Date

Education and Professional Services

Displaying 1 to 30 of 4016

How Palo Alto Networks Protects Apps And Data on AWS

With Palo Alto Networks you can protect your data and apps in AWS and fulfill your role in the shared responsibility model.
  • 2
  • 213

Prisma Cloud for Amazon Web Services

Prisma Public Cloud for AWS dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk
  • 1
  • 6412

A Strategic Overview of Zero Trust

John Kindervag provides a deep dive into Zero Trust as a strategy, how it prevents successful data breaches, and how to deploy it within your organization.
  • 2
  • 72

Secret CSO: Rick Howard, Palo Alto Networks

Rick Howard is the Chief Security Officer (CSO) for Palo Alto Networks where he is responsible for building a Threat Intelligence Team, supporting the product line and acting as a thought leader and company evangelist in the cybersecurity industry.
  • 0

Prisma Cloud Privacy Data Sheet

Describes how Prisma Cloud processes personal information
  • 0
  • 3144

Security First: A Guide for the Business Decision-Maker

This e-book provides a framework for developing a security-first approach to monitoring the state of your cloud environment, applying rapid fixes, and gaining control over all your operations in the cloud.
  • 2
  • 163

Prisma Cloud Customer Success Plans

Prisma Cloud customer success plans outlining the value customer receive with choosing our different success plans.
  • 0
  • 3031

Project Management Services

Learn about the Project Management Services offered by Palo Alto Networks
  • 0
  • 6208

What government can do to keep its cyber workforce

The government needs to do a better job showing that it values cybersecurity professionals as it battles to attract and retain a digital workforce, industry professionals told Fifth Domain during a week of information security conferences in Las Vegas, Nevada.
  • 0

What Is a Cloud VPN?

A cloud VPN (also known as virtual private network as a service (VPNaas) or hosted VPN) is a new type of VPN technology that’s specifically designed for the cloud.
  • 2

Cloud Native Security vs 3rd Party Security

Customers and prospects often ask if they should adopt the tools developed and provided by the cloud platforms themselves or invest in 3rd party solutions. Before jumping to technology decisions, it is wise to review both requirements and existing tools.
  • 0

eBook: How Practice Fusion Achieved Cloud Compliance with Prisma Cloud

Read our eBook to learn how Prisma Cloud continuously monitors cloud environments and simplifies the task of managing compliance –enabling Practice Fusion to build their products on AWS faster.
  • 1

Prisma Cloud for GCP

Prisma Cloud for Google Cloud dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.
  • 0
  • 110

Prisma Cloud SLA

Prisma Public CloudService-Level Agreement
  • 1
  • 14782

Ultimate Test Drive Brochure

Learn more about our Ultimate Test Drives –guided, hands-on experiences with Palo Alto Networks Next-Generation Security Platform.
  • 4
  • 12482

What is an EDR Platform?

In a SaaS model—where a company’s applications and data reside on third-party infrastructure, and the company’s employees can access those apps anywhere, from any device— taking a traditional approach to security is not enough.
  • 1

E-Book: Top 10 AWS Cloud Security Risks

Download the ebook now to learn about the top risks you are likely to encounter in your AWS environment.
  • 0
  • 733

What Is Endpoint Security?

Endpoint Security describes the tools/solutions designed to protect remote computing devices from threats and ensure that individual access points to an organization’s network and sensitive data sources are secure.
  • 1

What is Data Loss Prevention (DLP)?

Data loss prevention (DLP) is the practice of protecting and securing a company’s data to prevent it from being lost, stolen, accessed, or misused by unauthorized individuals.
  • 1

Palo Alto Networks to Host Investor Event, Concurrent with the Announcement of Fiscal Fourth Quarter and Fiscal Year 2019 Financial Results, on Wednesday, September 4, 2019

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, announced today that it will host an Investor Event at TheTimesCenter in New York City on Wednesday, September 4 at 4:30 p.m....
Santa Clara, CA
  • 1

State of North Dakota's Zero Trust Strategy

Join host John Kindervag, creator of Zero Trust, and Ryan Kramer, enterprise network architect for the State of North Dakota, to hear how North Dakota has implemented Zero Trust. See how the state automated cybersecurity while preventing untrusted systems and cyberthreats from compromising state assets.
  • 0

The Business Case for Cloud Threat Defense

Read this report for an understanding of how RedLock can reduce financial risks due to security breaches, third-party tools and labor requirements to resolve issues faster; provide security governance and increase cross-team visibility such as asset management; and easily generate compliance reports that map and provide audit trails for your cloud resources.
  • 2
  • 368

What is SaaS Security?

In a SaaS model—where a company’s applications and data reside on third-party infrastructure, and the company’s employees can access those apps anywhere, from any device— taking a traditional approach to security is not enough.
  • 1

MNO's Guide to Buying a 5G-Ready Next Generation Firewall

Evolving network architectural changes vastly impact 5G security postures that mobile operators are required to adopt in their journey to 5G. As you prepare for your network transition to 5G, look for six essential capabilities in your 5G-ready next-generation firewall.
  • 1

Platform Brief for Manufacturing

Manufacturers are employing the industrial internet of things and other innovative technologies to produce quality goods efficiently. Read this platform brief for a summary of how Palo Alto Networks helps manufacturers compete in the global marketplace while streamlining security operations, protecting valuable data, and preventing new and known threats from impacting operations or uptime of corporate and ICS/SCADA networks.
  • 2
  • 1439

The state of container security: Tools, policy trail the technology

Gartner recently included container security as one of its Top 10 Security Projects for 2019. However, container technology remains something of a mystery to many cybersecurity pros.
  • 0

Prisma Cloud Standard Customer Success Plan

Prisma™ Cloud (formerly RedLock) Standard Customer Success Plans outlining the value customer receive with choosing our different success plans.
  • 0
  • 3041

Prisma Access for Users - Deployment Guide

This guide provides a foundation for securing network infrastructure using Palo Alto Networks® VMSeries virtualized next generation firewalls within the Amazon Web Services (AWS) public cloud. For an organization with a desire to move to public cloud infrastructure, the next question is often “How do I secure my applications in a public cloud?” This guide provides an overview of AWS components and how they can be used to build a scalable and secure public cloud infrastructure on AWS using the VM-Series. The architectures begin with a single virtual private cloud suitable for organizations getting started and scales to thousands to meet any size organization’s operational requirements.
  • 0

Prisma Access for Networks - Architecture Guide

This guide provides a foundation for securing network infrastructure using Palo Alto Networks® VMSeries virtualized next generation firewalls within the Amazon Web Services (AWS) public cloud. For an organization with a desire to move to public cloud infrastructure, the next question is often “How do I secure my applications in a public cloud?” This guide provides an overview of AWS components and how they can be used to build a scalable and secure public cloud infrastructure on AWS using the VM-Series. The architectures begin with a single virtual private cloud suitable for organizations getting started and scales to thousands to meet any size organization’s operational requirements.
  • 0
Displaying 1 to 30 of 4016