Date

Displaying 61 to 90 of 156

网络安全 平台必做的 5 件事

网络安全的传统方法侧重于恶意活动的检测和补救,导致操作环境变得复杂化,而在当前随着攻击数量以及复杂性的增加,凭借这种操作环境无法帮助组织实现抵御攻击的目的。为了防止攻击得逞,组织必须采用一个依靠原生设计的技术来阻止已知和未知威胁的网络安全平台。
  • 0
  • 837

Protecting the Extended Perimeter with GlobalProtect Cloud Service

Your Perimeter Is Everywhere. The world you need to secure is undergoing tremendous transformation. Global expansion, mobile workforces and cloud computing are shifting the location of your applications, data and users. These changes introduce new opportunities for business, but they also create a set of cybersecurity risks. These tectonic shifts in location strain an organization’s ability to protect data and stop threats consistently. The mandate for security has not changed, but the ability to deliver protection at each location is at a crossroads. Many organizations, faced with the rising costs of extending the perimeter using conventional methods, are left with few other choices. These consequences place organizations at risk. It is important to understand where the risks lie to evaluate what must be done to bring security back into balance.
  • 0
  • 3150

Apply Network Segmentation in the Virtualized Data Center

Read how Palo Alto Networks applies network segmentation to increase security and protect applications and data in a virtualized data center.
  • 0
  • 354

Machine Learning and Endpoint Security

The most promising weapon in the endpoint security arsenal is machine learning. Read how it quickly learns, makes instant decisions and rapidly prevent threats.
  • 1
  • 1252

How the Next-Generation Security Platform Contributes to GDPR Compliance

Palo Alto Networks Next-Generation Security Platform can help with security and data protection efforts related to GDPR compliance by securing personal data.
  • 0
  • 2877

Healthcare Use Case: Protecting SaaS-based Applications

Cloud-based SaaS applications like Box.com and Google Drive provide easy file sharing for hospital staff but also pose risks. Read on for details.
  • 0
  • 406

Comprehensive Data Security in the Cloud

This white paper outlines three steps organizations can follow to effectively secure business-critical data in the cloud.
  • 0
  • 690

Campus in the Cloud

Palo Alto Networks IT Campus in the Cloud approach reduces office build times and enables branch offices to leverage local internet and cloud services.
  • 0
  • 406

Rethink Your Strategy to Defeat Evasive Attacks

Understanding evasive malware and effective strategies for preventing this emerging threat type can protect your organization against financial, operational, legal, regulatory and compliance risks.
  • 2
  • 987

Traps for SCADA

Learn why Palo Alto Networks Traps is ideal for securing SCADA/ICS environments providing superior protection with minimal disruptions.
  • 5
  • 2540

The Next Board Problem: Automatic Enterprise Security Orchestration — A Radical Change in Direction

Commercial boards and senior government officials may be the only groups capable of kick-starting this new and necessary direction in the evolution of cybersecurity...
  • 0
  • 361

Cloud Adoption Risk and Compliance

Public cloud adoption poses risks. Senior leaders should understand and manage those risks in a way that is in line with the organization’s risk appetite.
  • 0
  • 333

Security Reference Blueprint for Financial Services

Learn how the Security Reference Blueprint for Financial Services IT enables institutions to prevent advanced threats without disrupting vital operations.
  • 1
  • 1246

Protect IOT Opportunity With Network-Based Security

Read how Palo Alto Networks provides advanced protects service provider networks, IoT systems, and interconnected networks and infrastructure.
  • 0
  • 1039

The Need for a Next-Generation Platform Approach in Mobile Networks

Read how Palo Alto Networks that helps mobile operators get ahead of cybercriminal capability and urgent mobile operator pain points.
  • 0
  • 386

Security Reference Blueprint for K-12 Education

The Security Reference Blueprint for K-12 Education suggests a framework for existing infrastructure and reduces operational demands on IT and security teams.
  • 0
  • 375

Security Reference Blueprint for Higher Education

This blueprint enables education security and IT pros to prepare to meet new and emerging technological challenges while reducing security threats.
  • 0
  • 553

Understanding the Role of Stolen Credentials in Data Breaches

Attackers love easy ways to get into your network, making credentials theft through phishing a preferred method for attacks. Learn how to stop them here.
  • 0
  • 192

Security Reference Blueprint for Healthcare IT

The Security Reference Blueprint for Healthcare IT enables organizations to protect patient care and patient data while reducing the security threats.
  • 21
  • 1096

Security Platform for Financial Services

Read how thousands of banks, institutional investors, asset managers, broker-dealers and financial institutions across the globe prevent successful cyberattacks.
  • 0
  • 2184

Actionable Threat Intelligence

This document explores and highlights the capabilities of Palo Alto Networks network security management solution, and its ability to make critical information visible and actionable.
  • 25
  • 12971

Network Security Management Buyers Guide

Is network security management right for you? This guide will help you decide whether to deploy a network security management product.
  • 29
  • 5222

A Modern Framework for Network Security in Government

Governments around the world are undergoing change. Whether reducing data center footprints, virtualizing existing services to reduce costs and "go green", or advancing security strategies to thwart advanced attacks in the field or at home, governments are demanding more from their cybersecurity solutions today.
  • 8
  • 1283

Today’s Cybersecurity Challenges in Government

Palo Alto Networks meets the cybersecurity needs of its government customers by providing a future-proof platform with visibility, prevention and resilience.
  • 0
  • 897

Next-Generation Security Platform for Critical Infrastructure

In this white paper, learn how implementing an Enterprise Security Platform will help SCADA and ICS operations solve some of their challenges.
  • 3
  • 3434

VM-Series for AWS Hybrid Cloud Deployment Guidelines

This whitepaper walks through both AWS and VM-Series deployment guidelines for building a hybrid cloud that extends your data center into AWS.
  • 2
  • 3755

MeriTalk - Pedal to the Metal:
Mitigating New Threats Faster with Rapid Intel & Automation

Cyberattacks are one of the most pressing national security and economic concerns of governments around the world. Government agencies are taking an “all-in” approach to fight back, sharing more cyberthreat information with one another and purchasing threat feeds. However, with the influx of threat data, many agencies are having difficulty using these insights to update their sensors with real-time protection and reconfigure their defenses on the fly. And during a cyberattack, responding quickly is crucial to minimizing potential damage.
  • 0
  • 180

Cloud First, Now What?

This Cloud Security Alliance whitepaper will help cloud initiative decision makers create a repeatable process for moving applications and data to the cloud.
  • 2
  • 4420

Building a Secure Hybrid Cloud in Azure

This whitepaper helps guide you through deploying the VM-Series next-generation firewall to protect your applications and data in Microsoft Azure.
  • 0
  • 1257

Traps Advanced Endpoint Protection HIPAA Validation

In this report, Coalfire describes how Traps assists organizations satisfy the HIPAA Security Rule and Breach Notification Rule.
  • 1
  • 1782
Displaying 61 to 90 of 156