Date

Displaying 31 to 60 of 173

SWIFT Mandatory and Advisory Security Controls

Learn how the Security Operating Platform provides layered protection from cyberattacks, and positions financial institutions for improved cyber hygiene to meet or even exceed the SWIFT customer security controls.
  • 0
  • 4336

EU Data Protection Compliance When Securing SaaS Applications

The purpose of this white paper is to clarify how Networks Aperture™ SaaS security service can be used in compliance with EU data protection requirements, including the upcoming EU General Data Protection Regulation.
  • 0
  • 924

Prevention-based Architecture

This document explains the methodology and capabilities Palo Alto Networks delivers to prevent successful attacks and protect our digital way of life.
  • 0
  • 4314

Defining the 21st Century Cybersecurity Protection Platform for ICS

In this paper Mario Chiock, Cybersecurity & Disruptive Technology Executive Adviser and Del Rodillas Senior Manager, SCADA and Industrial Controls Cybersecurity go through the nine core capabilities that define this 21st century security platform for industrial control systems.
  • 4
  • 4626

Applying VLAN Insertion in ICS/SCADA

Case studies on the Target® and recent Ukraine electrical grid attacks indicate that these attacks were containable or preventable with proper network segmentation.
  • 1
  • 901

AWS Reference Architecture

This guide provides a foundation for securing network infrastructure using Palo Alto Networks® VMSeries virtualized next generation firewalls within the Amazon Web Services (AWS) public cloud.
  • 4
  • 6575

Azure Reference Architecture

This document provides architectural guidance for solution architects and engineers who are familiar with the next-generation firewall but not Azure.
  • 2
  • 5634

VM-Series On Google Cloud Deployment Guidelines

Organizations are adopting Google® Cloud Platform to take advantage of the same technologies that drive common Google services. Many business initiatives, such as big data, analytics and machine learning, deployed on GCP allow you to leverage contextual data collected from billions of search engine data points. The power behind GCP, combined with agility and a global footprint, help you quickly deploy enterprise-class applications and services.
  • 2
  • 6910

Technical White Paper on VMware NSX and Palo Alto Networks VM-Series Integration

This technical document provides details of the VMware NSX and Palo Alto Networks integration, including descriptions of the components of the solution, and key use cases.
  • 4
  • 9029

Citrix NetScaler and Palo Alto Networks

This paper explains why combining two best-in-class solutions—the Citrix NetScaler application delivery controller (ADC) and the Palo Alto Networks Next-Generation Firewall (NGFW)—is the best approach for today’s enterprises to build a network capable of fully addressing cloud requirements for secure application delivery.
  • 0
  • 247

VM-Series for NSX: Implementation and Traffic Steering Guidelines

In today’s growing data center threat landscape, an effective cybersecurity strategy is imperative for software-defined data centers. VMware® and Palo Alto Networks® have partnered on a solution that leverages NSX™ to enable provisioning and seamless insertion of VM-Series next-generation firewall and advanced threat prevention in your software-defined data centers. Download this white paper to learn more about design considerations, recommendations and best practices for traffic steering while deploying VMware NSX and Palo Alto Networks VM-Series integrated solution.
  • 2
  • 1359

The Attacker’s Mindset: Insights into real-world attack campaigns

This paper examines the attacker’s mindset, first providing insights into the motivations and high-level methods shaping today’s threat landscape and accelerating the need for endpoint security technologies capable of preventing – not just detecting – both known and unknown threats.
  • 0
  • 1401

Palo Alto Networks : Addressing the Cybersecurity Skills Shortage with Behavioral Analytics

Overworked security staff, manual processes, and uncoordinated security tools can hamper security operations and tilt the odds in favor of cyber attacker
  • 0
  • 1169

Simplify PCI Compliance With Network Segmentation for airlines

PCI compliancy is mandatory for the airlines, the scope extends to all system components that are included in or connected to the Cardholder Data Environment (CDE).
  • 0
  • 228

The CISO Definitive Guide for Picking the NGFW That Works for You

It seems that nearly every day a major trusted brand is reporting a breach. The loss and impact felt by companies and individuals alike are significant, and IDC expects that lost business will be more tangible over time. A recent IDC survey of 2,500 consumers found that over three-quarters of respondents would be willing to switch providers if their data was lost to criminals. The size and scope of breaches is mind numbing, and CEOs, board members, and everyday citizens continue to ask, "How do we get better?"
  • 0
  • 271

Security Value Map

Download the report to read more about NSS Labs recommendation of Palo Alto Networks
  • 0
  • 444

Building a Scalable GlobalProtect Deployment

Protect your mobile workforce and network from internet-borne threats with a scalable GlobalProtect deployment.
  • 0
  • 617

Navigating Cybersecurity Challenges in Financial Services

Download the whitepaper to read more about how our next-generation security approach is better able to protect the highly targeted financial services industry.
  • 1
  • 429

6 Key Security Requirements for Next–Generation Mobile Networks

A new security approach is needed focusing on prevention, application-layer visibility, cost efficiency and automation.
  • 5
  • 690

Rethink Mobile Security Monetization

This paper for mobile network operators provides a framework for value and revenue opportunities across the entire subscriber base.
  • 2
  • 398

Reducing the Business Risks of Cyberthreats

Your approach to cybersecurity can enable your business to innovate or introduce unnecessary risk. Consider reducing the business risks of cyberthreats.
  • 2
  • 613

Prevent Credential Theft in Healthcare

Theft and abuse of stolen passwords is one of the oldest attacks in the book, yet it remains highly effective. Adversaries can use stolen credentials to impersonate valid users, allowing them to bypass the entire attack lifecycle, move uninterrupted throughout their target organization’s network and shift to the abuse of credentials from within. You can prevent credential theft with Palo Alto Networks Next-Generation Security Platform by stopping credential leakage, blocking access to phishing sites and enforcing multi-factor authentication security policy in the network.
  • 0
  • 898

Secure and Protect Medical Devices in Healthcare

Read this whitepaper to understand how Palo Alto Networks security platform provides best-in-class security for medical devices in a healthcare environment.
  • 2
  • 650

Fundamentals of Secure Cloud Adoption

The challenge of moving to the cloud is how to protect applications and data without adding complexity or cost. Read Securely Enabling Cloud Adoption for solutions.
  • 0
  • 521

10 Things to Test In Your Future NGFW

Find out what network admins need to know to improve perimeter defense
  • 0
  • 224

Architecting the Modern Campus Network

Learn on the promise of delivering a more secure campus network that is adaptive to threats, improves user experience, and is easier to configure and manage.
  • 0
  • 997

Automating VM-Series Deployments with Terraform and Ansible

Download this whitepaper and get started with Terraform and Ansible.
  • 0
  • 1061

Automotive Security Reference Blueprint

Please register for a UTD on our Next Generation Firewall
  • 0
  • 165

Extending Networks Into the AWS Cloud

Learn how Palo Alto Networks and Accenture help you migrate to the cloud.
  • 1
  • 164

How Traps Helps Financial Institutions Prevent Sophisticated Threats

As the financial services industry undergoes a digital transformation to streamline operations, become more competitive, and remain relevant with their customers, they face increasing volume of cyber threats. Attackers continue to be tempted by the vast quantities of easily monetizable personally identifiable information (PII).
  • 0
  • 994
Displaying 31 to 60 of 173