Date

Displaying 181 to 210 of 270

Cybersecurity For Dummies

Next-generation cybersecurity provides visibility, control and integration of threat‐prevention disciplines needed to find and stop security threats.
  • 1
  • 5252

Tech Tips User-ID

Secure your organization’s risk posture with employee identification beyond IP address recognition. As new security policies are introduced and others are circumvented, User-ID ensures stable visibility amid network changes.
  • 3
  • 1870

Traps for Windows Server 2003

Learn how businesses can keep Windows Server 2003 systems compliant and secure, even after EOS, by using Palo Alto Networks Traps Advanced Endpoint Protection.
  • 1
  • 2687

Best Practices

Implementing a central management system to view and preside over your many firewall deployments can give you full visibility into your entire network and help you to orchestrate detection and protection based on real-time intelligence. This chapter highlights Palo Alto Networks’ methodology for implementing Panorama and our best practices for managing multiple firewalls.
  • 1
  • 2079

Secure Windows XP with Traps

Windows® XP end-of-life is a critical threat exposure for XP users. Security was one of the major drivers for Microsoft’s decision to end support for this operating system. No doubt, the intention was to urge enterprises to upgrade their systems. In reality, however, Windows XP systems are still deployed in many organizations. This technical brief outlines how Traps secures endpoint systems that run Windows XP, while enabling you to manage your XP upgrade policy at your own pace as you maintain acceptable levels of security and compliance.
  • 1
  • 1712

First Principles For Network Defenders: A Unified Theory For Security Practitioners

First principles in a designated problem space are so fundamental as to be self-evident; so true that no expert in the field can argue against them. Experts use them like building blocks to derive everything else that is worth -knowing in the problem domain. In this paper, we propose that the first principle for all network defenders is to prevent high-risk material impact to the organization.
  • 1
  • 1304

Traps HIPAA Compliance

This technical brief outlines how Traps secures endpoint systems that run Windows XP, while enabling you to manage your XP upgrade policy at your own pace as you maintain acceptable levels of security and compliance.
  • 4
  • 2422

NSS Labs 2016 NGFW Test Report

The 2016 NSS NGFW Product Analysis Report shows the Palo Alto Networks PA-7050 achieving a 95.8% security effectiveness rating and successfully passing all security tests.
  • 3
  • 13908

Network Security in Virtualized Datacenters For Dummies

To realize the benefits of virtualization you must adapt your security architecture to address new challenges, and today's application and threat landscape. 2nd Edition.
  • 0
  • 964

Securing the Unpatchable

This document presents two case studies that discuss the security, risk and compliance ramifications of operating unpatchable systems and applications
  • 3
  • 1141

Scarlet Mimic

Unit 42, the Palo Alto Networks® threat intelligence team, recently released a report identifying and tracking “Scarlet Mimic,” a series of sophisticated cyber espionage attacks which targeted Uyghur and Tibetan activists, their supporters, and entities that collect information on such groups. The attacks, which date back to 2009, have evolved over the past six years to compromise users of Windows®, Mac® OS X® and Android™ devices, indicating that they are the work of a well-resourced, sophisticated and persistent adversary group.
  • 6
  • 781

Best Practices: Inspecting Encrypted Traffic

This document outlines Palo Alto Networks methodology for selectively decrypting traffic and our best practices for balancing risk and user privacy.
  • 2
  • 1657

Uncover SSL-Encrypted Attacks in Government Networks

A comprehensive security strategy for federal and other government agencies requires in-depth analysis of encrypted traffic to detect and prevent hidden attacks and data leakage. As more Internet traffic is encrypted, increasing numbers of attackers, including state-sponsored actors, are using this technology to hide malware, and botnet-based command and control traffic to exfiltrate data and escalate the likelihood of successful attacks. Palo Alto Networks Next-Generation Security Platform provides a combination of advanced capabilities to prevent undesired applications and malicious content, including the decryption and scrutinization of encrypted communications, along with Hardware Security Module (HSM) support for enhanced performance and security of certificate and key management.
  • 1
  • 669

Selective SSL Decryption for Threat Prevention

This paper lays out a basic approach that you can use to strike an appropriate balance between security and performance by selectively decrypting and inspecting SSL traffic based on policy.
  • 0
  • 7316

Moving Beyond Proxies

Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy security products, providing limited security functionality against today’s advanced threats. Once upon a time, Proxies fulfilled a need traditional firewalls could not meet: visibility into web traffic starting with categorization of HTTP and later HTTPS traffic. However, little to no emphasis was put on traffic and the vast number of applications utilizing other avenues of accessing corporate networks. Proxy vendors still over-emphasize the importance of HTTP and HTTPS traffic while downplaying the role of applications utilizing other entry points in cyber attacks. This whitepaper highlights the short comings of proxies, and showcases how a next generation security platform can provide faster, simpler and more comprehensive security. This white paper is available in Portuguese.
  • 7
  • 3565

Heart of the Network – Data Center Defense

Feds need to protect the data center from internal and external threats as they transition to cloud environments. How are they managing the transition?
  • 0
  • 312

Managed Network Security Services

Evolution of Next-Generation Managed Network Security Services For almost twenty years, the centerpiece of any corporate security strategy has been the firewall. As soon as there were appliances, there were services providers who offered to manage the firewall.
  • 5
  • 625

Navigating the Digital Age

Read tips about protecting our digital way of life and the future of prevention from Mark McLaughlin, CEO of Palo Alto Networks.
  • 5
  • 1467

Application Usage and Threat Report

The AUTR provides visibility into the real-world threat and application landscape, helping security teams to understand how adversaries are attempting to attack organizations around the world and build proactive, actionable controls. Built by the Unit 42 threat research team, the report correlates data from more than 7,000 enterprise organizations, providing broad visibility into critical trends.
Santa Clara
  • 30
  • 9095

Single Pass Architecture

With the single-pass architecture, Palo Alto Networks makes it possible to add a function to a next-generation firewall, instead of adding another security device, and in such a way that the integrated approach actually offers cybersecurity benefits and advantages that discrete devices cannot.
  • 6
  • 14000

Governance of Cybersecurity 2015 Report

Palo Alto Networks joined Financial Services Roundtable and Forbes as sponsors of the Georgia Tech Governance of Cybersecurity: 2015 Report in order to increase the awareness among senior leaders on the importance of cybersecurity risk management and proper investments in the right people, process and technologies need to prevent cyber threats.
  • 0
  • 1896

APP-ID Tech Brief

This tech brief provides an overview of our patented App-ID classification technology that determines the exact identify of applications, irrespective of port, protocol, evasive tactic, or SSL encryption.
  • 4
  • 14977

Cybersecurity Buyers Guide

The Cybersecurity Buyer’s Guide outlines the 10 things you need to know to choose a cohesive cybersecurity solution.
  • 0
  • 974

Real-Time Cyberthreat Detection

Today our organizations remain highly vulnerable to modern cyberattacks, which have grown increasingly stealthy and persistent against traditional defenses. Serious incidents are not being detected in time, or at all, because security teams are either too dependent on narrow and outdated threat data, or they have no means to take action quickly, at scale, against all of the threat intelligence available to them
  • 1
  • 2151

Palo Alto Networks in the Data Center

This paper examines modern endpoint protection, describing how the evolution of malware has created a need for a modernized approach to endpoint protection. It also looks at the role of Palo Alto Networks Traps offering in this critical market.
  • 0
  • 1739

Conquering Network Security Challenges in Distributed Enterprises

Read this SANS survey that shows how IT organizations don’t have the level of visibility they need to both detect and respond to threats in a timely manner.
  • 0
  • 1272

Security Considerations for Private vs. Public Clouds

The cloud movement presents a rare and momentous opportunity to revisit not only how we think about computing, but also how we think about information security. This whitepaper, written by the Cloud Security Alliance, provides an in-depth discussion of the security considerations for public and private clouds. Topics include business agreements, physical and virtual attack surfaces and most importantly, where do the security responsibilities lie.
  • 6
  • 2695

Next-Generation Security Platform for Cable Operators

MSOs are complex, diverse businesses that combine lowmargin, high-capital cost services (e.g. basic TV, data and voice) with aggressive growth businesses. In some respects MSOs look like utilities, while in other respects they are high-growth, leading-edge technology services companies. MSOs are aggressively investing in growth strategies that leverage their unique access and relationships with subscribers and business customers.
  • 3
  • 389

Next-Generation Data Center Security Implementation Guidelines

The Forrester Zero Trust Model (Zero Trust) of information security advocates a “never trust, always verify” philosophy in protecting information resources. Though the model has traditionally been applied to network communications, it is clear that today’s cyber threats warrant a new approach in which the Zero Trust model is extended to endpoints. This white paper outlines how Palo Alto Networks® Traps™ Advanced Endpoint Protection is an innovative technology that extends the Zero Trust methodology to your endpoint security.
  • 5
  • 3157

GlobalProtect Deployment Guide

Read how organizations can use Palo Alto Networks GlobalProtect to provide a secure environment for the increasingly mobile workforce.
  • 7
  • 15644
Displaying 181 to 210 of 270