By Source

By Technology

By Services

By Audience

Displaying 10561 to 10590 of 10690

Palo Alto Networks and Tufin

As organizations deploy multiple security solutions to safeguard corporate networks from wide-ranging threats, it becomes increasingly difficult to perform labor-intensive and error-prone tasks such as risk analysis, change management, auditing and compliance checks. Palo Alto Networks and Tufin® have partnered to help customers increase operational efficiency and reduce risk by intelligently automating firewall policy management.

  • 0
  • 1262

Exploit Kits: How to Protect Your Organization

Today’s attackers are using exploit kits to automatically find vulnerabilities in common systems. As the use of these attacks increase, so does your chance of being compromised. In order to better protect your organization, you’ll need to understand the inner workings of exploit kits.

  • 0
  • 114

Traps PCI Compliance

The theft of credit card data continues to grow at an alarming rate. It is costly to credit card companies and merchants, and it undermines consumer confidence. The Payment Card Industry has developed the PCI Data Security Standard (PCI DSS), which includes 12 requirements for protecting cardholder data. Despite substantial investments made in securing their networks, organizations are realizing that being PCI compliant does not mean an enterprise is protected against advanced cyberattacks.

  • 1
  • 3642

Threat Review: The Anatomy of a Targeted Attack

Targeted attacks represent some of the most dangerous threats facing a modern enterprise. While these threats remain relatively rare, they often target your most valuable assets and intellectual property. The use of custom malware and attack strategies also makes them some of the most difficult IT security threats for you to detect. In this episode of the Threat Review, we will analyze a real-world example of a targeted attack exposed by WildFire, including an analysis of the malware industry that supports targeted attacks, and best practices to protect your network today.

  • 0
  • 466

How to Detect and Stop Modern Cyberattacks

Modern threats are forcing businesses to fully examine the lifecycle of cyberattacks and advanced persistent threats (APTs). During this webcast we review real world data on cyberattacks and dissect the 5 steps of an advanced attack designed to evade security controls.

  • 0
  • 423

Traps Advanced Endpoint Protection Named a Gartner Visionary

Gartner has recognized Traps advanced endpoint protection as a Visionary among endpoint security products. Read the full report.

  • 3
  • 5210

SCADA and Industrial Control Systems Industry Solution Brief

Get an overview of how Palo Alto Networks security platform can help protect your critical assets and enable a least privilege access control model in your control networks.

  • 1
  • 5104

Firewall Nowej Generacji: wszystko co musisz wiedzieć

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Polish.

  • 3
  • 978

Decrypting SSL for Traffic Inspection

SSL is a growing category of network traffic that delivers private and secure communications. However, it can also be used inappropriately to hide application usage, transfer data to unauthorized parties, and mask malicious activity.

  • 2
  • 1663

Firewall Expert Series: Guarding Mobile and Remote Users with GlobalProtect

Hear how our next-generation firewall delivers protection to remote users as if they never left your corporate campus, and enforces your policies regardless of location.

  • 0
  • 183

Major Western Military Service

This major western military service unit provides network defense for all of its major commands and leadership globally. The service operates, maintains and defends its networks across myriad sites globally. It provides the service’s first and second lines of defense against all of the network’s external and internal threats.

  • 0
  • 301

Function Control

A quick discussion on why application function control is critical to enabling applications, followed by a demonstration of how Palo Alto Networks can control functions.

  • 1
  • 1079

Next Generation Firewall: alles was Sie wissen müssen

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in German.

  • 1
  • 1198

Migrating from Cisco ASA to Palo Alto Networks - Russian

Посмотрите вебинар, чтобы понять, насколько простой переход на платформу нового поколения для сетевой безопасности. Наши продакт менеджер и консультанты расскажут о фундаментальной разнице между Cisco ASA и Palo Alto Networks, а также поделятся лучшими кейсами и практиками миграции.

  • 0
  • 897

Palo Alto Networks and Citrix Webinar: Best Practices to Secure Your Virtual Desktop Solutions

Realizing the benefits of desktop virtualization depends on ensuring the security and availability of the virtual desktop infrastructure. Watch this Palo Alto Networks and Citrix webinar to learn the best practices on how to secure Citrix XenApp and XenDesktop deployments using Citrix NetScaler and Palo Alto Networks next-generation firewalls.

  • 0
  • 866

Palo Alto Networks and Swivel

IT Managers are facing ever-increasing demands to secure remote access to corporate applications and data. The proliferating use of personal devices such as smartphones, laptops or tablets within the corporate environment introduces additional security issues. Palo Alto Networks is partnering with Swivel Secure Ltd. to provide its mutual customers with an extremely secure, flexible, and easy to manage remote access solution.

  • 0
  • 266

Palo Alto Networks and Lancope

Performance and accountability of enterprise IT infrastructure has shifted from an incidental focus to one that requires real-time visibility for proactive monitoring and compliance. Traditional network security devices posed a blind spot for network monitoring and management solutions for basic network parameters such as NAT tables and traffic sessions.

  • 0
  • 525

Wireless Networks Solution Brief

Enterprise mobility is changing the ways that people work and the devices they use. It’s also changing the network infrastructure needed to support the devices on business networks. Wireless interfaces are the network connectivity standard for tablets and smartphones, and even some laptops such as ultrabooks and the Apple MacBook Air. As a result, wireless networking is now ubiquitous. It’s found at corporate and branch offices everywhere, including at organizations that have taken conservative positions on wireless networking in the past, such as hospitals, banks, and government offices. With all of this rapid growth, questions arise on whether the proper security is in place to protect the traffic and keep it free of malfeasance and impropriety.

  • 2
  • 1882

Control the Risks in Allowed Applications

How Palo Alto Networks provides secure application enablement—first by allowing the application and then scanning it for threats to protect users and your network.

  • 3
  • 3208

Palo Alto Networks and Avaya Partnership

Palo Alto Networks and Avaya™ have partnered to provide high-performance next-generation security solutions for data center networks. The mission critical data centers of today have no tolerance for disruptions in throughput or availability. At the same time, the threats imposed on data centers by modern malware require a security solution that has next-generation firewall intelligence.

  • 0
  • 1394

Introducing the PA-7050 - The Fastest Next-Generation Firewall (Hebrew)

Your business groups have a seemingly insatiable need for more bandwidth. Recent high profile attacks that use port 80, or SSL to hide, and leverage commonly used applications like FTP and RDP for exfiltration are driving the need to increase your security posture. Which do you choose? Performance or security? Easy – Both.

  • 0
  • 146

Firewall Expert Series: Application Function Control with Palo Alto Networks

Hear examples of how Palo Alto Networks can securely enable application features and functions while blocking others in this 30 minute Firewall Expert Series.

  • 0
  • 310

Palo Alto Networks and Aruba Networks

Aruba Networks and Palo Alto Networks have partnered to provide best of class content security for guest and employee owned mobile devices that are now commonplace on enterprise networks. With the certified solution, enterprise IT departments can now securely enable Bring Your Own Device and Guest Access initiatives, while maintaining compliance. Aruba’s Wi-Fi network and Palo Alto Networks’ next-generation firewalls share user, device and application information to monitor and enforce application usage policies on smartphones, tablets and laptops.

  • 0
  • 5081

Palo Alto Networks and Citrix Partnership

The number of smartphones and tablets accessing data on the corporate networks is exploding. Some of these devices are enterprise owned, while many others are user owned. The new IT challenge deals with balancing security with end-user freedom, particularly on personally owned devices. These challenges intensify when considering the increasing demand for application and data access on smartphones and tablets. These devices and apps create new threat vectors that must be addressed by IT executives to prevent data leakage of sensitive corporate information.

  • 0
  • 213

Firewall Expert Series: Decrypting SSL for Traffic Inspection

Encryption is essential for information privacy, and the use of this technology is growing. While encryption provides benefits, it can also present challenges in terms of threat prevention and policy enforcement.

  • 0
  • 564

Protect All Users

As users become more mobile, you must find new ways to secure your users, who expect to connect and work from any location. This video shows how you can extend the enterprise security for your users to provide consistent protection regardless of location.

  • 2
  • 976

Simplifying Security Management

A brief discussion and demo on how Palo Alto Networks can help you simplify security management while increasing control over applications, users and content traversing your network.

  • 2
  • 1112

Next-Generation Security For your Next-Generation Data Center

Watch to learn what network security challenges to consider when building your private cloud, why existing data center security solutions do not work, and how our next-generation security platform can help.

  • 0
  • 1454

Migrating from Cisco ASA to Palo Alto Networks - French

Nous vous invitons à visualiser notre webinar sur la « migration de Cisco ASA vers Palo Alto Networks » Vous verrez lors de cette session comment il est facile de passer à une plate-forme de sécurité de nouvelle génération. Nous vous expliquerons les différences fondamentales entre Cisco ASA et Palo Alto Networks, avec les illustrations des meilleures pratiques migratoires, des exemples et des études de cas.

  • 0
  • 495
Displaying 10561 to 10590 of 10690