Date

Displaying 181 to 210 of 266

Secure Windows XP with Traps

Windows® XP end-of-life is a critical threat exposure for XP users. Security was one of the major drivers for Microsoft’s decision to end support for this operating system. No doubt, the intention was to urge enterprises to upgrade their systems. In reality, however, Windows XP systems are still deployed in many organizations. This technical brief outlines how Traps secures endpoint systems that run Windows XP, while enabling you to manage your XP upgrade policy at your own pace as you maintain acceptable levels of security and compliance.
  • 1
  • 1605

First Principles For Network Defenders: A Unified Theory For Security Practitioners

First principles in a designated problem space are so fundamental as to be self-evident; so true that no expert in the field can argue against them. Experts use them like building blocks to derive everything else that is worth -knowing in the problem domain. In this paper, we propose that the first principle for all network defenders is to prevent high-risk material impact to the organization.
  • 1
  • 1278

Traps HIPAA Compliance

This technical brief outlines how Traps secures endpoint systems that run Windows XP, while enabling you to manage your XP upgrade policy at your own pace as you maintain acceptable levels of security and compliance.
  • 4
  • 2371

NSS Labs 2016 NGFW Test Report

The 2016 NSS NGFW Product Analysis Report shows the Palo Alto Networks PA-7050 achieving a 95.8% security effectiveness rating and successfully passing all security tests.
  • 3
  • 13807

Network Security in Virtualized Datacenters For Dummies

To realize the benefits of virtualization you must adapt your security architecture to address new challenges, and today's application and threat landscape. 2nd Edition.
  • 0
  • 904

Securing the Unpatchable

This document presents two case studies that discuss the security, risk and compliance ramifications of operating unpatchable systems and applications
  • 3
  • 1112

Scarlet Mimic

Unit 42, the Palo Alto Networks® threat intelligence team, recently released a report identifying and tracking “Scarlet Mimic,” a series of sophisticated cyber espionage attacks which targeted Uyghur and Tibetan activists, their supporters, and entities that collect information on such groups. The attacks, which date back to 2009, have evolved over the past six years to compromise users of Windows®, Mac® OS X® and Android™ devices, indicating that they are the work of a well-resourced, sophisticated and persistent adversary group.
  • 6
  • 757

Best Practices: Inspecting Encrypted Traffic

This document outlines Palo Alto Networks methodology for selectively decrypting traffic and our best practices for balancing risk and user privacy.
  • 2
  • 1564

Uncover SSL-Encrypted Attacks in Government Networks

A comprehensive security strategy for federal and other government agencies requires in-depth analysis of encrypted traffic to detect and prevent hidden attacks and data leakage. As more Internet traffic is encrypted, increasing numbers of attackers, including state-sponsored actors, are using this technology to hide malware, and botnet-based command and control traffic to exfiltrate data and escalate the likelihood of successful attacks. Palo Alto Networks Next-Generation Security Platform provides a combination of advanced capabilities to prevent undesired applications and malicious content, including the decryption and scrutinization of encrypted communications, along with Hardware Security Module (HSM) support for enhanced performance and security of certificate and key management.
  • 1
  • 645

Selective SSL Decryption for Threat Prevention

This paper lays out a basic approach that you can use to strike an appropriate balance between security and performance by selectively decrypting and inspecting SSL traffic based on policy.
  • 0
  • 7194

Moving Beyond Proxies

Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy security products, providing limited security functionality against today’s advanced threats. Once upon a time, Proxies fulfilled a need traditional firewalls could not meet: visibility into web traffic starting with categorization of HTTP and later HTTPS traffic. However, little to no emphasis was put on traffic and the vast number of applications utilizing other avenues of accessing corporate networks. Proxy vendors still over-emphasize the importance of HTTP and HTTPS traffic while downplaying the role of applications utilizing other entry points in cyber attacks. This whitepaper highlights the short comings of proxies, and showcases how a next generation security platform can provide faster, simpler and more comprehensive security. This white paper is available in Portuguese.
  • 7
  • 3353

Heart of the Network – Data Center Defense

Feds need to protect the data center from internal and external threats as they transition to cloud environments. How are they managing the transition?
  • 0
  • 312

Managed Network Security Services

Evolution of Next-Generation Managed Network Security Services For almost twenty years, the centerpiece of any corporate security strategy has been the firewall. As soon as there were appliances, there were services providers who offered to manage the firewall.
  • 5
  • 582

Navigating the Digital Age

Read tips about protecting our digital way of life and the future of prevention from Mark McLaughlin, CEO of Palo Alto Networks.
  • 5
  • 1429

Application Usage and Threat Report

The AUTR provides visibility into the real-world threat and application landscape, helping security teams to understand how adversaries are attempting to attack organizations around the world and build proactive, actionable controls. Built by the Unit 42 threat research team, the report correlates data from more than 7,000 enterprise organizations, providing broad visibility into critical trends.
Santa Clara
  • 30
  • 9080

Single Pass Architecture

With the single-pass architecture, Palo Alto Networks makes it possible to add a function to a next-generation firewall, instead of adding another security device, and in such a way that the integrated approach actually offers cybersecurity benefits and advantages that discrete devices cannot.
  • 6
  • 13619

Governance of Cybersecurity 2015 Report

Palo Alto Networks joined Financial Services Roundtable and Forbes as sponsors of the Georgia Tech Governance of Cybersecurity: 2015 Report in order to increase the awareness among senior leaders on the importance of cybersecurity risk management and proper investments in the right people, process and technologies need to prevent cyber threats.
  • 0
  • 1856

APP-ID Tech Brief

This tech brief provides an overview of our patented App-ID classification technology that determines the exact identify of applications, irrespective of port, protocol, evasive tactic, or SSL encryption.
  • 4
  • 14232

Cybersecurity Buyers Guide

The Cybersecurity Buyer’s Guide outlines the 10 things you need to know to choose a cohesive cybersecurity solution.
  • 0
  • 918

Real-Time Cyberthreat Detection

Today our organizations remain highly vulnerable to modern cyberattacks, which have grown increasingly stealthy and persistent against traditional defenses. Serious incidents are not being detected in time, or at all, because security teams are either too dependent on narrow and outdated threat data, or they have no means to take action quickly, at scale, against all of the threat intelligence available to them
  • 0
  • 2035

Palo Alto Networks in the Data Center

This paper examines modern endpoint protection, describing how the evolution of malware has created a need for a modernized approach to endpoint protection. It also looks at the role of Palo Alto Networks Traps offering in this critical market.
  • 0
  • 1700

Conquering Network Security Challenges in Distributed Enterprises

Read this SANS survey that shows how IT organizations don’t have the level of visibility they need to both detect and respond to threats in a timely manner.
  • 0
  • 1222

Security Considerations for Private vs. Public Clouds

The cloud movement presents a rare and momentous opportunity to revisit not only how we think about computing, but also how we think about information security. This whitepaper, written by the Cloud Security Alliance, provides an in-depth discussion of the security considerations for public and private clouds. Topics include business agreements, physical and virtual attack surfaces and most importantly, where do the security responsibilities lie.
  • 6
  • 2591

Next-Generation Security Platform for Cable Operators

MSOs are complex, diverse businesses that combine lowmargin, high-capital cost services (e.g. basic TV, data and voice) with aggressive growth businesses. In some respects MSOs look like utilities, while in other respects they are high-growth, leading-edge technology services companies. MSOs are aggressively investing in growth strategies that leverage their unique access and relationships with subscribers and business customers.
  • 3
  • 362

Next-Generation Data Center Security Implementation Guidelines

The Forrester Zero Trust Model (Zero Trust) of information security advocates a “never trust, always verify” philosophy in protecting information resources. Though the model has traditionally been applied to network communications, it is clear that today’s cyber threats warrant a new approach in which the Zero Trust model is extended to endpoints. This white paper outlines how Palo Alto Networks® Traps™ Advanced Endpoint Protection is an innovative technology that extends the Zero Trust methodology to your endpoint security.
  • 5
  • 3110

GlobalProtect Deployment Guide

Read how organizations can use Palo Alto Networks GlobalProtect to provide a secure environment for the increasingly mobile workforce.
  • 7
  • 14969

Breaking the Cyber Attack Lifecycle

The Enterprise Security Platform from Palo Alto Networks helps companies remain agile against advanced attacks and defend enterprises against cyber criminals.
  • 0
  • 4294

Zero Trust on the Endpoint

This white paper outlines how Palo Alto Networks Traps Advanced Endpoint Protection extends the Zero Trust methodology to your endpoint security.
  • 5
  • 5199

Traps Advanced Endpoint Protection Technology Overview

With today's growing cyber threats, you undoubtedly have multiple layers of security in place to ensure your data is protected. The problem is that the existing endpoint technologies are just not adequate, leaving you to spend much of your time trying to keep up with patches, then detecting, remediating, and often re-imaging systems when you should be preventing these breaches. This whitepaper will introduce you to a better way, Traps, Palo Alto Networks Advanced Endpoint Protection is not only a product like no other, but an entirely new category that is going to change the way you think about endpoint protection.
  • 4
  • 18971

Top 10 Zero-day Exploits of 2015: How to Prevent Security Breaches That Leverage Unknown Exploits

Threat actors who pursue the most effective means to circumvent existing endpoint security measures rely on exploits, especially those that leverage unknown software vulnerabilities (commonly referred to as “zero-day exploits”). Embedded in specially crafted data files and content, such as Adobe® PDF and Microsoft® Word documents, zero-day exploits subvert legitimate applications to carry out nefarious activities. Their ability to evade traditional antivirus solutions, and a lack of vendor security patches, often leave organizations with little in terms of preventive measures against zero-day exploits, which generally serve as the initial stage of a targeted attack. This paper provides a list of the Top 10 Zero-Day Exploits of 2015, offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns, and discusses three particularly effective zero-day exploits in brief case studies. The paper then introduces the reader to a technical solution that prevents security breaches which leverage zero-day exploits, including the Top 10 Zero-Day Exploits of 2015 that are listed in this document, without prior knowledge of the application vulnerabilities which they exploit. The solution safely enables organizations to continue the use of their applications regardless of the existence of zero-day exploits, the discovery of application vulnerabilities, or the deployment of security patches.
  • 4
  • 908
Displaying 181 to 210 of 266