By Type

By Product Category

Education and Professional Services

  • Cybersecurity Academy (4)
Displaying 1 to 27 of 27


Learn about our existing application identifiers for ICS & SCADA networks, how you can develop your own using custom App-ID decoders, and how you can submit a request for new App-IDs.
  • 3
  • 2170

Security Reference Blueprint for Industrial Control Systems White Paper

How to build security into your ICS and SCADA networks
  • 3
  • 3082

Guide to Securing Microsoft Office 365 for the Enterprise

This paper describes how the Palo Alto Networks Security Operating platform secures your data in Microsoft Office 365 and other cloud applications..
  • 6
  • 1449

Cybersecurity Reference Blueprint for Building Management/Automation Systems

This white paper presents a cybersecurity reference blueprint for Building Management/Automations Systems (BMS/BAS)
  • 0
  • 385

How to Secure Your Business in a Multi-Cloud World

This paper highlights an innovative security approach that eliminates the wide range of cloud risks that can cause breaches, while enabling organizations to achieve consistent and frictionless cloud protections for multi-cloud environments..
  • 2
  • 2673

USE CASE: Grow and Maintain Cyber Skills With a Cyber Range

Repurpose existing talent, grow, test and maintain cyber skills with a Cyber Range using Palo Alto Networks Next Generation Security platform for your Blue team..
  • 6
  • 4344

Applying VLAN Insertion in ICS/SCADA PDF

Network segmentation is a critical, fundamental building block in today’s modern process controls networks (PCN). Once thought to be an optional practice, the recent increase in attacks on ICS/SCADA systems shows it is vital to network design and security implementation. Case studies on both the Target® and the more recent Ukraine electrical grid attacks indicate that these attacks were containable – even preventable – had the proper network segmentation been in place.
  • 1
  • 1330

Remote Access for ICS and SCADA PDF

White paper discussing how remote access can be supplied to both greenfield or brownfield deployments into an automation network.
  • 1
  • 525

21st Century SCADA Security with Mario Chiock (WP)

SCADA and Industrial Control Systems experience unprecedented levels of agility, speed, and cost savings with the adoption of information technology and increased connectivity to supporting networks. However, with this modernization have also come undesired IT vulnerabilities and other threat vectors which are increasingly being exploited by malicious actors. The need for improved security in ICS has never been higher and has become a board-level issue for many organizations. In this paper Mario Chiock, Cybersecurity & Disruptive Technology Executive Adviser and Del Rodillas Senior Manager, SCADA and Industrial Controls Cybersecurity go through the nine core capabilities that define this 21st century security platform for industrial control systems.
  • 5
  • 4808

Electric Transmission Data Networks Use Case White Paper

Read this use case white paper based on real world designs to learn: How to better secure your Electric Transmission Data Networks from advanced cyberthreats How to more efficiently and comprehensively address your NERC CIP compliance obligations
  • 1
  • 740

State of the Cybersecurity Nation: Legislation and Europe’s Security Professionals

With both the threat landscape evolving rapidly and regulatory requirements becoming more demanding, organisations are struggling to prepare for cybersecurity incidents. .
  • 13
  • 282

Murrumbidgee Irrigation

The importance of protecting SCADA systems has never been greater than is the case today. With SCADA systems scattered across its vast irrigation infrastructure, Murrumbidgee Irrigation lives this challenge every day. When security penetration testing pinpointed potential security deficiencies, Murrumbidgee Irrigation embarked on an initiative to transform its security network architecture. After comparing different solutions and testing many of them, Murrumbidgee Irrigation chose Palo Alto Networks® Next-Generation Security Platform. In addition to providing the company’s small ICT team with a single point of contact for multiple areas of its security environment, the platform enabled Murrumbidgee Irrigation to move from a largely reactive security posture to one that is predictive.
  • 1
  • 786


This paper provides a deeper look at Traps advanced endpoint protection features, functionality, and technical architecture.
  • 6
  • 2953

The Lines Company

New Zealand utility bolsters security posture, cost savings and productivity gains with Palo Alto Networks
  • 2
  • 3088

Next-Generation Security Platform for Critical Infrastructure

In this white paper, learn how implementing an Enterprise Security Platform will help SCADA and ICS operations solve some of their challenges.
  • 4
  • 3728

Protect the Endpoints in ICS/SCADA PDF

Protect the Endpoints in ICS/SCADA PDF
  • 2
  • 1104

Industrial IoT and PCI Compliance Simplified

As an industry leader in retail fuel monitoring and diagnostics, Warren Rogers Associates (Warren Rogers) manages thousands of data collection devices installed at service stations across the U.S. Because these devices reside alongside its customers’ business systems that handle credit and debit card data, Warren Rogers had to guarantee it would prevent cardholder data from being collected to ensure PCI DSS compliance.
  • 1
  • 2759

How to Architect “Zero Trust” Network Segmentation in Industrial Control Systems

CS environments are typically “flat”, designed with a rudimentary security posture never intended to be connected to the corporate network nor the Internet for that matter. The trend towards connectedness persists and this, along with the rising ICS threat landscape has made ICS a prime target for cyberattacks. Stronger access controls are critical for managing the different attack surfaces.
  • 0
  • 207

Traps for NERC CIP (WP)

This white paper explains how Palo Alto Networks advanced endpoint protection product, Traps, helps healthcare organizations comply with HIPAA regulations – primarily in the areas of malware and exploit prevention. Traps can also serve as a compensating control for unpatchable systems like Windows XP, Windows Server 2003 and medical devices.
  • 3
  • 996

Exposing Common Myths Around Cyberthreats to SCADA and ICS

While awareness over the need for improved cybersecurity in SCADA and Industrial Control Systems (ICS) has improved in recent years, several inaccurate and dangerous assumptions about ICS cybersecurity best practices and the nature of cyber threats still persist. If held by organizations as fact, these myths could result in inadequate cyber-defensive measures and a high level of exposure to a range of attacks or even simple accidental cyber incidents both of which could have equally concerning consequences to process availability and safety.
  • 2
  • 465


Get an overview of how Palo Alto Networks security platform can help protect your critical assets and enable a least privilege access control model in your control networks.
  • 4
  • 6717
Displaying 1 to 27 of 27