Date

Displaying 31 to 60 of 156

Secure and Protect Medical Devices in Healthcare

Read this whitepaper to understand how Palo Alto Networks security platform provides best-in-class security for medical devices in a healthcare environment.
  • 2
  • 483

Fundamentals of Secure Cloud Adoption

The challenge of moving to the cloud is how to protect applications and data without adding complexity or cost. Read Securely Enabling Cloud Adoption for solutions.
  • 0
  • 460

10 Things to Test In Your Future NGFW

Find out what network admins need to know to improve perimeter defense
  • 0
  • 134

Automating VM-Series Deployments with Terraform and Ansible

Download this whitepaper and get started with Terraform and Ansible.
  • 0
  • 764

Automotive Security Reference Blueprint

Please register for a UTD on our Next Generation Firewall
  • 0
  • 87

Architecting the Modern Campus Network

Learn on the promise of delivering a more secure campus network that is adaptive to threats, improves user experience, and is easier to configure and manage.
  • 0
  • 873

Extending Networks Into the AWS Cloud

Learn how Palo Alto Networks and Accenture help you migrate to the cloud.
  • 1
  • 107

Navigating Healthcare’s Biggest Cybersecurity Challenges in 2018

A recent HIMSS Analytics survey, commissioned by Palo Alto Networks, surfaces biggest challenges facing healthcare.
  • 0
  • 861

Next Generation Intrusion Prevention System Test Report

NSS Labs performed an independent test of the Palo Alto Networks PA-5250 v8.0.3-h4. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Intrusion Prevention System (NGIPS) Test Methodology v3.1 available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Palo Alto Networks’ participation.
  • 0
  • 1201

The Total Economic Impact™ Of Palo Alto Networks Traps

The Total Economic Impact™ Of Palo Alto Networks Traps Cost Savings And Business Benefits Enabled By Traps Advanced Endpoint Protection.
  • 0
  • 821

Enabling Digital Transformation in e-Health Through More Effective Endpoint Security

Establishing effective IT security defenses is a necessity for the entire healthcare industry, from the largest health systems and payers to single-physician practices, research institutions, and medical device developers.
  • 0
  • 202

Global and Regional WildFire Clouds

WildFire® cloud-based threat analysis and AutoFocus™ contextual threat intelligence services are two of the powerful core components fueling Palo Alto Networks Next-Generation Security Platform to deliver better protection. Together, these cloud-delivered security services provide the industry’s most advanced analysis and prevention engine for highly evasive zero-day exploits and malware.
  • 0
  • 249

Traps Advanced Endpoint Protection AV-Comparatives Award

AV-Comparatives, the independent organization that tests and assesses antivirus (AV) software, announced the completion of its 2017 “Comparison of Next-Generation Security Products” and presented Traps advanced endpoint protection with its “Approved” award. The firm conducted a series of malware protection and exploit prevention tests on Traps during September and October 2017. Download the report to view the results of this test.
  • 1
  • 3692

Automate the Deployment of Secure Developer VPCs

This eBook explores the unique partnership between Palo Alto Networks and REAN Cloud, and how the two companies work together to help you adopt a DevSecOps mindset and eliminate the friction between your development and security teams
  • 0
  • 128

How to Secure Your Network from Ransomware

Find out what network admins need to know to improve perimeter defense
  • 1
  • 272

Mac Endpoints Move Into the Enterprise and into the Crosshairs of Hackers

When built on a next-generation security platform, this approach can provide full context and intelligence, enabling the security team to address the unique requirements of the Mac while providing protection for all endpoints.
  • 0
  • 211

Rethink Network Availability

Mobile network operators are now facing new malware-based incidents that threaten network availability as well as subscriber confidentiality.
  • 1
  • 310

5 Critical Mistakes When Evaluating A Next-Gen Firewall

The firewall is the foundation of enterprise data security. All firewalls are not created equal, though and no two organizations have the same needs, risks and data flow. You need a firewall to protect against today’s advanced attacks while preserving the performance and uptime critical to foster innovation and growth. If you’re in the market for a new firewall, we’ll assume you understand the many benefits of next-generation firewall technology, and that a next-generation firewall is the way to go. But how can you be sure you’re choosing the right next-generation firewall to meet your organization’s specific networking, performance and security needs for the present and the future?
  • 0
  • 236

Use Case: Apply Network Segmentation to a Traditional Data Center

Read how one of the largest financial institutions in the world created network segmentation with the Palo Alto Networks Next-Generation Security Platform
  • 2
  • 355

Government: Securing Your Public Cloud Deployment

This paper explains how Palo Alto Networks VM-Series can provide threat prevention across your AWS GovCloud or C2S environments.
  • 3
  • 509

Securing the Mobile Workforce

In recent years, cybersecurity has emerged as one of the top concerns for the leader- ship of business and government organi- zations around the world. The troubling number of high-profile attacks targeting some of the largest companies in the world has led many to question whether adequate measures are in place on their own networks. Sophisticated attackers are employing new techniques to penetrate a network, and using methodologies to avoid detection by masking their activities in legitimate application traffic.
  • 29
  • 2699

Financial Services Use Case: Protect IaaS Hybrid Cloud

Download our use case to learn how Palo Alto Networks can help your organization protect IaaS hybrid clouds in financial services.
  • 1
  • 342

Government Use Case: Decrypt SSL and SSH Traffic to Disrupt Attacker Communications and Theft

SSL-encrypted traffic is growing in government networks, resulting in multiple blind spots for security monitoring tools and creating an opportunity for attackers to hide malware. Many governments are considering or mandating the decryption of encrypted communications moving in and out of their networks. While traditional approaches favor dedicated SSL decryption appliances, these add latency, costs and increase time to resolution for security incidents. Download our use case “Decrypt SSL and SSH Traffic to Disrupt Attacker Communications and Theft” to learn how Palo Alto Networks Next-Generation Security Platform delivers an integrated approach to SSL decryption that streamlines security operations, improves network performance, and enables agencies to identify and prevent encrypted threats swiftly.
  • 0
  • 227

2017 Gartner Magic Quadrant Leader - It Just Feels Right

Gartner’s 2017 Magic Quadrant for Enterprise Network Firewalls has been released. Palo Alto Networks is proud to be positioned in the leader quadrant for the sixth straight year.
  • 0
  • 640

Security Reference Blueprint for Retail

This white paper outlines key security principles for modern retail networks and a framework that reduces operational demands on IT and security teams while improving security and control.
  • 0
  • 336

The “Patient Zero” Problem and the Need for Modern Endpoint Protection

This paper from IDC, a premier global provider of market intelligence, examines modern endpoint protection, describing how the evolution of malware has created a need for a modernized approach to endpoint protection.
  • 1
  • 3047

Palo Alto Networks Next-Generation Security Platform Mapping to NIST Cybersecurity Framework

Since the release of the Cybersecurity Framework by the U.S. National Institute of Standards and Technology (NIST), organizations worldwide have implemented the framework to better understand and manage cyber risk. Download this white paper to explore the benefits of the CSF and how Palo Alto Networks Next-Generation Security Platform capabilities map to and fulfill CSF subcategories.
  • 0
  • 412

Streamline PCI Compliance With Next-Generation Security

Establishing, maintaining, and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for everyone in payment card processing—including merchants, processors, acquirers, issuers, and service providers, as well as companies that store, process or transmit cardholder data (CHD) and/or sensitive authentication data. With approximately three hundred individual requirements to address, organizations subject to the standard have their work cut out for them. This white paper will explain how Palo Alto Networks® Next Generation Security Platform allows PCI system operators to significantly enhance security and exceed PCI DSS requirements through segmentation and mitigating risks of malware and unpatched systems.
  • 2
  • 3387

PCI Use Case: Simplify PCI Compliance With Network Segmentation

Establishing, maintaining and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for all entities involved in payment card processing – including merchants, processors, acquirers, issuers, and service providers, as well as all other entities that store, process or transmit cardholder data (CHD) and/or sensitive authentication data (SAD). For all system components included in or connected to the Cardholder Data Environment (CDE), organizations must comply with more than three hundred requirements. It is in every organization’s best interest, therefore, to take advantage of network segmentation provisions stated in the PCI DSS to effectively isolate their CDE and thereby decrease the amount of infrastructure that is considered in scope.
  • 0
  • 1179

网络安全 平台必做的 5 件事

网络安全的传统方法侧重于恶意活动的检测和补救,导致操作环境变得复杂化,而在当前随着攻击数量以及复杂性的增加,凭借这种操作环境无法帮助组织实现抵御攻击的目的。为了防止攻击得逞,组织必须采用一个依靠原生设计的技术来阻止已知和未知威胁的网络安全平台。
  • 0
  • 836
Displaying 31 to 60 of 156