Date

Displaying 151 to 173 of 173

GlobalProtect Deployment Guide

Read how organizations can use Palo Alto Networks GlobalProtect to provide a secure environment for the increasingly mobile workforce.
  • 7
  • 14549

Next-Generation Data Center Security Implementation Guidelines

Get this white paper for implementation guidelines and recommendations to deploy the PA-7050, the VM-Series for NSX and Panorama to protect your datacenter.
  • 5
  • 3100

Traps NERC-CIP Version 5 Compliance

Read how Palo Alto Networks Traps provides Advanced Endpoint Protection to help organizations achieve Version 5 CIP Cyber Security compliance.
  • 3
  • 898

Breaking the Cyber Attack Lifecycle

The Enterprise Security Platform from Palo Alto Networks helps companies remain agile against advanced attacks and defend enterprises against cyber criminals.
  • 0
  • 4172

Zero Trust on the Endpoint

This white paper outlines how Palo Alto Networks Traps Advanced Endpoint Protection extends the Zero Trust methodology to your endpoint security.
  • 5
  • 5172

Traps Advanced Endpoint Protection Technology Overview

With today's growing cyber threats, you undoubtedly have multiple layers of security in place to ensure your data is protected. The problem is that the existing endpoint technologies are just not adequate, leaving you to spend much of your time trying to keep up with patches, then detecting, remediating, and often re-imaging systems when you should be preventing these breaches. This whitepaper will introduce you to a better way, Traps, Palo Alto Networks Advanced Endpoint Protection is not only a product like no other, but an entirely new category that is going to change the way you think about endpoint protection.
  • 4
  • 18970

Top 10 Zero-day Exploits of 2015: How to Prevent Security Breaches That Leverage Unknown Exploits

Threat actors who pursue the most effective means to circumvent existing endpoint security measures rely on exploits, especially those that leverage unknown software vulnerabilities (commonly referred to as “zero-day exploits”). Embedded in specially crafted data files and content, such as Adobe® PDF and Microsoft® Word documents, zero-day exploits subvert legitimate applications to carry out nefarious activities. Their ability to evade traditional antivirus solutions, and a lack of vendor security patches, often leave organizations with little in terms of preventive measures against zero-day exploits, which generally serve as the initial stage of a targeted attack. This paper provides a list of the Top 10 Zero-Day Exploits of 2015, offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns, and discusses three particularly effective zero-day exploits in brief case studies. The paper then introduces the reader to a technical solution that prevents security breaches which leverage zero-day exploits, including the Top 10 Zero-Day Exploits of 2015 that are listed in this document, without prior knowledge of the application vulnerabilities which they exploit. The solution safely enables organizations to continue the use of their applications regardless of the existence of zero-day exploits, the discovery of application vulnerabilities, or the deployment of security patches.
  • 4
  • 895

Palo Alto Networks — Delivering Network Security for IPv6 Networks

In this paper we will explore the adoption of IPv6, outline security considerations and concerns, and cover the support of IPv6 on the Palo Alto Networks next-generation firewall. Regardless of where you appear on the spectrum for IPv6 adoption, making the switch to the next-generation platform provides tremendous benefit by enabling organizations to implement security services, control errant and unmonitored usage of IPv6, provide a path to consistently secure traffic, and ease migration.
  • 1
  • 3343

Palo Alto Networks and Citrix: Securing your Virtual Desktop Infrastructure

Read how deploying Citrix NetScaler with Palo Alto Networks security platforms can ensure performance and scalability in virtual desktop infrastructures.
  • 0
  • 478

Palo Alto Networks VM-Series and Citrix NetScaler Deployment Guide

Read this guide to learn how to accelerate and secure your Citrix XenDesktop environment using Citrix NetScaler and Palo Alto Networks next-generation firewalls.
  • 1
  • 1652

How Palo Alto Networks Can Help With ASD's Top Cyber Intrusion Mitigation Strategies

The Australian Signals Directorate (ASD) plays a lead role in protecting Australia’s critical infrastructure from cyber intrusions that pose real and present threats to Australia’s national security. ASD has recommended 35 and mandated that four of the mitigation strategies be implemented in every government agency.
  • 1
  • 323

Building A Next-Generation Security Architecture

Read this paper to gain valuable perspectives on how to bring network, cloud and endpoint security together into a tightly integrated architecture.
  • 0
  • 4608

We Know It Before You Do: Predicting Malicious Domains

In this paper, we propose a system for predicting the domains that are most likely to be used, or are about to be used, as malicious domains.
  • 0
  • 438

IANS: Impact of Web 2.0 on the Enterprise

IANS, a leading research company focused on information security, just published their risk assessment of adopting Web 2.0 technologies in the enterprise.
  • 0
  • 188

Securosis: Understanding and Selecting an Enterprise Firewall

This Securosis whitepaper analyzes the disruption happening at the enterprise perimeter, the various technical architectures capable of addressing the new requirements, and deployment considerations for optimal security, availability, and performance. The whitepaper also guides you through advanced firewall features such as IPS, content filtering, and anti-malware.
  • 1
  • 251

Palo Alto Networks to Protect Microsoft SharePoint Deployments

Learn how Palo Alto Networks can help IT managers detect and control Microsoft SharePoint deployments.
  • 0
  • 991

Gartner Magic Quadrant for Enterprise Network Firewalls

Palo Alto Networks was recognized as a leader. And according to Gartner, vendors in the leaders quadrant "lead the market in offering new safeguarding features, providing expert capability, rather than treating the firewall as a commodity, and having a good track record of avoiding vulnerabilities in their security products."
  • 0
  • 1692

SANS: Enabling Social Networking Applications for Enterprise Usage

This whitepaper, written by a SANS analyst, provides the latest research regarding social networking applications, explains the benefits and risks they bring to corporate networks, and provides a recommendation for defining a secure social networking policy.
  • 0
  • 508

Thwarting APTs: Threat Visibility for Government Networks

Read about the Palo Alto Networks enterprise security platform, which prevents all known file types from traversing government networks in-line.
  • 1
  • 429

Defense in Depth: 5 Imperatives for Governments to Defeat APTs

Defense in Depth does not mean more security tools. The key to thwarting advanced attacks in today’s government networks is to reduce the attack surface to increase visibility to what matters: the anomalies in your network, across the kill chain.
  • 0
  • 459

Cybersecurity Imperatives in Financial Services

Read how financial institutions around the world can minimize risks presented by cybercriminals.
  • 0
  • 878

Palo Alto Networks & Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Read how Palo Alto Networks strategic partnership with Splunk offers joint customers better, risk-informed decision-making.
  • 0
  • 733

Traps PCI Compliance

The theft of credit card data continues to grow at an alarming rate. It is costly to credit card companies and merchants, and it undermines consumer confidence. The Payment Card Industry has developed the PCI Data Security Standard (PCI DSS), which includes 12 requirements for protecting cardholder data. Despite substantial investments made in securing their networks, organizations are realizing that being PCI compliant does not mean an enterprise is protected against advanced cyberattacks.
  • 1
  • 3999
Displaying 151 to 173 of 173