Date

Displaying 181 to 187 of 187

Security Operations Centers: Keeping a Trusted Eye On Today’s Government Networks

This white paper describes a structured approach toward the formation of a government security operations center (SOC) that enables organizations to integrate this capability into their overall Information Security Management System (ISMS) and align with many of the requirements introduced by ISO/IEC 27001:2013.

  • 0
  • 655

Killing Advanced Threats in Their Tracks: An Intelligent Approach to Attack Prevention

This paper explains the many steps in the kill chain, along with how to detect unknown attacks by integrating intelligence into sensors and management consoles.

  • 1
  • 277

Cybersecurity Imperatives in Financial Services

Read how financial institutions around the world can minimize risks presented by cybercriminals.

  • 0
  • 820

Palo Alto Networks & Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Read how Palo Alto Networks strategic partnership with Splunk offers joint customers better, risk-informed decision-making.

  • 0
  • 664

Traps PCI Compliance

The theft of credit card data continues to grow at an alarming rate. It is costly to credit card companies and merchants, and it undermines consumer confidence. The Payment Card Industry has developed the PCI Data Security Standard (PCI DSS), which includes 12 requirements for protecting cardholder data. Despite substantial investments made in securing their networks, organizations are realizing that being PCI compliant does not mean an enterprise is protected against advanced cyberattacks.

  • 1
  • 3749

Traps Advanced Endpoint Protection Named a Gartner Visionary

Gartner has recognized Traps advanced endpoint protection as a Visionary among endpoint security products. Read the full report.

  • 3
  • 5469

Next-Generation Firewalls – Restoring Effectiveness Through Application Visibility and Control

This paper explores a combination of ongoing and emerging factors that are exposing a variety of deficiencies with current firewall designs. These issues and flaws are then used to establish the criteria that define the ideal solution: a next-generation firewall that incorporates application inspection at its core.

  • 1
  • 944
Displaying 181 to 187 of 187