Displaying 91 to 120 of 268

Reducing the Business Risks of Cyberhreats

Your organization’s approach to cybersecurity can either securely enable your business to innovate and make use of transformational technologies, like the cloud, or it can introduce unnecessary risk and complexity. In this era of advanced threats and mega-breaches, organizations face an increasingly sophisticated adversary, aided by automation and the power of the cloud. Those companies still relying on largely manual methods to deal with such threats are now seeking ways to adjust to the changing landscape.
  • 2
  • 619

Palo Alto Networks & Centrify

Read this brief to learn how to protect user credentials with Palo Alto Networks and Centrify.
  • 0
  • 513

Fundamentals of Secure Cloud Adoption

The challenge of moving to the cloud is how to protect applications and data without adding complexity or cost. Read Securely Enabling Cloud Adoption for solutions.
  • 0
  • 585

10 Things to Test In Your Future NGFW

Find out what network admins need to know to improve perimeter defense
  • 1
  • 295

Automating VM-Series Deployments with Terraform and Ansible

Whitepaper that provides examples of how Terraform, Ansible and VM-Series automation features allow customers to embed security into their DevOps or cloud migration processes. This whitepaper walks through a “touchless” deployment scenario where a fully configured, VM-Series next generation firewall is deployed on AWS and Azure and dynamically updated using Ansible as the environment expands and contracts.
  • 0
  • 1338

Architecting the Modern Campus Network

Learn on the promise of delivering a more secure campus network that is adaptive to threats, improves user experience, and is easier to configure and manage.
  • 0
  • 1057


IT security and network teams at automotive industry around the world must address demands to rapidly adopt new technology, protect intellectual property, secure a myriad of mass market and custom applications and comply with regulations. While doing the above, they must also enable secure access to personal and specialized automotive data, corporate data from a variety of access points – dealerships, branch offices, mobile devices, and third-party business partner networks considering an increasing volume and sophistication of threats.
  • 0
  • 193

Palo Alto Networks and RSA

Learn how RSA and Palo Alto Networks have collaborated to simplify the deployment of multi-factor authentication.
  • 0
  • 2380

Extending Networks Into the AWS Cloud

Before migrating to cloud computing softwares or platforms, ensure integration between network security practices and new cloud policies.
  • 1
  • 190

Cybersecurity Academy

Learn about the Palo Alto Networks Cybersecurity Academy Program
  • 1
  • 1438

HIMMS Analytics Survey: Navigating Healthcare’s Biggest Cybersecurity Challenges in 2018

Healthcare security challenges 2018
  • 0
  • 987

How Traps Helps Financial Institutions Prevent Sophisticated Threats

As the financial services industry undergoes a digital transformation to streamline operations, become more competitive, and remain relevant with their customers, they face increasing volume of cyber threats. Attackers continue to be tempted by the vast quantities of easily monetizable personally identifiable information (PII).
  • 1
  • 1055

Global and Regional WildFire Clouds

WildFire® cloud-based threat analysis and AutoFocus™ contextual threat intelligence services are two of the powerful core components fueling Palo Alto Networks Next-Generation Security Platform to deliver better protection. Together, these cloud-delivered security services provide the industry’s most advanced analysis and prevention engine for highly evasive zero-day exploits and malware.
  • 1
  • 447

Enabling Digital Transformation in e-Health Through More Effective Endpoint Security

Healthcare Endpoint Protection
  • 0
  • 326

Automate the Deployment of Secure Developer VPCs

This eBook explores the unique partnership between Palo Alto Networks and REAN Cloud, and how the two companies work together to help you adopt a DevSecOps mindset and eliminate the friction between your development and security teams
  • 0
  • 329

How to Secure Your Network from Ransomware

Find out what network admins need to know to improve perimeter defense
  • 2
  • 397

Mac Endpoints Move into the Enterprise and into the Crosshairs of Hackers

After years of believing the Mac® was immune to attack, the world is waking up to the fact that it is indeed vulnerable to malware and exploits. It’s important to understand what a multi-method prevention approach can do for Mac endpoint security. When built on a next-generation security platform, this approach can provide full context and intelligence, enabling the security team to address the unique requirements of the Mac while providing protection for all endpoints.
  • 1
  • 344

Rethink Network Availability

Mobile network operators are now facing new malware-based incidents that threaten network availability as well as subscriber confidentiality.
  • 3
  • 398

Protect Yourself from AV

Protect Yourself from AV
Santa Clara, CA
  • 7
  • 28005

5 Critical Mistakes When Evaluating A Next-Gen Firewall

Avoid critical mistakes when implementing you Next Generation Firewall. Robust cybersecurity plans must account for sizing, performance, context, and scalability.
  • 0
  • 314

HIMSS - Healthcare IT Cybersecurity Study

Email/phishing attacks are a major concern at healthcare organizations with Austria, Germany, Netherlands, Switzerland, United States, and Nordic countries all listing it as the greatest area of vulnerability U.S. respondents feel the most prepared to stop cyber-attacks on the network, and least prepared to stop cyber-attacks on unmanaged endpoints Endpoint and medical devices protection are top of mind with 72.1% stating that deploying effective advance endpoint protection to stop malware like ransomware, 38% are looking for effective exploit kit protection for endpoints and 54% are looking for medical devices protection. U.S. hospitals report being attacked by cybercriminals (89.5%) nearly two times more frequently than the next nearest country (Germany – 46.0%) over the last 12 months
  • 2
  • 306

Securing the Mobile Workforce

In recent years, cybersecurity has emerged as one of the top concerns for the leadership of business and government organizations around the world. The troubling number of high-profile attacks targeting some of the largest companies in the world has led many to question whether adequate measures are in place on their own networks. Sophisticated attackers are employing new techniques to penetrate a network, and using methodologies to avoid detection by masking their activities in legitimate application traffic.
  • 29
  • 3107

Continuous Diagnostics and Mitigation

This white paper describes how the Palo Alto Networks Next-Generation Security Platform, in combination with select technology and delivery partners, supports all three CDM phases and enables agencies to achieve the security objectives of the program.
  • 0
  • 5777

Security Reference Blueprint for Retail

This white paper outlines key security principles for modern retail networks and a framework that reduces operational demands on IT and security teams while improving security and control.
  • 1
  • 544


Millions of vehicles will have a data connection by 2020. As data is being gathered, new business models and attack surfaces are being introduced. Learn how Palo Alto Networks can help to protect data where it resides and achieve regulatory compliancy by providing advanced security prevention capabilities. Read this summary of our prevention-based approach to protect the automotive networks from cyberattacks.
  • 0
  • 451

The “Patient Zero” Problem and the Need for Modern Endpoint Protection

This paper from IDC, a premier global provider of market intelligence, examines modern endpoint protection, describing how the evolution of malware has created a need for a modernized approach to endpoint protection.
  • 2
  • 3644

How Palo Alto Networks Next-Generation Security Platform Supports Use of the NIST Cybersecurity framework

Since the release of the Cybersecurity Framework (CSF) by the U.S. National Institute of Standards and Technology (NIST), organizations worldwide have implemented the framework to better understand and manage cyber risk. The CSF can be applied to businesses of all sizes, across regions and industries, and is being incorporated into national risk frameworks around the globe. Given its proven ability to aid in risk management and reduction, some industries have even begun to mandate its implementation. Namely, the White House recently issued an executive order requiring all federal agencies to immediately begin using the CSF to assess and manage cyber risk to protect critical infrastructure in their enterprises. Designed to foster positive and productive risk and cybersecurity management dialogue among internal and external business stakeholders, the CSF provides a common language for all appropriate teams, spanning IT, operations, security, finance, C-suite and board of directors. Based on this open dialogue, organizations can more effectively quantify risk and prioritize investments to mitigate it. Palo Alto Networks® Next-Generation Security Platform aligns with the CSF’s primary directive of enabling critical infrastructure operations to effectively identify, manage and reduce cyber risk. Rooted in prevention, the Next-Generation Security Platform is natively integrated to counter cyberattacks before they manifest in an organization’s environment. With full visibility into traffic – across the network, endpoints and the cloud – organizations can prevent cyberattacks based on how or where applications and data reside or are being used. This allows critical infrastructure organizations to identify the most serious ongoing threats to key business operations and reduce overall cybersecurity risk. Download this white paper to explore the benefits of the CSF and how Palo Alto Networks Next-Generation Security Platform capabilities map to and fulfill CSF subcategories.
  • 1
  • 963

Streamline PCI Compliance With Next-Generation Security

Establishing, maintaining, and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for everyone in payment card processing—including merchants, processors, acquirers, issuers, and service providers, as well as companies that store, process or transmit cardholder data (CHD) and/or sensitive authentication data. With approximately three hundred individual requirements to address, organizations subject to the standard have their work cut out for them. This white paper will explain how Palo Alto Networks® Next Generation Security Platform allows PCI system operators to significantly enhance security and exceed PCI DSS requirements through segmentation and mitigating risks of malware and unpatched systems.
  • 2
  • 3704

网络安全 平台必做的 5 件事

  • 0
  • 930

Protecting the Extended Perimeter with GlobalProtect Cloud Service

Your Perimeter Is Everywhere. The world you need to secure is undergoing tremendous transformation. Global expansion, mobile workforces and cloud computing are shifting the location of your applications, data and users. These changes introduce new opportunities for business, but they also create a set of cybersecurity risks. These tectonic shifts in location strain an organization’s ability to protect data and stop threats consistently. The mandate for security has not changed, but the ability to deliver protection at each location is at a crossroads. Many organizations, faced with the rising costs of extending the perimeter using conventional methods, are left with few other choices. These consequences place organizations at risk. It is important to understand where the risks lie to evaluate what must be done to bring security back into balance.
  • 0
  • 4526
Displaying 91 to 120 of 268