Resource Center

Our library of online content is here to help you learn more—no matter what format you prefer or which topic interests you most.

Explore resources

CLEAR

Filters

Results
Displaying 13–30 of 93 Results
Resource

What is a Threat Intelligence Platform

Read the story
Research Reports

Gartner® Market Guide for SOAR

Explore research reports
References and Case Studies

Turkcell Cyber Defence Center SOARs with Palo Alto Networks

Read the customer story
Press Release

Palo Alto Networks NextWave Program Empowers the Threat Response Community With XDR for Incident Response Fueled by MSSP Demand

Press Release
Webinar

FY23Q1 | CRTX | SOAR | Less Busywork, More Security - SecOps Top Use Cases

Watch the video
asset pdf thumbnail
Services

QuickStart Service for Cortex XSOAR SOAR Hosted Multi-Tenant Edition

Read the story
Press Release

Palo Alto Networks Unit 42 Helps Customers Better Address Cybersecurity Threats Through New Managed Detection and Response Service

Press Release
References and Case Studies

Inspira’s Cyber Fusion Centers automate incident response with Cortex XSOAR

Read the customer story
asset pdf thumbnail
White Paper

How SOAR is transforming threat intelligence

Download the whitepaper
References and Case Studies

Banco de Galicia y Buenos Aires automates incident response at the SOC with Cortex XSOAR

Read the customer story
Resource

What Is Threat Intelligence Management?

Read the story
Webinar

SOAR Beyond the SOC: Practical Automation Use Cases for Network Operations

Watch the video
Webinar

The Role Security Orchestration, Automation, and Response Tools and XDR Play in Initiating and Maintaining an Elevated Security Posture

Watch the video
Webinar

SOAR Solutions Forum 2022

Watch the video
References and Case Studies

Enabling State-of-the-Art Cybersecurity at Comprehensive Cancer and Research Center

Read the customer story
asset pdf thumbnail
Services

QuickStart Service for Cortex XSOAR SOAR Hosted Multi-Tenant Add-on

Read the story
asset pdf thumbnail
White Paper

IDC Security Automation Maturity Model

Download the whitepaper