Displaying 91 to 120 of 173

Traps for SCADA

Learn why Palo Alto Networks Traps is ideal for securing SCADA/ICS environments providing superior protection with minimal disruptions.
  • 5
  • 2746

The Next Board Problem: Automatic Enterprise Security Orchestration — A Radical Change in Direction

Commercial boards and senior government officials may be the only groups capable of kick-starting this new and necessary direction in the evolution of cybersecurity...
  • 1
  • 423

Cloud Adoption Risk and Compliance

Public cloud adoption poses risks. Senior leaders should understand and manage those risks in a way that is in line with the organization’s risk appetite.
  • 0
  • 399

Protect IOT Opportunity With Network-Based Security

Read how Palo Alto Networks provides advanced protects service provider networks, IoT systems, and interconnected networks and infrastructure.
  • 0
  • 1309

The Need for a Next-Generation Platform Approach in Mobile Networks

Read how Palo Alto Networks that helps mobile operators get ahead of cybercriminal capability and urgent mobile operator pain points.
  • 0
  • 473

Security Reference Blueprint for K-12 Education

The Security Reference Blueprint for K-12 Education suggests a framework for existing infrastructure and reduces operational demands on IT and security teams.
  • 0
  • 510

Security Reference Blueprint for Higher Education

This blueprint enables education security and IT pros to prepare to meet new and emerging technological challenges while reducing security threats.
  • 0
  • 649

Security Reference Blueprint for Healthcare IT

The Security Reference Blueprint for Healthcare IT enables organizations to protect patient care and patient data while reducing the security threats.
  • 21
  • 1178

Today’s Cybersecurity Challenges in Government

Palo Alto Networks meets the cybersecurity needs of its government customers by providing a future-proof platform with visibility, prevention and resilience.
  • 0
  • 952

A Modern Framework for Network Security in Government

Governments around the world are undergoing change. Whether reducing data center footprints, virtualizing existing services to reduce costs and "go green", or advancing security strategies to thwart advanced attacks in the field or at home, governments are demanding more from their cybersecurity solutions today.
  • 8
  • 1387

Understanding the Role of Stolen Credentials in Data Breaches

Attackers love easy ways to get into your network, making credentials theft through phishing a preferred method for attacks. Learn how to stop them here.
  • 0
  • 255

Next-Generation Security Platform for Critical Infrastructure

In this white paper, learn how implementing an Enterprise Security Platform will help SCADA and ICS operations solve some of their challenges.
  • 3
  • 3607

VM-Series for AWS Hybrid Cloud Deployment Guidelines

This whitepaper walks through both AWS and VM-Series deployment guidelines for building a hybrid cloud that extends your data center into AWS.
  • 2
  • 4015

Network Security Management Buyers Guide

Is network security management right for you? This guide will help you decide whether to deploy a network security management product.
  • 29
  • 5438

MeriTalk - Pedal to the Metal:
Mitigating New Threats Faster with Rapid Intel & Automation

Cyberattacks are one of the most pressing national security and economic concerns of governments around the world. Government agencies are taking an “all-in” approach to fight back, sharing more cyberthreat information with one another and purchasing threat feeds. However, with the influx of threat data, many agencies are having difficulty using these insights to update their sensors with real-time protection and reconfigure their defenses on the fly. And during a cyberattack, responding quickly is crucial to minimizing potential damage.
  • 0
  • 236

Building a Secure Hybrid Cloud in Azure

This whitepaper helps guide you through deploying the VM-Series next-generation firewall to protect your applications and data in Microsoft Azure.
  • 0
  • 1363

Cloud First, Now What?

This Cloud Security Alliance whitepaper will help cloud initiative decision makers create a repeatable process for moving applications and data to the cloud.
  • 2
  • 4501

Traps Advanced Endpoint Protection PCI Validation

In this report, Coalfire outlines how Traps assists organizations meet the requirements of PCI Data Security Standard (DSS) (v3.2).
  • 0
  • 2809

Traps Advanced Endpoint Protection HIPAA Validation

In this report, Coalfire describes how Traps assists organizations satisfy the HIPAA Security Rule and Breach Notification Rule.
  • 1
  • 1882

Securing Microsoft Environments on the Network, in the Cloud, on the Endpoint

Overview of how the Palo Alto Networks security platform can protect Microsoft environments from the network, to the cloud to the endpoint. Discussions include hardware and virtualized form-factor firewalls, security for Office 365 and Azure, and protection for endpoints and servers.
  • 1
  • 965

ICS / SCADA Use Case: Windows-based Endpoint Security

How do operators/owners of ICS/SCADA systems prevent targeted and zero-day attacks from exploiting software vulnerabilities within their ICS and SCADA networks?
  • 0
  • 554

Getting Started With a Zero Trust Approach to Network Security

Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. With Zero Trust there is no default trust for any entity—including users, devices, applications, and packets—regardless of what it is and its location on or relative to the corporate network. This paper discusses the need for a Zero Trust approach to network security, how the Palo Alto Networks® next-generation security platform delivers on these requirements, and provides guidance on how to progressively migrate to a Zero Trust architecture. This White Paper is available in: Chinese (simple), Chinese (traditional), French, German, Italian, Japanese, Portuguese, and Spanish.
  • 2
  • 10698

The Value of the Next-Generation Security Platform

See how the Next-Generation Security Platform has helped customers improve their security posture and reduce their total cost of ownership.
  • 3
  • 1515

Migrating to Panorama

Panorama network security management provides a streamlined transition from individually managed next-generation firewalls to a centrally managed security network.
  • 2
  • 1157

Firewall Buyer's Guide

See the ten critical business requirements that your next firewall should address and how to create an RFP for the vendor/solution selection process.
  • 3
  • 4506

Security Reference Blueprint for Banking IT

The Security Reference Blueprint for Banking IT provides a framework in which banks can secure their network, users, and applications using the core capabilities of Palo Alto Networks next-generation security platform.
  • 19
  • 737

Network Segmentation as a Business Enabler for Financial Services

Read about the perceived challenges with the adoption of network segmentation for cybersecurity in the financial sector and how to overcome them with a practical approach for implementation.
  • 1
  • 1021

10 Things Your Next Firewall Must Do

For enterprises looking at NGFWs, will this new technology empower your security teams to securely enable applications to the benefit of the organization?
  • 2
  • 6371

Securing the Virtualized Data Center with Next-Generation Firewalls

As your organization evolves from traditional data centers to virtualized and cloud environments, your security architectures must evolve to support your changing set of requirements. This white paper describes the challenges of virtualized data center and cloud computing environments, and how to address them with next-generation firewalls.
  • 2
  • 4902

Top Recommendations to Prevent Ransomware

Read this whitepaper for specific recommendations to prevent ransomware in large organizations.
  • 1
  • 2665
Displaying 91 to 120 of 173