducing security threats.
  • 0
  • 658

8 Imperatives for Governments to Defeat Advanced Threats

Advanced attacks are organized campaigns that leverage multiple techniques. Don’t be the government organization flying blind to attacks against your organization.
  • 0
  • 330

Security Reference Blueprint for Healthcare IT

Healthcare security reference blueprint
  • 22
  • 1183

Replacing Traditional Remote Access VPN With GlobalProtect

This solution brief provides an overview for using GlobalProtect as remote access VPN.
  • 1
  • 8831

Security Platform for Financial Services

Read how thousands of banks, institutional investors, asset managers, broker-dealers and financial institutions across the globe prevent successful cyberattacks.
  • 0
  • 995

Next-Generation Security Platform for Critical Infrastructure

In this white paper, learn how implementing an Enterprise Security Platform will help SCADA and ICS operations solve some of their challenges.
  • 3
  • 3629

Safely Enable Your SaaS Applications

The use of SaaS applications is creating gaps in security visibility and new risks for threat propagation, data leakage and regulatory noncompliance. See how Aperture can help.
  • 1
  • 12891

Government Brochure 

Governments around the world are undergoing change. Whether reducing data center footprints, virtualizing existing services to reduce costs and "go green", or advancing security strategies to thwart advanced attacks in the field or at home, governments are demanding more from their cybersecurity solutions today.
  • 8
  • 1394

Today’s Cybersecurity Challenges in Government

Palo Alto Networks meets the cybersecurity needs of its government customers by providing a future-proof platform with visibility, prevention and resilience.
  • 0
  • 966

Auto Scaling the VM-Series on AWS Tech Brief

One of the core Amazon® Web Services (AWS®) values is the ability to scale your applications dynamically as traffic demands dictate. AWS Elastic Load Balancing (AWS ELB) and AWS Auto Scaling allow you to add new resources, such as a web server, to your AWS VPC based on observed, increased traffic.
  • 0
  • 109

VM-Series for AWS Hybrid Cloud Deployment Guidelines

From a security perspective, moving your applications and data to AWS does not necessarily eliminate or minimize your security challenges. Regardless of their location – public, private cloud or physical data center – your applications and data are an attacker’s target, and protecting them in AWS introduces the same security challenges that are present within your on-premises network. These challenges include a lack of control over your network traffic based on the application and an inability to prevent cyberattacks. The VM-Series for AWS allows you to securely move your applications and data onto AWS beginning first with a hybrid approach, then expanding security coverage to include segmentation policies, much like the security techniques used on your physical network. This whitepaper walks through both AWS and VM-Series deployment guidelines for building a hybrid cloud that extends your data center into AWS. For completeness, this paper has been written using a two-tiered application environment (web server and database) that is secured by the VM-Series.
  • 2
  • 4043
Displaying 121 to 150 of 266