Date

Education and Professional Services

  • security life cycle review
Displaying 2281 to 2310 of 2413

Ransomware: Common Attack Methods

The three most common attack methods for ransomware attacks are: silent infections from exploit kits, malicious email attachments, and malicious links in emails.
  • 0
  • 3176

Palo Alto Networks Announces Investor Track at Ignite 2014

Palo Alto Networks® (NYSE: PANW), today announced it has acquired Morta Security, a Silicon Valley-based cybersecurity company operating in stealth mode since 2012. Financial terms of the acquisition were not disclosed.
Santa Clara, CA
  • 0
  • 405

What is an Intrusion Detection System?

Intrusion Detection System (IDS) is a network security technology originally built for detecting vulnerability exploits against a target application or computer
  • 0
  • 58027

Palo Alto Networks Delivers Next-Generation Firewall For Application Visibility and Control

Industry-First Application Classification Technology Enables Identification and Policy Enforcement of Applications Regardless of Port, Protocol or SSL Encryption
San Jose, Calif.
  • 1
  • 910

EU Cybersecurity-Related Legislation:
Why Companies Should Care

How do companies in Europe manage cybersecurity risks? Get the Executive Advisory Report: European Union Cybersecurity-Related Legislation to find out.
  • 0
  • 3298

Why Video Game Companies are Lucrative Targets for Hackers

Nintendo announced that attackers had successfully breached 23,926 Club Nintendo user accounts between June 9 and July 4. There were over 15.46 million login attempts over the same time period, Nintendo said. While users should immediately change their passwords, especially if they had reused the same one elsewhere, the prospect of phishing attacks may be a bigger concern. User names, email addresses and a password are more than enough to help an attacker break into other online accounts or target a user for spear phishing, said Wade Williamson, a senior security analyst at Palo Alto Networks. Williamson said he hasn't seen such attacks yet, but it is a plausible way for the thieves to derive value from stolen data.
  • 0
  • 1898

Women In Cyber Podcast

  • 0
  • 466

Nordson Corporation Selects Palo Alto Networks Next-Generation Firewall

Leading Maker of Precision Dispensing, Surface Treatment and Testing Equipment Deploys PA-4000 Series, Simplifies Management and Reporting, Improves Security with Granular Application Visibility and Control
San Jose, Calif.
  • 0
  • 410

Palo Alto Networks to Announce Fourth Quarter and Fiscal Year 2013 Financial Results on September 9, 2013

Palo Alto Networks, Inc. (NYSE: PANW) today announced that it will release its financial results for its fourth quarter and fiscal year ended July 31, 2013 after U.S. markets close on Monday, September 9, 2013. Palo Alto Networks will host a conference call that day at 1:30 PM Pacific time (4:30 PM Eastern time) to discuss the results.
Santa Clara, CA
  • 0
  • 303

Top Ranked US Hospital Selects Palo Alto Networks for Application Visibility and Control

Virginia Commonwealth University Health System Greatly Reduces Risk and Internet Bandwidth Consumption with PA-4000 Series Next-Generation Firewalls
Sunnyvale, Calif
  • 0
  • 358

What is an Intrusion Prevention System?

An Intrusion Prevention System (IPS) is a network security prevention technology that examines network traffic flow to detect and prevent vulnerability exploits
  • 7
  • 126088

WildFire named a leader for Automated Malware Analysis

The Forrester Wave™: Automated Malware Analysis, Q2 2016 ranks WildFire as a leader in this space, through evaluation of its current offering, its market presence, and strategy.
  • 0
  • 5173

Traps Enterprise ELA

Understand how an enterprise license agreement (ELA) help to simplify endpoint protection purchasing and deployment.
  • 2
  • 3285

Securing the Mobile Workforce

In recent years, cybersecurity has emerged as one of the top concerns for the leadership of business and government organizations around the world. The troubling number of high-profile attacks targeting some of the largest companies in the world has led many to question whether adequate measures are in place on their own networks. Sophisticated attackers are employing new techniques to penetrate a network, and using methodologies to avoid detection by masking their activities in legitimate application traffic.
  • 29
  • 3168

DELAWARE DISTRICT COURT DECLARES MISTRIAL IN PATENT INFRINGEMENT LAWSUIT INITIATED BY JUNIPER NETWORKS

Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, announced that today Honorable Judge Sue L. Robinson of the U.S. District Court for the District of Delaware (the “Court”) declared a mistrial in a lawsuit brought by Juniper Networks against Palo Alto Networks due to the jury being unable to reach a verdict.
Santa Clara, CA
  • 0
  • 420

Prisma Secures the Cloud for Major Software Provider

A prominent Fortune 1000 company with more than 10,000 workloads across 100 AWS® accounts achieved several important goals by implementing Prisma Public Cloud. This use case provides an overview of the immediate benefits Prisma Public Cloud provided, including the ability to enable forensics, achieve visibility into risk posture, and automate DevSecOps.
  • 0

NHS IT Managers Cite Prioritizing Cybersecurity as Essential to Improving Patient Trust and Care

Palo Alto Networks® (NYSE: PANW), the next-generation security company, has today released findings of independent research into the state of cybersecurity within the United Kingdom’s National Health Service (NHS).
LONDON
  • 0
  • 388

EU WildFire Cloud

WildFire Global infrastructure enables scale, agility, and leverage. Our WildFire EU Regional cloud is one them, and here is the white paper that talks about it in depth.
  • 0
  • 4395

Traps for NERC CIP (WP)

This white paper explains how Palo Alto Networks advanced endpoint protection product, Traps, helps healthcare organizations comply with HIPAA regulations – primarily in the areas of malware and exploit prevention. Traps can also serve as a compensating control for unpatchable systems like Windows XP, Windows Server 2003 and medical devices.
  • 3
  • 1011

CAME Group

CAME prevents cyberthreats from infiltrating endpoint devices and larger network through Next Generation Firewall and Advanced Endpoint Protection. Bandwidth was improved and visibility increased.
  • 1
  • 683

SSL Decryption

With Palo Alto Networks Next-Generation Firewalls, security teams can decrypt malicious traffic and preserve the privacy of sensitive traffic at the same time.
  • 1

Interop Selects Palo Alto Networks to Present at the Interop New York 2009 Conference Next Week

Palo Alto Networks Co-Founder and CTO Nir Zuk to Present “What’s Wrong with the WAN Firewall?” in the Conference’s Networking Track
San Jose, Calif.
  • 0
  • 375

As Malware Gets Smarter, Bare Metal Analysis Can Keep You Secure

Android adware has embraced an innovative way to promote potentially malicious apps: abuse Android plugin frameworks. They say a rising tide lifts all boats; unfortunately, the proverb applies to cybercriminals, too. While the inexpensive availability of compute processing power and broadband connectivity has made technologies like virtualization and cloud computing possible, that same ready access makes it possible for even a novice cybercriminal to leverage some of the most advanced malware available today.
  • 0
  • 2479

Palo Alto Networks Opens Doors to Its New Santa Clara Headquarters

New Campus, Triple in Size, Offers Collaborative Workspaces for Thousands of Silicon Valley Employees
Santa Clara, CA
  • 0
  • 2779

Annie Wright Schools

Bob Williamson of the Annie Wright Schools discusses the difficulty of BYOD policies and extended network security regarding international students.
  • 2
  • 533
Displaying 2281 to 2310 of 2413