Protect Against Russia-Ukraine Cyber Activity
  • Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Network Security
  • Secure Access Service Edge
  • Cloud-Native Security
  • Security Operations
  • Threat Intel & Incident Response
  • More
  • Sign In
    Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
    Language
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Get Started

Palo Alto Networks Introduces the Autonomous Security Platform, Cortex XSIAM, to reimagine SIEM and SOC Analytics

A major challenge in cybersecurity today is our inability to leverage massive scales of data for our defense. To meet this challenge, Palo Alto Networks (NASDAQ: PANW) today announced Cortex®...
See more

Palo Alto Networks Introduces PAN-OS 10.2 Nebula: The Industry's First Inline Deep Learning Protection for Network Security to Help Stop Sophisticated Attacks as They Happen

Palo Alto Networks (NASDAQ: PANW), a 10-time leader in network firewalls, today announced Nebula, the latest upgrade of its industry-leading PAN-OS software, to help find the evasive, zero-day...
See more

Date

  • Last week
  • Last 30 days
  • Last 6 months
  • Last year
By Topic

By Topic

  • Cloud Security (137)
  • Public Cloud Security (62)
  • Private Cloud Security (38)
  • Google Cloud (24)
  • Amazon Web Services (23)
  • Microsoft Azure (19)
  • Threat Detection and Prevention (13)
  • Network Security (12)
  • Network Security Management (8)
  • Security Operations (7)
  • Security Operating Platform (7)
  • Secure access service edge (SASE) (6)
  • Security Ecosystem (6)
  • Saas Security (5)
  • Zero Trust (5)
  • Microsoft Hyper-V (3)
  • Data Center (3)
  • Mobile Security (3)
  • Professional Services (1)
  • Attack Surface Management (1)
  • Cloud Security (1)
  • Remote Workforce (1)
  • Next Generation Firewall (1)
  • Secure Remote Workforce (1)
  • + Show More
By Industry

By Industry

  • Federal Government (11)
  • Financial Services (6)
  • Healthcare (3)
  • Retail (3)
  • Utilities & Energy (2)
  • Energy (2)
  • Manufacturing (2)
  • Service Provider & Telecommunications (2)
  • High Technology (2)
  • Technology (1)
  • K-12 Education (1)
  • State & Local Government (1)
  • ICS SCADA (1)
  • Other Industries (1)
  • Higher Education (1)
  • IoT (1)
  • Professional & Legal Services (1)
  • Transportation (1)
  • + Show More
By Type

By Type

  • Datasheet (41)
  • Article (34)
  • Webinar (25)
  • Research Reports (25)
  • Video (23)
  • White Paper (17)
  • Book (11)
  • Infographic (10)
  • Guide (10)
  • Customer Story (9)
  • Other (7)
  • Use Case (2)
  • + Show More
By Product Category

By Product Category

  • Prisma Cloud (245)
  • VM-Series (22)
  • SaaS Security (15)
  • NGFW (14)
  • Prisma Access (12)
  • Cortex XDR (10)
  • Panorama (10)
  • Cortex (9)
  • Unit 42 (8)
  • WildFire (8)
  • Cortex XSOAR (7)
  • GlobalProtect (7)
  • Threat Prevention (6)
  • URL Filtering (5)
  • Threat Intel Management (5)
  • Prisma SD-WAN (3)
  • Cortex Xpanse (3)
  • DNS Security service (2)
  • CN Series (2)
  • Advanced Threat Prevention (1)
  • Zero Trust (1)
  • PA-Series (1)
  • Prisma SASE (1)
  • IoT Security (1)
  • Cloud NGFW (1)
  • PAN-OS 10.0 (1)
  • Enterprise DLP (1)
  • + Show More
Education and Professional Services

Education and Professional Services

  • Professional Services (5)
  • Support (3)
  • Training (2)
  • Customer Success (2)
  • Firewall Migration (1)
  • Transformation Services (1)
  • Prisma Cloud
Displaying 1 - 30 of 245
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9

References and Case Studies

Prisma Cloud Provides Visibility and Control to Confidently Secure Funding Societies’ Cloud Transformation

Funding Societies | Modalku is the largest small and medium-sized enterprise (SME) digital financing platform in Southeast Asia.
May 26, 2022

White Paper

Wipro Managed SASE with Palo Alto Networks

Unshackle connected opportunities with WANFreedom Powered by Palo Alto Networks Prisma® SD-WAN.
May 23, 2022

Book

O'Reilly Cloud Native Security Cookbook - Recipes for a Secure Cloud

With the rise of the cloud, every aspect of IT has been shaken to its core. The fundamentals for building systems are changing, and although many of the principles that underpin security still ring true, their implementation has become unrecognizable.
May 19, 2022

Other

5 Best Practices for Securing Modern Web Applications and APIs

In this eBook, we will discuss and illustrate 5 best practices from securing Web Apps and APIs on modern cloud native architectures.
May 17, 2022

Article

What Is a Cloud Native Application Protection Platform (CNAPP)?

Cloud Native Application Protection Platforms (CNAPP) allow organizations to secure cloud native applications across the full application lifecycle.
May 17, 2022

White Paper

White Paper: Modern Commerce Made Secure, How to improve business outcomes with better and stronger security from Palo Alto Networks

Palo Alto Networks offers the most comprehensive, and best-in-class set of cybersecurity solutions for Retailers. Learn how to improve retail business outcomes in this white paper.
May 16, 2022

Datasheet

Web Application and API Security (WAAS) At a Glance

Prisma’s Cloud Web Application and API Security (WAAS) module provides comprehensive detection and protection of Web Applications and API risks for any cloud native architecture. Download the At a Glance to learn more.
May 13, 2022

Webinar

Why You Need a Platform for Cloud Security Success

Join Patrick Chang (Sr. Director Product Management, Palo Alto Networks), Karl Otts, (CISSP, Head of Cloud Security, EPAM Systems), and Aaron Tang (CISSP, Sr. Associate, Schellmann & Company, LLC) for this on-demand webinar as they explain ways to identify cloud security tools and strategies that can evolve with you, and show how Prisma Cloud enables cloud security scalability without the sacrifice.
May 12, 2022

Infographic

Cloud Native Security Maturity: Using Security to Drive Software Development Efficiency

View this infographic to see how a mature security program enables greater productivity and business innovation that enhance the benefits of adopting cloud native software development.
May 12, 2022

Book

Cloud Native Security Maturity: Using Security to Drive Software

Learn how senior decision makers secure their applications and underlying platforms, what tools they use, how they finesse systems and processes into organizational alignment and ways they leverage controls. Find out why security program maturity correlates to operational excellence and enables more functionality and on-time product delivery. Leverage the insights of a thousand seasoned security professionals. Access key benchmarks of the development processes toward a mature security program in this actionable e-book.
May 6, 2022

Article

What Is Policy-as-Code?

Policy-as-code is an approach to policy management in which policies are defined, updated, shared, and enforced using code.
May 5, 2022

Article

What Is Identity and Access Management (IAM)?

Identity and access management, or IAM, is a foundational component of virtually any modern application environment.
May 5, 2022

Article

17 Ways to Stay Secure When Deploying Cloud Environments

For enterprises that use the cloud, the key to being protected starts with understanding the layers that make up the components of their cloud stack
May 5, 2022

Article

What Is DevOps?

DevOps unites Development and Operations teams throughout the entire software delivery process, enabling them to discover and remediate issues faster.
May 5, 2022

Article

What Is a Container?

Starting with the advent of Docker in 2013, containers have become a fundamental building-block of modern IT infrastructure.
May 5, 2022

Article

What Is Web Application and API Protection?

Web application and API (Application Program Interfaces) protection is a set of development, integration, and deployment practices that reduces the exposure to known vulnerabilities and denial-of-service attacks.
May 5, 2022

Article

Top 4 Cloud Security Concerns and How to Resolve Them

In cloud security, there are many issues that organizations are trying to sort through. Here are a few of the most prominent and how to address them.
May 5, 2022

Article

What Is Platform as a Service?

Platform as a service (PaaS) is a cloud computing service model that allows users to rent hardware and software tools over the internet to create software and applications.
May 5, 2022

Article

What is IaC Security?

Infrastructure as code (IaC) presents an incredible opportunity to embed consistent and scalable cloud security coverage.
May 5, 2022

Article

Four Ways to Improve Cloud Security and Compliance

The cloud requires a new way of approaching security. Take a look at the four ways you can improve cloud security and compliance.
May 5, 2022

Article

Simplified Healthcare Compliance and Risk Management with Prisma Cloud

Reduce compliance costs, empower scale, and gain assurance you are protecting sensitive workloads by using the comprehensive HIPAA/HITRUST compliance controls offered by Prisma Cloud.
May 5, 2022

Article

What is Cloud Security?

Cloud Security is composed of various technologies and tools designed to protect each aspect of the shared responsibility model.
May 5, 2022

Article

What Is Cloud Native?

Cloud native describes an approach to designing, implementing and operating applications while taking advantage of the products offered by CSPs
May 5, 2022

Article

What is IaC?

Infrastructure as code (IaC) refers to the technology and processes used to manage and provision infrastructure with machine-readable languages (code) instead of manual operations.
May 5, 2022

Article

What's the Difference Between Agent-Based and Agentless Security?

In cybersecurity, agents represent specialized software components that are installed on devices for performing security-related "actions."
May 5, 2022

Article

Cloud Native Security vs 3rd Party Security

Customers often ask if they should adopt the tools developed by the cloud platforms themselves, or if it’s better to invest in third-party offerings.
May 5, 2022

Article

Defining Organizational Cloud Security Responsibilities

To be effective, security and compliance teams must align with business goals and objectives, and they must not be a bottleneck to productivity.
May 5, 2022

Article

Core Tenets of a Cloud Native Security Platform (CNSP)

CNSPs share context about infrastructure, PaaS services, users, data and application workloads across platform components to enhance protection
May 5, 2022

Article

What Is a Cloud VPN?

A cloud VPN (aka a virtual private network as a service or hosted VPN) is a new type of VPN technology that’s specifically designed for the cloud.
May 5, 2022

Article

What Is Infrastructure as a Service?

Infrastructure as a Service (IaaS), is the most impactful computing paradigm to emerge since the boom of the Internet.
May 5, 2022
Displaying 1 - 30 of 245
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9

Get the latest news, invites to events and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Tech Insider
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Newsroom
  • Careers
  • Contact Us
  • Product Certifications
  • Manage Email Preferences
Report a Vulnerability
Create an account or login

Copyright © 2022 Palo Alto Networks. All rights reserved