Date

Education and Professional Services

Displaying 1 to 30 of 3094

Gartner MQ for Enterprise Network Firewalls Report

Gartner’s 2018 Magic Quadrant for Enterprise Network Firewalls Report recognizes Palo Alto Networks a Leader for the SEVENTH straight time, with the highest position in ability to execute and furthest in completeness of vision for enterprise network firewalls.
  • 0
  • 8

Palo Alto Networks Appoints Amit K. Singh as President

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced that its board of directors has named Amit K. Singh as president, effective November 1, 2018. As president, Singh...
Santa Clara, CA
  • 0
  • 1328

Government use case: Maintain the integrity of election systems

Enable citizens to exercise their right to vote, preserve trust in the process, and meet recommendations and regulations for securing the vote
  • 0
  • 810

Bridging Security Gaps with Networks-to-Endpoint Integration

The typical enterprise uses an average of 30 security products, most of which from variety of vendors and typically do not integrate well and offer little information sharing…if any.
  • 0
  • 25

Fake Adobe Flash Installers Come With a Little Malware Bonus

A recent scourge of fake Adobe installers really does provide an update to the latest version of Flash.
  • 0
  • 42

Palo Alto Networks Completes Acquisition of RedLock

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, announced today that it has completed its acquisition of RedLock Inc., a cloud threat defense company. For Palo Alto Networks, the...
Santa Clara, CA
  • 0
  • 727

Securing Developer Environments on AWS

Download this whitepaper to learn how you can secure dev environments on AWS.
  • 0
  • 794

Fake Adobe Flash Updates Hide Malicious Crypto Miners

A fake Adobe update actually updates victims’ Flash – but also installs malicious cryptomining malware.
  • 0
  • 96

Cryptomining malware discovered masquerading as Flash updates

This malware is so sneaky it updates your Flash to look legit.
  • 0
  • 82

10 Things Your Next Firewall Must Do

This paper outlines the 10 key things your next firewall must do to secure your network and your business.
  • 2
  • 6397

A flood of fake installers will really update Flash for you – but also install cryptocurrency mining malware

If you think that Flash, the once-popular web plugin, couldn’t die fast enough, even those annoying fake Flash installers riddled with malware aren’t going anywhere any time soon. In fact, they’re getting even sneakier.
  • 0
  • 90

Advanced Threat Prevention

Our WildFire™ threat analysis service integrates with Aperture to provide advanced threat prevention to block known malware, and we are the only CASB to identify and block unknown malware.
  • 0
  • 356

Expose Hidden Threats With High Performance Decryption

Download the InfoGraphic to learn more about how to expose hidden threats with high-performance decryption.
  • 1
  • 116

Mobile Network Operators Use Case Handbook

The attack surface area of mobile networks has expanded due to greater use of IoT devices, converged access, public and hybrid cloud, and shared infrastructure. Sophisticated bad actors can inject malware into this ever-growing volume of traffic distribution points, then quickly spread and morph to avoid control or detection. Operators must now expand and strengthen both their security posture and visibility into all network peering points Download the use case handbook to learn about the major security challenges, threats and vulnerabilities found in mobile networks and how the Palo Alto Networks approach can benefit mobile network operators.
  • 1
  • 393

Extended Application-Layer Visibility Across Multiple Mobile Network Peering Points

Palo Alto Networks Next-Generation Security Platform includes features that enhance application-layer protection and visibility across all network peering points.
  • 1
  • 538

Malicious Cryptomining digs into mobile

For more information, download the brief.
  • 0
  • 0

Palo Alto Networks Recognized as a Leader in Gartner Magic Quadrant for Enterprise Network Firewalls Seven Times in a Row

Palo Alto Networks® (NYSE: PANW), the global cybersecurity leader, today announced that, for the seventh consecutive time, the company has been recognized in the Leaders quadrant of the "Magic...
Santa Clara, CA
  • 2
  • 368

Transforming to a Prevention-Based Architecture

Transforming to a Prevention-Based Architecture
  • 0
  • 557

Zero Trust: A Transformation Journey

Read how to apply the Zero Trust cybersecurity strategy through transformation to a prevention-based architecture. Included are technical capabilities as well as business outcomes for each level of transformation as well as tools to measure your capabilities as you progress through the transformation journey
  • 1
  • 225

Transformation Services

Palo Alto Networks Transformation Services
  • 0
  • 529

How Government Agencies Can Avoid Becoming the Next Ransomware Victim

To help government and education institutions combat ransomware, Government Technology – with the support of Palo Alto Networks – recently produced the handbook “How to Create a Modern Ransomware Strategy".
  • 0
  • 201

Combine Network and Endpoint Security for Better Visibility, Protection, and Enforcement

This paper examines the changing threat landscape and highlights the importance of best-in-class endpoint protection working in lockstep with other security products to create coordinated and comprehensive enterprise security. Palo Alto Networks Traps advanced endpoint protection provides superior endpoint threat prevention as well as bridges the gap between endpoint security and network security, augmenting next-generation firewalls to provide stronger defense with fewer resources.
  • 0
  • 1056

Palo Alto Networks Announces Intent to Acquire RedLock

Palo Alto Networks® (NYSE: PANW), the global cybersecurity leader, today announced that it has entered into a definitive agreement to acquire RedLock, Inc., a cloud threat defence company.
Santa Clara, CA
  • 0
  • 2016

Multi-cloud security analytics

The acquisition of RedLock will add critical security analytics capabilities across multi-cloud environments to our extensive cloud security offering. The security analytics capability utilizes an innovative AI-driven approach that correlates disparate security data sets. RedLock provides comprehensive visibility, threat detection, and rapid response across an organization’s entire public cloud environment.
  • 0
  • 38

Seymour Public Schools

Seymour Public Schools was looking to replace their legacy Cisco firewalls, they checked the vulnerability of their existing system using a Security Lifecycle Review. The SLR report showed that more than 43,000 vulnerabilities were slipping past the legacy firewall. Because of this discovery they purchased the Palo Alto Networks Security Operating Platform.
  • 0
  • 18

3 Reasons to Use Policy Based SSL Decryption on Your Next-Generation Firewall

This brief highlights three reasons to use policy-based SSL decryption on a next-generation firewall.
  • 1
  • 0

Learn How Evident Protects Your Cloud Data

Evident, now part of Palo Alto Networks, keeps you secure in the public cloud by identifying potential risks and resolving them. Watch our on-demand webinar to learn about cloud security and compliance strategies to help you go fast and stay secure.
  • 0
  • 41

Prevent Hidden Threats with High Performance Decryption

Encrypted traffic is the new normal with users spending more than 80% of their time on encrypted websites and applications. Unfortunately, cyber adversaries know exactly how to use encrypted traffic to hide threats. In this video, you'll learn how to secure encrypted traffic with predictable performance, while also preserving the privacy of legitimate users.
  • 1
  • 0

3 Requirements to Safely Enable Microsoft Office 365

This brief describes three key security requirements to safely enable Microsoft Office 365 and other SaaS applications for your business.
  • 5
  • 2791

Bank Central Asia

Bank Central Asia is one of Indonesia’s leading retail banks. The bank has approximately 16 million customers, 1,213 branches, and 17,207 ATMs. It also manages a growing mobile and internet banking operation. While ATMs use dedicated connectivity for transactions, mobile transactions rely on the internet to ensure everyone has full, anytime access. However, such high exposure comes with major security risks, therefore demanding the need for advanced security protection.
  • 1
  • 150
Displaying 1 to 30 of 3094