Displaying 151 to 180 of 187

Top 10 Zero-day Exploits of 2015: How to Prevent Security Breaches That Leverage Unknown Exploits

Threat actors who pursue the most effective means to circumvent existing endpoint security measures rely on exploits, especially those that leverage unknown software vulnerabilities (commonly referred to as “zero-day exploits”). Embedded in specially crafted data files and content, such as Adobe® PDF and Microsoft® Word documents, zero-day exploits subvert legitimate applications to carry out nefarious activities. Their ability to evade traditional antivirus solutions, and a lack of vendor security patches, often leave organizations with little in terms of preventive measures against zero-day exploits, which generally serve as the initial stage of a targeted attack. This paper provides a list of the Top 10 Zero-Day Exploits of 2015, offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns, and discusses three particularly effective zero-day exploits in brief case studies. The paper then introduces the reader to a technical solution that prevents security breaches which leverage zero-day exploits, including the Top 10 Zero-Day Exploits of 2015 that are listed in this document, without prior knowledge of the application vulnerabilities which they exploit. The solution safely enables organizations to continue the use of their applications regardless of the existence of zero-day exploits, the discovery of application vulnerabilities, or the deployment of security patches.

  • 3
  • 823

Palo Alto Networks — Delivering Network Security for IPv6 Networks

In this paper we will explore the adoption of IPv6, outline security considerations and concerns, and cover the support of IPv6 on the Palo Alto Networks next-generation firewall. Regardless of where you appear on the spectrum for IPv6 adoption, making the switch to the next-generation platform provides tremendous benefit by enabling organizations to implement security services, control errant and unmonitored usage of IPv6, provide a path to consistently secure traffic, and ease migration.

  • 1
  • 3049

Controlling Modern Malware

Today's networks are under attack from a new breed of threats and malware. These threats are highly evasive, capable of persisting in your network for long periods of time, and skilled at avoiding traditional antivirus and IPS technologies. This paper provides background on these challenges and introduces WildFire: Palo Alto Networks new solution to detect and stop targeted and unknown threats attacking your network.

  • 1
  • 328

Palo Alto Networks and Citrix: Securing your Virtual Desktop Infrastructure

Read how deploying Citrix NetScaler with Palo Alto Networks security platforms can ensure performance and scalability in virtual desktop infrastructures.

  • 0
  • 374

Palo Alto Networks VM-Series and Citrix NetScaler Deployment Guide

Read this guide to learn how to accelerate and secure your Citrix XenDesktop environment using Citrix NetScaler and Palo Alto Networks next-generation firewalls.

  • 1
  • 1364

Forrester Total Economic Impact Survey

This document highlights the Total Economic Impact of implementing an Enterprise Security Platform from Palo Alto Networks. This survey has been conducted by Forrester.

  • 0
  • 1002

PA-7050 Performance Validation Report

This 3rd party test validates the performance of the PA-7050 when security services are enabled when classifying and inspecting applications – not just protocols – that are commonly found on corporate networks. Executed by Network Test, a well-known testing facility, using Breaking Point test tools, this report is the first-ever next-generation firewall performance test that extends beyond the use of a single protocol.

  • 0
  • 1124

How Palo Alto Networks Can Help With ASD's Top Cyber Intrusion Mitigation Strategies

The Australian Signals Directorate (ASD) plays a lead role in protecting Australia’s critical infrastructure from cyber intrusions that pose real and present threats to Australia’s national security. ASD has recommended 35 and mandated that four of the mitigation strategies be implemented in every government agency.

  • 1
  • 250

2014 NSS NGFW Report

The 2014 NSS Product Analysis Report shows the Palo Alto Networks PA-3020 achieved a 92.5% security effectiveness rating and passed all security tests.

  • 2
  • 6719

Building A Next-Generation Security Architecture

Read this paper to gain valuable perspectives on how to bring network, cloud and endpoint security together into a tightly integrated architecture.

  • 0
  • 4503

The Results of the 2014 Advanced Persistent Threats Survey Bring Home a Stark Reality

Read this report from the 2014 Advanced Persistent Threats Survey to learn where organizations are seeing the most impact from APT and where they are vulnerable.

  • 1
  • 691

Defeating APTs in Government Networks

Advanced Persistent Threats (APTs) represent a unique threat to government data. APTs are increasingly formidable and ferocious. Agencies can no longer depend on virus scanning software. They can no longer simply patrol their digital perimeter. Adversaries lurk until they can sneak undetected past traditional security measures to infiltrate networks – and the problem is growing worse.

  • 0
  • 520

Modern Malware For Dummies

This book uncovers modern strategies and specific actions to regain control over today's malware.

  • 3
  • 774

We Know It Before You Do: Predicting Malicious Domains

In this paper, we propose a system for predicting the domains that are most likely to be used, or are about to be used, as malicious domains.

  • 0
  • 372

Network Security for Mobile Users

This white paper highlights the challenges you face when users are off-network, and how GlobalProtect can help address those challenges.

  • 0
  • 755

SANS: Enabling Social Networking Applications for Enterprise Usage

This whitepaper, written by a SANS analyst, provides the latest research regarding social networking applications, explains the benefits and risks they bring to corporate networks, and provides a recommendation for defining a secure social networking policy.

  • 0
  • 432

Preventing Data Leaks at the Firewall

This paper discusses the problems organizations face trying to identify and prevent data leakage, the shortfalls of DLP technology and Palo Alto Networks solution.

  • 0
  • 3607

Palo Alto Networks to Protect Microsoft SharePoint Deployments

Learn how Palo Alto Networks can help IT managers detect and control Microsoft SharePoint deployments.

  • 0
  • 830

Re-Inventing Network Security

Find out how we're reinventing network security to allow enterprises to safely enable modern applications without taking on unnecessary risks.

  • 0
  • 260

The Future of Intrusion Prevention

Learn why Gartner believes the future of Intrusion Prevention (IPS) is a next-generation firewall.

  • 0
  • 870

Controlling Botnets with the Next-Generation Firewall

We dig into the details of how botnets work, and introduce the unique role the next-generation firewall plays in controlling these types of threats.

  • 0
  • 1626

Securosis: Understanding and Selecting an Enterprise Firewall

This Securosis whitepaper analyzes the disruption happening at the enterprise perimeter, the various technical architectures capable of addressing the new requirements, and deployment considerations for optimal security, availability, and performance. The whitepaper also guides you through advanced firewall features such as IPS, content filtering, and anti-malware.

  • 1
  • 181

Gartner Magic Quadrant for Enterprise Network Firewalls

Palo Alto Networks was recognized as a leader. And according to Gartner, vendors in the leaders quadrant "lead the market in offering new safeguarding features, providing expert capability, rather than treating the firewall as a commodity, and having a good track record of avoiding vulnerabilities in their security products."

  • 0
  • 1575

Securing FlexPod Deployments with Next-Generation Firewalls

Read how a secure VMWare-on-FlexPod architecture with Palo Alto Networks next-generation firewall lets enterprises quickly deploy a secure infrastructure stack.

  • 1
  • 356

Gartner Research: Defining the Next-Generation Firewall

Provides an analyst's perspective on the evolving threats driving enterprises to consider next-generation firewalls. Report includes definition, market analysis, and recommendations.

  • 0
  • 928

5 Keys to Preventing Advanced Attacks

This paper describes some of the most important criteria to consider when architecting your defenses against advanced attacks and modern malware.

  • 0
  • 380

IANS: Impact of Web 2.0 on the Enterprise

IANS, a leading research company focused on information security, just published their risk assessment of adopting Web 2.0 technologies in the enterprise.

  • 0
  • 119

Connected Governments and Agile Militaries: Meeting the Security Requirements of Today’s Evolving Governments

Governments around the world are undergoing change. Whether reducing their data center footprints, virtualizing existing services to reduce costs and “go green”, or advancing security to thwart today’s advanced attacks in the field or at home, governments have different requirements of their cybersecurity solutions today. Palo Alto Networks® provides some of today’s most innovative, advanced, and flexible cybersecurity options available to meet today’s government requirements.

  • 0
  • 189

Thwarting APTs: Threat Visibility for Government Networks

Read about the Palo Alto Networks enterprise security platform, which prevents all known file types from traversing government networks in-line.

  • 1
  • 366

Defense in Depth: 5 Imperatives for Governments to Defeat APTs

Defense in Depth does not mean more security tools. The key to thwarting advanced attacks in today’s government networks is to reduce the attack surface to increase visibility to what matters: the anomalies in your network, across the kill chain.

  • 0
  • 388
Displaying 151 to 180 of 187