Date

Displaying 151 to 180 of 268

VM-Series for AWS Hybrid Cloud Deployment Guidelines

From a security perspective, moving your applications and data to AWS does not necessarily eliminate or minimize your security challenges. Regardless of their location – public, private cloud or physical data center – your applications and data are an attacker’s target, and protecting them in AWS introduces the same security challenges that are present within your on-premises network. These challenges include a lack of control over your network traffic based on the application and an inability to prevent cyberattacks. The VM-Series for AWS allows you to securely move your applications and data onto AWS beginning first with a hybrid approach, then expanding security coverage to include segmentation policies, much like the security techniques used on your physical network. This whitepaper walks through both AWS and VM-Series deployment guidelines for building a hybrid cloud that extends your data center into AWS. For completeness, this paper has been written using a two-tiered application environment (web server and database) that is secured by the VM-Series.
  • 2
  • 4298

Replacing Traditional Remote Access VPN With GlobalProtect

This solution brief provides an overview for using GlobalProtect as remote access VPN.
  • 1
  • 9273

AirWatch Palo Alto Networks Integration Solution Brief

Read how Palo Alto Networks and AirWatch have partnered to provide unique, integrated security for protecting the mobile workforce.
  • 0
  • 269

MeriTalk - Pedal to the Metal:
Mitigating New Threats Faster with Rapid Intel & Automation

Cyberattacks are one of the most pressing national security and economic concerns of governments around the world. Government agencies are taking an “all-in” approach to fight back, sharing more cyberthreat information with one another and purchasing threat feeds. However, with the influx of threat data, many agencies are having difficulty using these insights to update their sensors with real-time protection and reconfigure their defenses on the fly. And during a cyberattack, responding quickly is crucial to minimizing potential damage.
  • 0
  • 265

Building a Secure Hybrid Cloud in Azure

Building a Secure Hybrid Cloud in Azure
  • 0
  • 1561

Building a Secure Hybrid Cloud in Azure

This whitepaper helps guide you through deploying the VM-Series next-generation firewall to protect your applications and data in Microsoft Azure.
  • 0
  • 43

Cloud First, Now What?

Your organization has chosen a cloud first direction for all new application deployment and development projects and you have been tasked with developing an implementation plan but aren’t quite sure where to begin. This Cloud Security Alliance whitepaper will help cloud initiative decision makers create a repeatable process for moving applications and data to the cloud – either public, or SaaS.
  • 2
  • 4604

Traps HIPAA Validation

In this report, Coalfire, a global technology leader in cyber risk management and compliance services, outlines the results of its independent evaluation of Traps. The report describes how Traps assists organizations to satisfy the requirements of HIPAA Security Rule, as well as the requirements of the Breach Notification Rule as formalized by the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 and the Omnibus Rule of 2013.
  • 1
  • 1926

Coalfire Whitepaper: Traps PCI Validation (2016)

In this report, Coalfire, a global Payment Card Industry (PCI) Payment Application – Qualified Security Assessor (PA-QSA), outlines the results of its independent evaluation of Traps to confirm how Traps assists organizations in meeting the requirements of PCI Data Security Standard (DSS) (v3.2).
  • 0
  • 2868

Securing Microsoft Environments on the Network, in the Cloud, on the Endpoint

Overview of how the Palo Alto Networks security platform can protect Microsoft environments from the network, to the cloud to the endpoint. Discussions include hardware and virtualized form-factor firewalls, security for Office 365 and Azure, and protection for endpoints and servers.
  • 1
  • 992

Getting Started With a Zero Trust Approach to Network Security

Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. With Zero Trust there is no default trust for any entity–including users, devices, applications, and packets–regardless of what it is and its location on or relative to the corporate network. This paper discusses the need for a Zero Trust approach to network security, how the Palo Alto Networks® next-generation security platform delivers on these requirements, and provides guidance on how to progressively migrate to a Zero Trust architecture.
  • 2
  • 11235

The Value of the Next-Generation Security Platform

See how the Next-Generation Security Platform has helped customers improve their security posture and reduce their total cost of ownership.
  • 3
  • 1583

EU Cybersecurity-Related Legislation:
Why Companies Should Care

How do companies in Europe manage cybersecurity risks? Get the Executive Advisory Report: European Union Cybersecurity-Related Legislation to find out.
  • 0
  • 3264

Migrating to Panorama

Panorama, Palo Alto Networks network security management offering, provides a streamlined transition from individually managed next-generation firewalls to a centrally managed security network.
  • 2
  • 1184

LogicMonitor

LogicMonitor’s automated SaaS performance monitoring platform provides IT Ops teams with end-to-end visibility and actionable metrics to manage infrastructures.
  • 0
  • 581

Government Endpoint Use Case

Read how government endpoints can be protected against today’s threat environment with minimal disruptions to operations while meeting the needs of end users.
  • 0
  • 23

Cybersecurity Reference Blueprint for Financial Services IT (2018)

The Security Reference Blueprint for Financial Services IT enables institutions to augment the security of existing infrastructure, enable new applications, provide greater access to data, and prevent advanced threats without disrupting vital operations.
  • 19
  • 737

Network Segmentation as a Business Enabler for Financial Services (2016)

By taking a pragmatic approach to introduce network segmentation, financial institutions can minimize business disruption and reap benefits, such as limited exposure after an intrusion, and reductions in lost productivity, remediation costs, and reputational damage from actual loss of personally identifiable information (PII) or financial data. This white paper discusses how network segmentation enables financial institutions to survive intrusions and minimize or prevent data breaches.
  • 1
  • 1057

Securing the Virtualized Data Center with Next-Generation Firewalls

As your organization evolves from traditional datacenters to virtualized and cloud environments, your security architectures must evolve to support your changing set of requirements. This white paper describes the challenges of virtualized datacenter and cloud computing environments, and how to address them with next-generation firewalls.
  • 2
  • 4983

Top Recommendations to Prevent Ransomware

Read this whitepaper for specific recommendations to prevent ransomware in large organizations.
  • 1
  • 2703

Best Practices: Securing System and Application Vulnerabilities on the Network

Protecting systems and applications running on your network from being exploited by attackers is a critical step in securing your organization from threats. Learn how to leverage the Palo Alto Networks Next-Generation Security Platform to best secure the systems and applications running on your network from vulnerabilities by preventing attackers from exploiting them.
  • 1
  • 495

Best Practices in SaaS Security

Learn how Palo Alto Networks can help to secure SaaS applications so they don’t become a breeding ground for data leakage and malware.
  • 1
  • 1498

Best Practices - Data Center Security

See how Palo Alto Networks Next-Generation Security Platform helps you to implement an effective Zero Trust security model to protect your data center assets.
  • 1
  • 2921

The Advantages of User Awareness in Public Sector Network Security 

To serve their citizens, federal/national, state and local governments must gather, create, or process sensitive information. As various high-profile breaches have demonstrated, this data is not sufficiently protected, particularly from the insiders whose actions are responsible for the majority of public sector security incidents. 
  • 1
  • 618

Meeting CSIP Objectives With an Automated and Preventive Security Approach 

Every day, the U.S. federal government experiences increasingly sophisticated and persistent cyberthreats. The government is expending significant resources to ensure the cybersecurity of federal networks, systems and data remains a top priority. This white paper: Gives a short backgrounder on the U.S. government’s Cybersecurity Strategy and Implementation Plan (CSIP). Describes how the Palo Alto Networks® Next-Generation Security Platform enables U.S. federal agencies to identify and protect High Value Assets (HVAs) and information and detect and rapidly respond to cyber incidents. Provides a case study on how one U.S. federal agency used Palo Alto Networks to help meet CSIP objectives.
  • 0
  • 581

PWC Security Framework Guide for Business Leaders

While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue. The goal of this document is to address this gap by providing corporate leaders a practical framework for addressing the people, process and technology elements of the cybersecurity challenge.
  • 2
  • 2663

Network Security Management For Dummies

Today’s enterprise security deployments require a network security management solution that provides the following: • Centralized administration with automated and stream-lined management and configuration processes • Greater network visibility with comprehensive reporting across the entire network security environment • Prioritization of critical threats to enable faster, more effective incident response
  • 2
  • 8475

WildFire named a leader for Automated Malware Analysis

The Forrester Wave™: Automated Malware Analysis, Q2 2016 ranks WildFire as a leader in this space, through evaluation of its current offering, its market presence, and strategy.
  • 0
  • 4951

Cybersecurity For Dummies

Next-generation cybersecurity provides visibility, control and integration of threat‐prevention disciplines needed to find and stop security threats.
  • 1
  • 5146

Tech Tips User-ID

Secure your organization’s risk posture with employee identification beyond IP address recognition. As new security policies are introduced and others are circumvented, User-ID ensures stable visibility amid network changes.
  • 3
  • 1853
Displaying 151 to 180 of 268