Date

Education and Professional Services

Displaying 1 to 30 of 4236

Palo Alto Networks Completes Acquisition of Zingbox

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced it has completed its acquisition of Zingbox, an IoT cybersecurity company.
Santa Clara, CA
  • 0
  • 160

Prisma Access for Users - Deployment Guide

This guide provides a foundation for securing network infrastructure using Palo Alto Networks® VMSeries virtualized next generation firewalls within the Amazon Web Services (AWS) public cloud. For an organization with a desire to move to public cloud infrastructure, the next question is often “How do I secure my applications in a public cloud?” This guide provides an overview of AWS components and how they can be used to build a scalable and secure public cloud infrastructure on AWS using the VM-Series. The architectures begin with a single virtual private cloud suitable for organizations getting started and scales to thousands to meet any size organization’s operational requirements.
  • 0
  • 82

Prisma Access for Networks - Deployment Guide

This guide provides a foundation for securing network infrastructure using Palo Alto Networks® VMSeries virtualized next generation firewalls within the Amazon Web Services (AWS) public cloud. For an organization with a desire to move to public cloud infrastructure, the next question is often “How do I secure my applications in a public cloud?” This guide provides an overview of AWS components and how they can be used to build a scalable and secure public cloud infrastructure on AWS using the VM-Series. The architectures begin with a single virtual private cloud suitable for organizations getting started and scales to thousands to meet any size organization’s operational requirements.
  • 0
  • 58

Prisma Access for Networks - Architecture Guide

This guide provides a foundation for securing network infrastructure using Palo Alto Networks® VMSeries virtualized next generation firewalls within the Amazon Web Services (AWS) public cloud. For an organization with a desire to move to public cloud infrastructure, the next question is often “How do I secure my applications in a public cloud?” This guide provides an overview of AWS components and how they can be used to build a scalable and secure public cloud infrastructure on AWS using the VM-Series. The architectures begin with a single virtual private cloud suitable for organizations getting started and scales to thousands to meet any size organization’s operational requirements.
  • 0
  • 95

Prisma Access for Users - Architecture Guide

This guide provides a foundation for securing network infrastructure using Palo Alto Networks® VMSeries virtualized next generation firewalls within the Amazon Web Services (AWS) public cloud. For an organization with a desire to move to public cloud infrastructure, the next question is often “How do I secure my applications in a public cloud?” This guide provides an overview of AWS components and how they can be used to build a scalable and secure public cloud infrastructure on AWS using the VM-Series. The architectures begin with a single virtual private cloud suitable for organizations getting started and scales to thousands to meet any size organization’s operational requirements.
  • 0
  • 114

Palo Alto Networks Positioned as a Leader in Gartner Magic Quadrant for Network Firewalls for Eighth Consecutive Time

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced that the company has been positioned in the Leaders quadrant of the Magic Quadrant for Network Firewalls report by...
Santa Clara, CA
  • 0
  • 86

Harborコンテナレジストリに管理者に特権昇格が可能な深刻な脆弱性 (CVE-2019-16097)

Aviv Sasson, a security researcher from the cloud division of Unit 42, has identified a critical vulnerability in a widespread cloud native registry called Harbor. The vulnerability allows attackers to take over Harbor registries by sending them a malicious request. The maintainers of Harbor released a patch that closes this critical security hole. Versions 1.7.6 and 1.8.3 include this fix. Unit 42 has found 1,300 Harbor registries open to the internet with vulnerable default settings, which are currently at risk until they’re updated.
Aviv Sasson,
  • 0

商用RAT Adwindの調査: その誕生から名称変更のタイムライン、作者特定まで

In early 2012, a developer started selling the first of the Adwind family, Java-based remote access tools (RATs), called “Frutas.” In the ensuing years, it has been rebranded at least seven times. Its other names have included Adwind, UnReCoM, Alien Spy, JSocket, JBifrost, UnknownRat, and JConnectPro.The Adwind RAT family remains prevalent in the wild. Palo Alto Networks has collected over 45,000 samples from the various Adwind iterations. We have observed these samples used in over 2 million attacks against Palo Alto Networks customers since 2017, highlighting the high impact of this popular commodity RAT.
Unit 42,
  • 0

Cortex XDR

Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Cortex XDR accurately detects threats with behavioral analytics and reveals the root cause to speed up investigations.
  • 0

Stop Attackers from using DNS against you

Any modern organization requires the Domain Name System (DNS) to run its business, regardless of industry, location, size, or products. DNS is fundamental to every single modern organization, all over the world.
  • 0

Simplify Zero Trust Implementation with a five-step methodology

Companies are often reluctant to begin their Zero Trust journey because they believe it is difficult, costly, and disruptive but building Zero Trust networks is actually much simpler than building legacy 20th-century hierarchical networks.
  • 0

A more secure everywhere

The journey to the cloud is not a linear one, and organizations choose to migrate to the cloud in a multitude of ways and approaches.
  • 0

Prisma Cloud: Security, Compliance and Threat Defense

Watch this video to understand how Prisma Cloud provides the context required to maintain compliance and comprehensively secure your multi-cloud environments, spanning AWS®, Azure and Google Cloud.
  • 0

How to pick a winner in EDR

The endpoint security marketplace is crowded with vendors claiming to have superior capabilities. Cutting through all the marketing and sales pitches to understand how these products perform isn’t easy.
  • 0

Prisma Cloud Governance and Compliance

Prisma continuously monitors your distributed multi-cloud environments and SaaS applications, proactively alerting you of any misconfigurations or compliance violations and even automates remediation so you can embrace the cloud with confidence.
  • 0

Prisma Cloud Threat Prevention

The dynamic nature of public cloud environments requires security operations teams to adapt and embrace a new approach to securing the cloud.
  • 0

8-TIME GARTNER MAGIC QUADRANT LEADER

Gartner’s 2019 Magic Quadrant for Network Firewalls Report recognizes Palo Alto Networks a Leader for the EIGHTH time in a row, with the highest position in ability to execute and furthest in completeness of vision.
  • 2
  • 145

13 Things your Next Firewall Must Do

A true NGFW offers a prevention-focused architecture that is easy to deploy and operate; uses automation to reduce manual effort so that security teams can focus on high-value activities; and delivers new innovations that are natively integrated and easy to adopt – all at the required throughput your business needs. This paper outlines the 13 key things your next firewall must do to secure your network and your business.
  • 0

Security Operating Platform Product Brochure

Your one stop shop to get your overview on the Security Operating Platform for securing the enterprise, securing the cloud with Prisma, and securing the future with Cortex.
  • 0

Critical Vulnerability in Harbor Enables Privilege Escalation from Zero to Admin (CVE-2019-16097)

Aviv Sasson, a security researcher from the cloud division of Unit 42, has identified a critical vulnerability in a widespread cloud native registry called Harbor. The vulnerability allows attackers to take over Harbor registries by sending them a malicious request. The maintainers of Harbor released a patch that closes this critical security hole. Versions 1.7.6 and 1.8.3 include this fix. Unit 42 has found 1,300 Harbor registries open to the internet with vulnerable default settings, which are currently at risk until they’re updated.
Aviv Sasson,
  • 0

Cortex XDR

Hunt down and stop stealthy attacks by unifying network, endpoint, and cloud data
  • 2
  • 8496

The Legend of Adwind: A Commodity RAT Saga in Eight Parts

In early 2012, a developer started selling the first of the Adwind family, Java-based remote access tools (RATs), called “Frutas.” In the ensuing years, it has been rebranded at least seven times. Its other names have included Adwind, UnReCoM, Alien Spy, JSocket, JBifrost, UnknownRat, and JConnectPro.The Adwind RAT family remains prevalent in the wild. Palo Alto Networks has collected over 45,000 samples from the various Adwind iterations. We have observed these samples used in over 2 million attacks against Palo Alto Networks customers since 2017, highlighting the high impact of this popular commodity RAT.
Unit 42,
  • 0

Is security the #1 obstacle in your journey to the cloud?

Join the webinar and learn key requirements for complete cloud security and walk away with confidence knowing you can
  • 0

Ultimate Test Drive FAQ Sheet

Questions about our Ultimate Test Drives? Download the FAQ now to learn more about our FREE workshops.
  • 1
  • 6177

Security Challenges in the Cloud

Read our new e-book to take a deep dive into various cloud-native architectures and CI/CD workflows, how they affect your security posture, and how the latest cloud security tools – including containers – can dramatically boost your protection.
  • 0

Protecting branch offices and mobile users with Prisma Access

Saikumar M, specialist systems engineer, addresses one of the key concerns facing organisations with mobile users and multiple branches -- how to secure a path to the cloud for users. Join our webinar to learn how Prisma Access delivers consistent security from the cloud to manage your direct-to-internet initiatives.
  • 1

Palo Alto Networks Recognised as 2019 Frost & Sullivan Asia-Pacific Cloud Workload Protection Solution Vendor of the Year

SINGAPORE, Sept 12, 2019 – Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced that it has been recognised as the 2019 Asia-Pacific Cloud Workload Protection Solution Vendor of the Year by Frost & Sullivan.
Singapore
  • 0
  • 68

Deployment Guide - Panorama on AWS

This reference document provides detailed guidance on how to deploy Panorama on AWS.
  • 1
  • 3266

AWS Deployment Guide - Transit VPC Model

This reference document provides detailed guidance on the requirements and functionality of the Transit VPC design model on AWS. This guide explains how to successfully implement the design using Panorama, Palo Alto Networks® VM-Series firewalls, and VM monitoring.
  • 2
  • 3880

AWS Reference Architecture Guide

This guide provides a foundation for securing network infrastructure using Palo Alto Networks® VMSeries virtualized next generation firewalls within the Amazon Web Services (AWS) public cloud. For an organization with a desire to move to public cloud infrastructure, the next question is often “How do I secure my applications in a public cloud?” This guide provides an overview of AWS components and how they can be used to build a scalable and secure public cloud infrastructure on AWS using the VM-Series. The architectures begin with a single virtual private cloud suitable for organizations getting started and scales to thousands to meet any size organization’s operational requirements.
  • 2
  • 517
Displaying 1 to 30 of 4236