Date

Displaying 91 to 120 of 178

Securing the Virtualized Data Center with Next-Generation Firewalls

As your organization evolves from traditional data centers to virtualized and cloud environments, your security architectures must evolve to support your changing set of requirements. This white paper describes the challenges of virtualized data center and cloud computing environments, and how to address them with next-generation firewalls.

  • 2
  • 4258

Top Recommendations to Prevent Ransomware

Read this whitepaper for specific recommendations to prevent ransomware in large organizations.

  • 1
  • 2497

Best Practices: Securing System & Application Vulnerabilities on the Network

Download this white paper to learn best practices to protecting systems and applications from vulnerabilities, and preventing known threats on the network.

  • 1
  • 401

Best Practices - Data Center Security

See how Palo Alto Networks Next-Generation Security Platform helps you to implement an effective Zero Trust security model to protect your data center assets.

  • 1
  • 1906

Meeting CSIP Objectives With an Automated and Preventive Security Approach

Every day, the U.S. federal government experiences increasingly sophisticated and persistent cyberthreats. The government is expending significant resources to ensure the cybersecurity of federal networks, systems and data remains a top priority.

  • 0
  • 451

Security Framework Guide for Business Leaders

This white paper gives corporate leaders a practical framework for addressing the people, process and technology elements of the cybersecurity challenge.

  • 2
  • 2445

Network Security Management For Dummies

Today’s enterprise security deployments require a network security management solution that provides the following: • Centralized administration with automated and stream-lined management and configuration processes • Greater network visibility with comprehensive reporting across the entire network security environment • Prioritization of critical threats to enable faster, more effective incident response

  • 2
  • 8072

WildFire named a leader for Automated Malware Analysis

The Forrester Wave™: Automated Malware Analysis, Q2 2016 ranks WildFire as a leader in this space, through evaluation of its current offering, its market presence, and strategy.

  • 0
  • 3997

Securing SaaS For Dummies

Download Securing SaaS for Dummies now. You'll learn to find and control SaaS usage in your networks and protect sanctioned SaaS usage.

  • 4
  • 6614

Cybersecurity For Dummies

Next-generation cybersecurity provides visibility, control and integration of threat‐prevention disciplines needed to find and stop security threats.

  • 0
  • 3923

Tech Tips User-ID

Read our best practices for deploying user-based policies on your Palo Alto Networks Next-Generation Firewall and tips for a smooth and successful implementation.

  • 3
  • 1364

Traps for Windows Server 2003

Learn how businesses can keep Windows Server 2003 systems compliant and secure, even after EOS, by using Palo Alto Networks Traps Advanced Endpoint Protection.

  • 1
  • 2074

Best Practices

Implementing a central management system to view and preside over your many firewall deployments can give you full visibility into your entire network and help you to orchestrate detection and protection based on real-time intelligence. This chapter highlights Palo Alto Networks’ methodology for implementing Panorama and our best practices for managing multiple firewalls.

  • 1
  • 1658

Secure Windows XP with Traps

Windows® XP end-of-life is a critical threat exposure for XP users. Security was one of the major drivers for Microsoft’s decision to end support for this operating system. No doubt, the intention was to urge enterprises to upgrade their systems. In reality, however, Windows XP systems are still deployed in many organizations. This technical brief outlines how Traps secures endpoint systems that run Windows XP, while enabling you to manage your XP upgrade policy at your own pace as you maintain acceptable levels of security and compliance.

  • 0
  • 1172

First Principles For Network Defenders: A Unified Theory For Security Practitioners

First principles in a designated problem space are so fundamental as to be self-evident; so true that no expert in the field can argue against them. Experts use them like building blocks to derive everything else that is worth -knowing in the problem domain. In this paper, we propose that the first principle for all network defenders is to prevent high-risk material impact to the organization.

  • 1
  • 1188

Traps HIPAA Compliance

Healthcare organizations are increasingly under attack by cybercriminals, putting sensitive patient information, such as medications, diagnoses and Social Security numbers, at risk. The Anthem breach in early 2015 exposed the fact that, despite substantial investments made in securing their networks to be HIPAA compliant, healthcare providers are not fully protected against advanced cyberattacks.

  • 3
  • 2148

Network Security in Virtualized Datacenters For Dummies

To realize the benefits of virtualization you must adapt your security architecture to address new challenges, and today's application and threat landscape. 2nd Edition.

  • 0
  • 646

Next-Generation Firewalls For Dummies

This book provides an in-depth overview of next-generation firewalls. It examines the evolution of network security, the rise of Enterprise 2.0 applications and their associated threats, the shortcomings of traditional firewalls, and the advanced capabilities found in next-generation firewalls.

  • 0
  • 3012

Securing the Unpatchable

This document presents two case studies that discuss the security, risk and compliance ramifications of operating unpatchable systems and applications

  • 3
  • 1025

Ponemon Executive Advisory Report

Cybersecurity has become so pervasive in headlines across the globe that scarcely a week passes without another high-profile breach. While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks, given the heavily technical nature of the issue.

  • 5
  • 482

Scarlet Mimic

Unit 42, the Palo Alto Networks® threat intelligence team, recently released a report identifying and tracking “Scarlet Mimic,” a series of sophisticated cyber espionage attacks which targeted Uyghur and Tibetan activists, their supporters, and entities that collect information on such groups. The attacks, which date back to 2009, have evolved over the past six years to compromise users of Windows®, Mac® OS X® and Android™ devices, indicating that they are the work of a well-resourced, sophisticated and persistent adversary group.

  • 6
  • 671

The Power of the Next-Generation Security Platform

Integrating best-of-breed network, cloud and endpoint security with industry-leading threat intelligence, Palo Alto Networks® Next-Generation Security Platform delivers the visibility, security and control customers require to enhance their security posture without compromising business efficiency. Customers can now confidently detect cyberthreats and prevent breaches at every stage of the attack lifecycle in a highly automated manner.

  • 6
  • 1222

How Malware Eats Cookies

Palo Alto Networks threat researchers are constantly analyzing different facets of advanced threats looking for new ways to both identify and prevent compromise. In this research paper, the team analyzes changes in cookies to understand how they’re effected by malware in an effort to determine whether cookie behavior can be used to determine maliciousness and infection.

  • 1
  • 991

Best Practices: Inspecting Encrypted Traffic

This document outlines Palo Alto Networks methodology for selectively decrypting traffic and our best practices for balancing risk and user privacy.

  • 2
  • 1201

Uncover SSL-Encrypted Attacks in Government Networks

A comprehensive security strategy for federal and other government agencies requires in-depth analysis of encrypted traffic to detect and prevent hidden attacks and data leakage. As more Internet traffic is encrypted, increasing numbers of attackers, including state-sponsored actors, are using this technology to hide malware, and botnet-based command and control traffic to exfiltrate data and escalate the likelihood of successful attacks. Palo Alto Networks Next-Generation Security Platform provides a combination of advanced capabilities to prevent undesired applications and malicious content, including the decryption and scrutinization of encrypted communications, along with Hardware Security Module (HSM) support for enhanced performance and security of certificate and key management.

  • 1
  • 512

Moving Beyond Proxies

This whitepaper highlights the short comings of proxies, and showcases how a next generation security platform can provide faster, simpler and more comprehensive security.

  • 6
  • 2675

Best Practices: Securing the Network by Application

Our best practices for securing the network by application helps you reduce your organization’s attack surface and provides security policy strategies.

  • 4
  • 591

Endpoint Epidemic Report

Federal agencies are facing an explosion of endpoints in both volume and variety. How are Federal IT managers handling this endpoint epidemic? What¹s the best approach to building an effective, practical, and enforceable endpoint strategy? What are the challenges and what¹s the path forward? To find out, MeriTalk and Palo Alto Networks examined endpoint security strategies and efforts across the U.S. Federal government, surveying 100 Federal IT managers and 100 non-IT Federal employees.

  • 2
  • 290

Heart of the Network – Data Center Defense

Feds need to protect the data center from internal and external threats as they transition to cloud environments. How are they managing the transition?

  • 0
  • 286

Managed Network Security Services

Evolution of Next-Generation Managed Network Security Services For almost twenty years, the centerpiece of any corporate security strategy has been the firewall. As soon as there were appliances, there were services providers who offered to manage the firewall.

  • 4
  • 374
Displaying 91 to 120 of 178