Microsoft Exchange Server Exploit response
  • Network Security
  • Cloud Security
  • Security Operations
  • More
  • Get support
  • Sign In
  • Get Started

How SOAR is transforming threat intelligence

This white paper talks about how we need to transform threat intelligence by integrating it into an extensible SOAR platform enabling analysts to take full control over their threat intelligence combined with the power of proven SOAR capabilities.
See more

Security in Datacenter Transformation

Eric Hansleman Chief Analyst at 451 Research shares new approaches for keeping your rapidly changing data center and cloud environments secure.
See more

Date

  • Last week
  • Last 30 days
  • Last 6 months
  • Last year
Displaying 361 - 390 of 397
  • 1
  • 2
  • …
  • 12
  • 13
  • 14

White Paper

Defense in Depth: 5 Imperatives for Governments to Defeat APTs

Defense in Depth does not mean more security tools. The key to thwarting advanced attacks in today’s government networks is to reduce the attack surface to increase visibility to what matters: the anomalies in your network, across the kill chain.
August 8, 2014

White Paper

Cybersecurity Imperatives in Financial Services

Read how financial institutions around the world can minimize risks presented by cybercriminals.
July 18, 2014

White Paper

Palo Alto Networks & Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Read how Palo Alto Networks strategic partnership with Splunk offers joint customers better, risk-informed decision-making.
June 23, 2014

Article

Assuming a Platform Approach to Cybersecurity

Pamela Warren, Director of Government and Industry Initiatives at Palo Alto Networks, shares her thoughts on why a platform approach is critical to effective cybersecurity within the government space. Warren explains that government organizations make four common mistakes when trying to secure their information systems. The most basic error, she said, is failing to have visibility to what is happening on your network: "What we're seeing is that many organizations are unaware of what applications they are even running on their network." This ends up being a major barrier to effective cybersecurity because it leaves unseen gaps in security for attackers to target.
June 23, 2014

White Paper

Palo Alto Networks and NetWitness

Palo Alto Networks and NetWitness have partnered to provide unified security event analysis and resolution. The combined solution validates application execution, speeds incident investigation and eliminates wasted time navigating disparate systems.
June 23, 2014

White Paper

Palo Alto Networks and Solera Networks

Palo Alto Networks and Solera Networks are combining next generation firewalls with active network forensics to enable security administrators to “see” critical attacks, uncover their root cause and quickly adapt their infrastructure to prevent recurrence and mitigate risk.
June 23, 2014

White Paper

Palo Alto Networks and Tufin

As organizations deploy multiple security solutions to safeguard corporate networks from wide-ranging threats, it becomes increasingly difficult to perform labor-intensive and error-prone tasks such as risk analysis, change management, auditing and compliance checks. Palo Alto Networks and Tufin® have partnered to help customers increase operational efficiency and reduce risk by intelligently automating firewall policy management.
June 23, 2014

White Paper

Palo Alto Networks and Garland Technology Partnership

When customers deploy inline appliances on mission critical network segments, they have the option to mitigate the risks of scheduled or unscheduled downtime of an inline appliance for configuration changes, maintenance, or repair scenarios by adding a tap/bypass switch to maintain network continuity. Palo Alto Networks has partnered with Garland Technology to provide the ability to install Palo Alto Networks next-generation firewall inline without compromising network uptime.
June 23, 2014

White Paper

Palo Alto Networks and MobileIron

Intelligent tablets and smartphones are now the primary personal communications and computing platform for Mobile IT business operations and apps. As a result, IT needs to consider how to provide secure network access to both enterprise and end user owned mobile devices. Moreover, an exponential increase in the number and usage of mobile apps is creating new threat vectors that must be addressed by IT to safeguard mobile devices and prevent data loss.
June 23, 2014

White Paper

Palo Alto Networks and AlgoSec Partnership

As organizations deploy multiple security solutions to safeguard corporate networks from a wide range of threats, they are realizing that the traditional manual process of performing risk analysis, change management, auditing and compliance are labor-intensive and error-prone. To increase operational efficiency and minimize risk, Palo Alto Networks and AlgoSec have partnered to reduce network security policy complexity by intelligently automating firewall policy management, from optimization to risk analysis to change management.
June 23, 2014

White Paper

Palo Alto Networks and Aruba Networks

Aruba Networks and Palo Alto Networks have partnered to provide best of class content security for guest and employee owned mobile devices that are now commonplace on enterprise networks. With the certified solution, enterprise IT departments can now securely enable Bring Your Own Device and Guest Access initiatives, while maintaining compliance. Aruba’s Wi-Fi network and Palo Alto Networks’ next-generation firewalls share user, device and application information to monitor and enforce application usage policies on smartphones, tablets and laptops.
June 23, 2014

White Paper

Palo Alto Networks and Skybox

Identifying security risks proactively and systematically in a large network is like looking for a needle in a haystack. To address the challenge, it is imperative that the network firewall, as a first line of defense, is optimally configured for security, continuous compliance and high performance. Palo Alto Networks and Skybox® Security have partnered to monitor and prevent security or compliance gaps in an enterprise firewall deployment, and minimize overall firewall management costs.
June 23, 2014

White Paper

Palo Alto Networks and Net Optics

Palo Alto Networks and Net Optics have partnered to deliver a highly reliable and transparent threat prevention solution. In a high-availability network, the loss of a single device or power source must not be allowed to disrupt network connectivity. Adding a network security device to protect the network should not introduce any single point of failure. Combining Palo Alto Networks next-generation firewall with Net Optics’ Bypass Switches provides the necessary full threat prevention transparently and without reducing reliability.
June 23, 2014

White Paper

Controlling Browser-based Filesharing on University Networks

Browser-based filesharing applications have the potential to become the next P2P application category in terms of illegal copyrighted information. Learn how Palo Alto Networks provides your university with the ability to identify, monitor and analyze the use of browser-based filesharing applications traversing your network.
June 23, 2014

White Paper

Palo Alto Networks and NitroSecurity

Palo Alto Networks and NitroSecurity have partnered to deliver unprecedented visibility, analysis and correlation of security events, user activity, and application usage. Palo Alto Networks next-generation firewalls capture rich user and application context providing increased control of applications and prevention of advanced threats.
June 23, 2014

White Paper

Palo Alto Networks and FireMon

Palo Alto Networks and FireMon have partnered to jointly deliver a total lifecycle security solution for enterprise and service provider customers. FireMon provides software that facilitates change management and control of Palo Alto Networks firewalls, increasing management visibility and reducing the total cost of making changes.
June 23, 2014

White Paper

Palo Alto Networks and Q1 Labs

Palo Alto Networks and Q1 Labs have partnered to jointly deliver the only next generation security intelligence and control solution. QRadar’s best-in-class data collection, analysis, correlation and auditing capabilities coupled with Palo Alto Networks unique application, user and threat control enable organizations to quickly and easily implement a next-generation security management program to meet current and emerging network security challenges. The combined solution enables security professionals to comprehensively identify, defend against, and remediate exploits and policy violations.
June 23, 2014

White Paper

Palo Alto Networks and Splunk

Hand in hand with the deployment of a robust security architecture is the need for a monitoring and response system that allows enterprises to continuously monitor and process security data efficiently and proactively act upon this data if suspicious network activity is found. Palo Alto Networks has partnered with Splunk® to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis.
June 23, 2014

White Paper

Palo Alto Networks and Lancope

Performance and accountability of enterprise IT infrastructure has shifted from an incidental focus to one that requires real-time visibility for proactive monitoring and compliance. Traditional network security devices posed a blind spot for network monitoring and management solutions for basic network parameters such as NAT tables and traffic sessions.
June 23, 2014

White Paper

User-ID Tech Brief

Overview of our User-ID technology that can gather user identity from multiple sources including VPNs, WLAN controllers, captive portals, directory servers, proxies and more.
June 23, 2014

White Paper

Managed Security Services Solution Brief

Demand for managed security services is on the rise as many enterprises and governments struggle to contend with an increasingly complex threat landscape, a shortage of skilled personnel, and the need to rapidly adapt to dynamic business conditions while still keeping security costs under control.
June 23, 2014

White Paper

Palo Alto Networks and Nordic Edge

Palo Alto Networks and Nordic Edge have partnered to deliver a variety of different easy-to-use, reliable, and strong authentication methods.
June 23, 2014

White Paper

Palo Alto Networks and Gigamon

Palo Alto Networks and Gigamon have partnered to deliver a highly reliable and transparent threat prevention solution. In a high-availability environment, the loss of a single device or power source cannot be allowed to jeopardize network connectivity. The addition of a network security device to protect the network cannot introduce any single points of failure. The combination of the Palo Alto Networks next-generation firewall with GigaVUE bypass functionality provides full threat prevention, transparently and with no reduction in reliability.
June 23, 2014

White Paper

Palo Alto Networks and Avaya Partnership

Palo Alto Networks and Avaya™ have partnered to provide high-performance next-generation security solutions for data center networks. The mission critical data centers of today have no tolerance for disruptions in throughput or availability. At the same time, the threats imposed on data centers by modern malware require a security solution that has next-generation firewall intelligence.
June 23, 2014

White Paper

Palo Alto Networks and Network Critical

Learn how the Network Critical’s tap/bypass switch optimizes full-functionality of the Next-Generation Firewall without impacting latency or availability.
June 23, 2014

White Paper

Palo Alto Networks and Plixer

Performance and accountability of Enterprise IT infrastructure has shifted from an incidental focus to real-time visibility for proactive monitoring and compliance mandates. Network security devices have traditionally posed a blind spot for network monitoring and management solutions by typically restricting output to basic network parameters such as NAT tables and traffic session. Palo Alto Networks breaks this barrier by providing unprecedented visibility of user and application usage information via Netflow, the industry standard protocol for network monitoring. Plixer’s™ Scrutinizer software collects and analyzes Netflow data to monitor and report on overall health of the network.
June 23, 2014

White Paper

Palo Alto Networks and Arista Networks

Palo Alto Networks and Arista Networks have partnered to offer the highest performance next-generation firewall implementation in the industry. The modern data center has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network must be able to meet those demands. The combination of Arista Networks’ Datacenter Switches along with Palo Alto Networks’ next-generation firewalls provides unmatched security in high-performance data centers without impacting throughput.
June 23, 2014

White Paper

Palo Alto Networks and SafeNet

As more and more daily business practices are conducted online, organizations face a growing challenge of ensuring that only authorized users may carry out transactions and access its most sensitive online resources. Moreover, businesses must protect access to network and web-based applications amid a rapidly changing security landscape of complex identity management—especially resulting from proliferation of mobile devices. Palo Alto Networks is partnering with SafeNet to provide a multi-factor authentication solution to protect user identities.
June 23, 2014

White Paper

Palo Alto Networks and Enterasys Partnership

Enterprise Mobility and BYOD trends are causing significant disruption to traditional network security practices. The growth and diversity of mobile device usage combined with the requirement of anytime, anywhere access to applications and data, has presented significant operational challenges and security risk to the IT organization. Typical legacy enterprise LAN infrastructures were not architected with adequate management, visibility, and awareness necessary to adapt to today’s application security and mobile provisioning requirements.
June 23, 2014

White Paper

Verizon and Palo Alto Networks: Partnering for True Next-Generation Security Solutions

Verizon and Palo Networks have partnered to offer you the most advanced security technology combined with world-leading managed services.
June 23, 2014
Displaying 361 - 390 of 397
  • 1
  • 2
  • …
  • 12
  • 13
  • 14

Be the first to know.

As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
Subscription Reward

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube
Create an account or login

© 2021 Palo Alto Networks, Inc. All rights reserved.