Date

By Technology

By Services

By Audience

Displaying 2461 to 2490 of 2605

Palo Alto Networks Brings User-Specific Application Visibility and Policy Enforcement to Next-Gen Firewall

Transparent Integration with Active Directory Enables Unprecedented Ability to Define Security Policy Based on User Names and Groups

San Jose, Calif.
  • 1
  • 170

Palo Alto Networks to Share Insights on the New Enterprise Security Landscape at INTEROP New York 2007

Company VP to Discuss What’s Driving the Need for Application Visibility and Control in Today’s Web 2.0 World

San Jose, Calif.
  • 1
  • 136

Palo Alto Networks Application Alert: Meebo Adds File Transfer

Application Research Center Offers Guidance for Safe and Productive Use of Fastest Growing Instant Messaging Destination

San Jose, Calif.
  • 1
  • 210

Palo Alto Networks to Present at SANS Network Security 2007

Co-founder and CTO Nir Zuk to Share Insights on the Evolution of the Firewall

San Jose, Calif.
  • 1
  • 157

Mercy Medical Center Prescribes Palo Alto Networks for Application Visibility and Control

Top 100 Hospital Taps Next-Generation Firewall Vendor to Establish Strong Security Policies without Sacrificing Open Access

San Jose, Calif.
  • 1
  • 160

Palo Alto Networks Selects SurfControl for Integrated URL Filtering

Company’s Next-Generation Firewall Integrates SurfControl Web Filter Database for High Performance “On Box” URL Filtering

San Jose and Scotts Valley, Calif.
  • 1
  • 215

Palo Alto Networks Delivers Next-Generation Firewall For Application Visibility and Control

Industry-First Application Classification Technology Enables Identification and Policy Enforcement of Applications Regardless of Port, Protocol or SSL Encryption

San Jose, Calif.
  • 1
  • 392

Palo Alto Networks Raises $18 Million in Series B Financing

Globespan Capital Partners, Greylock Partners and Sequoia Capital Fuel Expansion of Company as it Delivers Next-Generation Firewall for Application Visibility and Control

San Jose, Calif.
  • 1
  • 215

Introducing the PA-7050 - The Fastest Next-Generation Firewall (Hebrew)

Your business groups have a seemingly insatiable need for more bandwidth. Recent high profile attacks that use port 80, or SSL to hide, and leverage commonly used applications like FTP and RDP for exfiltration are driving the need to increase your security posture. Which do you choose? Performance or security? Easy – Both.

  • 0
  • 87

Palo Alto Networks and Network Critical

Learn how the Network Critical’s tap/bypass switch optimizes full-functionality of the Next-Generation Firewall without impacting latency or availability.

  • 0
  • 276

Maintain Performance with Security Services Enabled

IT Security teams are often forced to choose between security and performance. See how the unique design of our Palo Alto Networks next-generation firewall addresses this challenge and how it has performed in independent 3rd party testing.

  • 1
  • 888

Palo Alto Networks and Nordic Edge

Palo Alto Networks and Nordic Edge have partnered to deliver a variety of different easy-to-use, reliable, and strong authentication methods.

  • 0
  • 315

Palo Alto Networks and Avaya Partnership

Palo Alto Networks and Avaya™ have partnered to provide high-performance next-generation security solutions for data center networks. The mission critical data centers of today have no tolerance for disruptions in throughput or availability. At the same time, the threats imposed on data centers by modern malware require a security solution that has next-generation firewall intelligence.

  • 0
  • 1176

Wireless Networks Solution Brief

Enterprise mobility is changing the ways that people work and the devices they use. It’s also changing the network infrastructure needed to support the devices on business networks. Wireless interfaces are the network connectivity standard for tablets and smartphones, and even some laptops such as ultrabooks and the Apple MacBook Air. As a result, wireless networking is now ubiquitous. It’s found at corporate and branch offices everywhere, including at organizations that have taken conservative positions on wireless networking in the past, such as hospitals, banks, and government offices. With all of this rapid growth, questions arise on whether the proper security is in place to protect the traffic and keep it free of malfeasance and impropriety.

  • 1
  • 1397

Threat Review Series: Lessons From WildFire, January 2012 Edition

Following the release of WildFire (Palo Alto Networks new feature for combating targeted and unknown malware), we have discovered hundreds of new types of malware that are hitting enterprise networks every day. In this edition of the Threat Review we will take a deep dive into some of the more interesting examples that we have encountered, understand how they work, how they are delivered and then provide the specific best-practices needed to combat the latest trends in malware.

  • 0
  • 115

GSA and CMAS Government Contracts

Information about the Palo Alto Networks products and services available on GSA CMAS contracts.

  • 0
  • 136

Palo Alto Networks and Enterasys Partnership

Enterprise Mobility and BYOD trends are causing significant disruption to traditional network security practices. The growth and diversity of mobile device usage combined with the requirement of anytime, anywhere access to applications and data, has presented significant operational challenges and security risk to the IT organization. Typical legacy enterprise LAN infrastructures were not architected with adequate management, visibility, and awareness necessary to adapt to today’s application security and mobile provisioning requirements.

  • 0
  • 230

Palo Alto Networks and Tufin

As organizations deploy multiple security solutions to safeguard corporate networks from wide-ranging threats, it becomes increasingly difficult to perform labor-intensive and error-prone tasks such as risk analysis, change management, auditing and compliance checks. Palo Alto Networks and Tufin® have partnered to help customers increase operational efficiency and reduce risk by intelligently automating firewall policy management.

  • 0
  • 956

Traps PCI Compliance

The theft of credit card data continues to grow at an alarming rate. It is costly to credit card companies and merchants, and it undermines consumer confidence. The Payment Card Industry has developed the PCI Data Security Standard (PCI DSS), which includes 12 requirements for protecting cardholder data. Despite substantial investments made in securing their networks, organizations are realizing that being PCI compliant does not mean an enterprise is protected against advanced cyberattacks.

  • 1
  • 3051

Palo Alto Networks for Advanced Threats

In this webinar we will talk about what Advanced Persistent Threats are and how they target Enterprises. We will also talk about our Lifecycle approach to APT mitigation and the power of WildFire.

  • 0
  • 87

Threat Review: The Anatomy of a Targeted Attack

Targeted attacks represent some of the most dangerous threats facing a modern enterprise. While these threats remain relatively rare, they often target your most valuable assets and intellectual property. The use of custom malware and attack strategies also makes them some of the most difficult IT security threats for you to detect. In this episode of the Threat Review, we will analyze a real-world example of a targeted attack exposed by WildFire, including an analysis of the malware industry that supports targeted attacks, and best practices to protect your network today.

  • 0
  • 290

Palo Alto Networks and MobileIron

Intelligent tablets and smartphones are now the primary personal communications and computing platform for Mobile IT business operations and apps. As a result, IT needs to consider how to provide secure network access to both enterprise and end user owned mobile devices. Moreover, an exponential increase in the number and usage of mobile apps is creating new threat vectors that must be addressed by IT to safeguard mobile devices and prevent data loss.

  • 0
  • 917

How to Detect and Stop Modern Cyberattacks

Modern threats are forcing businesses to fully examine the lifecycle of cyberattacks and advanced persistent threats (APTs). During this webcast we review real world data on cyberattacks and dissect the 5 steps of an advanced attack designed to evade security controls.

  • 0
  • 311

Migrating from Cisco ASA to Palo Alto Networks

Watch this webinar to learn how easy it is to move to a next-generation security platform. Our product experts and Consulting Services team will explain the fundamental differences between Cisco ASA and Palo Alto Networks and share migration best practices, examples and case studies.

  • 1
  • 2040

Next-Generation Firewall Management from Tuffin- Webinar & Demo

Please join, Michael Hamelin - Tufin Chief Security Architect and Mike Schuricht - Palo Alto Networks Product Manager, to learn more about Tufin's comprehensive firewall management and auditing solution - specifically tailored to next-generation firewalls.

  • 0
  • 440

Business Case for Next-Generation Firewalls - Video

Using a Palo Alto Networks next-generation firewall, your security team can strike an appropriate balance between blocking all personal-use applications and allowing them. Secure application enablement begins with first knowing exactly which applications are being used and by whom. This knowledge is then effectively translated into positive control model firewall policies that extend beyond traditional 'allow or deny.' The final component in our solution is giving you the ability to securely enable applications without degrading your firewall's performance.

  • 1
  • 2133

Defeat APTs and Improve Your Security Posture in Real-Time

Level the playing field by using next generation security technologies from Palo Alto Networks and Splunk. Watch this webinar to learn new innovations that will help you detect and defeat cyberthreats in real-time, perform incident investigations faster, reduce costs, and improve your overall security and compliance posture.

  • 0
  • 888

Traps Advanced Endpoint Protection Named a Gartner Visionary

Gartner has recognized Traps advanced endpoint protection as a Visionary among endpoint security products. Read the full report.

  • 2
  • 1528

Threat Review Series: Verizon Report - What You Need to Know Now

In this series we’ll analyze the recent Verizon Data Breach Investigation Report (DBIR) and malware findings from WildFire.

  • 0
  • 115
Displaying 2461 to 2490 of 2605