Date

Education and Professional Services

Displaying 1 to 30 of 3979

Data Center Hybrid Cloud Overview

Data is now everywhere. Application workloads are moving across multiple data centers as well as private, public and hybrid clouds. New trends in the data center and hybrid cloud IT help organizations deliver greater business opportunities, but introduce new risks. Watch this webinar and learn how to rethink your approach to security to better protect your data and workload in the data center and across multi-cloud environments.
  • 1

WildFire Threat Analysis Service

WildFire is the industry's most advanced analysis and prevention engine for highly evasive zero-day exploits and malware.
  • 1

How to Select the Best EDR in the Market

Making a decision on endpoint detection and response (EDR) tools is complex. The MITRE ATT&CK framework is used to evaluate the efficacy and efficiency of the top EDR offerings available today. Understand where your current EDR tools stand as you learn from MITRE’s Round 1 evaluation, which tests multiple vendors across an extensive list of capabilities and techniques adversaries use in real-world attacks.
  • 1

Nesine.com Protects Sensitive Data over Four Million Customers with Palo Alto Networks Security Operating Platform

Nesine.com Protects Sensitive Data over Four Million Customers with Palo Alto Networks Security Operating Platform.
  • 1

NSS Labs NGFW Group Test Report on Palo Alto Networks PA-5220

In 1H 2019, NSS Labs performed an independent test of the Palo Alto Networks PA-5220. This comprehensive testing compared security effectiveness, performance and cost among 12 NGFW products. Palo Alto Networks achieved the highest security effectiveness score and a "Recommended" rating."
  • 1

Hybrid Data Center Best Practice Planner

The data center is evolving to allow fast and flexible application deployment. Implementing data center best practices will enable you to better protect data and application workloads in the data center on premises, and across multi-cloud.
  • 1

Palo Alto Networks Welcomes Jean English as New Chief Marketing Officer

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced the appointment of marketing veteran Jean English to the position of chief marketing officer (CMO).
Santa Clara, CA
  • 0
  • 156

Secure Transformation: Replacing Remote Access VPN with Prisma Access

This solution brief provides an overview for using GlobalProtect Cloud Service as remote access VPN.
  • 1

Secure Transformation: Branch Offices Go Directly to the Cloud

Cloud transformation is changing the ways that organizations approach enterprise networking, especially at the branch office. Learn about how to implement branch security with direct-to-internet networking.
  • 1

Achievement First

Achievement First one of the top-performing charter school networks in the U.S., adopted the Palo Alto Networks Security Operating Platform which brought next-generation security capabilities and threat intelligence to automatically detect and block malicious network traffic without impeding everyday learning activity..
  • 0

Using Wireshark: Exporting Objects from a PCAP

When reviewing packet captures (pcaps) of suspicious activity, security professionals may need to export objects from the pcaps for a closer examination.This tutorial offers tips on how to export different types of objects from a pcap. The instructions assume you understand network traffic fundamentals. We will use these pcaps of network traffic to practice extracting objects using Wireshark. The instructions also assume you have customized your Wireshark column display as previously demonstrated in this tutorial.
Brad Duncan,
  • 0

Palo Alto Networks Completes Acquisition of Twistlock

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, announced today that it has completed its acquisition of Twistlock, the leader in container security, to extend its Prisma™ cloud security strategy. .
Santa Clara, CA
  • 3
  • 668

Prisma Cloud Security Suite Expands with Twistlock and PureSec Acquisitions

The acquisitions of Twistlock and PureSec further advance Prisma leadership in public cloud security by providing customers with a comprehensive set of capabilities to secure all cloud workloads.
  • 2
  • 199

Veterans Overview

In this video, military veterans turned Palo Alto Networks employees share why Palo Alto Networks is a great place for them and their fellow vets to work.
  • 0

What Is Infrastructure as a Service?

Infrastructure as a Service (IaaS), is the most impactful computing paradigm to emerge since the boom of the Internet.
  • 0

2019 Cybersecurity Insiders Report

Read the full report to learn more the current state and perception of cloud security.
  • 6
  • 52

What is Cloud Security

Cloud Security is composed of various technologies and tools designed to protect each aspect of the shared responsibility model.
  • 1

Traps Datasheet

Palo Alto Networks Traps replaces traditional antivirus with a multi-method prevention approach that secures endpoints against known and unknown malware and exploits before they can compromise a system. Traps prevents security breaches and successful ransomware attacks, in contrast to detection and response after critical assets have been compromised. Traps Advanced Endpoint Protection: • Prevents cyberbreaches and successful ransomware attacks by preemptively blocking known and unknown malware, exploits and zero-day threats. • Protects and enables users to conduct their daily activities and use web-based technologies without concerns for known or unknown cyberthreats. • Automates prevention by autonomously reprogramming itself using threat intelligence gained from WildFire.
Santa Clara, CA
  • 34
  • 69105

Use Case: Public Cloud Security and Threat Defense for Financial Services

Read this executive-level use case on public cloud security for financial institutions to reduce cyber risk and ensure appropriate governance.
  • 1

FNTS Case Study

Nebraska-based cloud hosting and managed services provider FNTS transformed its cloud hosting environment by adopting a hyperconverged, micro-segmented, and software-defined infrastructure. Traditional security approaches did not align with this new model, instead requiring an integrated suite of security capabilities that could extend seamlessly across private and public cloud environments. To address this need, FNTS deployed the Palo Alto Networks Security Operating Platform, taking advantage of the platform’s integration with VMware NSX® network virtualization to build a Zero Trust security infrastructure across its internal and client-facing network, physical and virtual endpoints, and public cloud environments. By centrally building, managing, and enforcing granular security policies, FNTS ensures that only specific, authorized traffic is permitted into, across, and out of its multi-cloud environments. The Palo Alto Networks platform also enables FNTS to accelerate investigation and remediation of incidents as well as automate protection across the network and endpoints, saving time and building client trust.
  • 3

Cortex XDR Services

Read on to learn about the Palo Alto Networks Cortex XDR Services
  • 2
  • 3019

Cortex Platform Program Guide

The Palo Alto Networks® Cortex platform unleashes a consumption model based in software as a service, or SaaS, that allows customers to dynamically engage apps to solve a nearly boundless number of the most challenging security use cases with the best technology available.
  • 1
  • 3207

Prisma SaaS Privacy

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the service.
  • 1

What is a Firewall?

A firewall is a network security device that grants or rejects network access to traffic flows between an untrusted zone (e.g., the Internet) and a trusted zone
  • 2
  • 40100

What Are Unknown Cyberthreats?

Most traditional security products are built to act based on known threats. The moment they see something that is known to be malicious, they block it. To get past security products that successfully block known threats, attackers are forced to create something that has never been seen before, increasing the cost to execute an attack.
  • 1
  • 1105

A Quarter of People in EMEA Prefer Their Cybersecurity Managed by Artificial Intelligence in New Online Survey

Palo Alto Networks finds over half of respondents take responsibility for their data online.
  • 1
  • 140

The Gopher in the Room: Analysis of GoLang Malware in the Wild

In recent months, I have taken a keen interest in malware written in the Go programming language. Go, sometimes referred to as GoLang, was created by Google in 2009 and has gained additional popularity within the malware development community in recent years.While there have been an increased number of blogs in recent years discussing Go malware families, I wanted to know if this programming language was indeed on the rise when it pertained to malware. Additionally, I was curious what malware families would be most prevalent, as there is a notion among many that Go is primarily used by penetration testers and red teamers. With that in mind, I set out to collect as much malware written in Go as possible, and cluster it by malware family. The blog discusses my methodology of data collection and my results.
Josh Grunzweig,
  • 0

The Current State of SaaS: Usage and Risk Perspective

Based on Palo Alto Networks customer date, this infographic provides an assessment of SaaS application usage and associated risks. Understand which SaaS applications are most widely used in the enterprise (e.g. Office365) as well as specific SaaS apps and file types that are known to deliver malware and other risks.
  • 5
  • 1375

What is a Zero Trust Architecture?

Businesses who want to prevent the exfiltration of sensitive data and improve their defense against modern cyber threats can consider a Zero Trust architecture.
  • 12
  • 59737

Protecting branch networks and mobile users with Prisma Access

In this session, learn about Prisma Access, and how it delivers consistent security from the cloud to handle protection for your direct-to-internet initiatives.
  • 2
Displaying 1 to 30 of 3979