By Technology

By Services

By Audience

Displaying 31 to 60 of 2499

AutoFocus Privacy Datasheet

This datasheet provides Palo Alto Networks customers using AutoFocus with information needed to assess the impact of this service on their overall privacy posture.

  • 1
  • 97

WildFire Privacy Datasheet

This document provides the customers of Palo Alto Networks with information needed to assess the impact of WildFire on their overall privacy posture.

  • 1
  • 257

What Could The Next Ransomware Note Say? Let’s Learn from 2016

While ransomware threats are mostly an unknown entity to everyday consumers and Internet users, the widespread havoc these types of attacks have waged on healthcare organizations during 2016 started hitting a little too close to home. Ryan Olson weighs in on the maturation and and business model of ransomware.

  • 0
  • 450

É hora de adotar uma nova definição para a palavra “prevenção”

Em discussões sobre cibersegurança uma das palavras mais utilizadas é “prevenção” e uma das indagações mais frequentes é como prevenir de ataques cibernéticos antes que eles sejam executados e registrem sucesso? Essa é uma questão importante com a qual as equipes de segurança têm de lidar diariamente.

  • 1
  • 368

California State University

Read how Palo Alto Networks Next-Generation Security Platform met all the CSU’s key objectives with a single platform and single vendor solution.

  • 0
  • 144

Palo Alto Networks Reports Fiscal First Quarter 2017 Financial Results

Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced financial results for its fiscal first quarter 2017 ended October 31, 2016. Total revenue for the fiscal...

Santa Clara, CA
  • 1
  • 393

Do You Need a Threat Intelligence Team?

I have the great opportunity to spend time with CSOs and IT executives to understand their cybersecurity concerns and help them map out a strategy for success. An increasingly common question I’ve been hearing is, “Does my organization need a threat intelligence team?” Adding threat intelligence capabilities to your organization can be valuable, with their ability to hunt for advanced attacks; profile never-before-seen malware, campaigns or adversaries; and really think like an attacker.

  • 0
  • 287

Protect Your Microsoft Endpoints From Known and Unknown Threats

Read how a next-generation security platform equipped with advanced endpoint protection prevents endpoints on your Windows system from known and unknown threats.

  • 1
  • 89

Telstra and Palo Alto Networks Cybersecurity Roundtable

Watch Telstra’s Mike Burgess and Palo Alto Network’s Sean Duca in this Cybersecurity Roundtable hosted by The Australian.

  • 0
  • 119

Palo Alto Networks to Present at Upcoming Investor Conferences

Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced that members of its management team will be presenting at the following financial community events: Credit...

Santa Clara, CA
  • 0
  • 92

In 2017, ransomware and SaaS challenges will persist in healthcare

2016 was the year of ransomware in cybersecurity, and it was especially impactful in healthcare. For this post, I’ve laid out a few predictions about the type of threats that the healthcare industry will face in 2017. Also, I’ve organized my predictions into “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.

  • 0
  • 419

Data integrity, the next big threat

Imagine in a 2016 remake of the classic film Gaslight, a young security professional is driven to the brink of insanity – and impending disaster – by a cyber schemer who unbeknownst to IT security has over time moved around and corrupted bits of data, manipulating, let's say, the design of a jumbo jetliner or perhaps the composition of a vaccine, to execute an unspeakable attack.

  • 1
  • 398

MeriTalk - Pedal to the Metal:
Mitigating New Threats Faster with Rapid Intel & Automation

Cyberattacks are one of the most pressing national security and economic concerns of governments around the world. Government agencies are taking an “all-in” approach to fight back, sharing more cyberthreat information with one another and purchasing threat feeds. However, with the influx of threat data, many agencies are having difficulty using these insights to update their sensors with real-time protection and reconfigure their defenses on the fly. And during a cyberattack, responding quickly is crucial to minimizing potential damage.

  • 0
  • 59

Executive Advisory Report - Exploit Kits

As recent headlines illustrate, malicious actors are improving their ability to compromise organizations with increasing usage of automated tools to scaletheir attacks. The malware distribution mechanism that malicious actors are coming to rely on in order to generate profits from their activity, like holding files for ransom or stealing information for resale, are exploit kits. Exploit kits are server-based frameworks that automate the exploitation of vulnerabilities on target machines, most commonly while victims are browsing the web. While an increasingly urgent challenge, exploit kits can be thwarted with the right security technology and risk management processes. Unit 42, the Palo Alto Networks® threat intelligence team, recently released an in-depth report on exploit kit history, evolution and effective defenses.

Santa Clara, CA, USA
  • 0
  • 513

5 Things That Shape The Security Solution Provider Of The Future

One thing is clear about security: it is changing perhaps faster than any other industry. For partners, that means there's a need for a new business model when it comes to security, Palo Alto Networks Senior Vice President of Worldwide Channels Ron Myers said.

  • 0
  • 409

Electric Transmission Data Networks Use Case White Paper

This use case provides a high-level reference design for network security in electric transmission data networks.

  • 0
  • 128

App-IDs for Industrial Control Systems and SCADA Networks

View a listing of the application identifiers, or App-IDs, supported by the Palo Alto Networks Next-Generation Firewall for Industrial Control Systems (ICS).

  • 0
  • 132

Traps Advanced Endpoint Protection AV-Comparatives Award

AV-Comparatives, the independent organization that tests and assesses antivirus software, presented Traps the Approved seal in its inaugural Approved NextGen Security Award. The firm conducted a series of malware protection and exploit prevention tests on Traps during September and October 2016. Download the report to view the results of this test.

  • 0
  • 967

Palo Alto Networks Premium Plus Support

Premium Plus Support ensures your business continues to operate at peak performance and your business functions are kept secure and available.

  • 4
  • 3499

3 Requirements to Safely Enable Microsoft Office 365

This brief describes three key security requirements to safely enable Microsoft Office 365.

  • 0
  • 81

Nigerian Scammers: Then and Now

The image that the expression “Nigerian scammer” conjures up in most people’s heads is still that of the confidence man behind the keyboard, convincing victims that they have the opportunity to get a hefty sum of money if they only send some first, or pretending to be a man or woman in love with the victim and needing money to get out of some difficulty or another.

  • 0
  • 205

What the next president needs to do on cyber

With Election Day upon us, we are getting closer to ushering in a new administration in the White House. Significant progress on cybersecurity policy has been made in the past decade in both Republican- and Democrat-led administrations, and we look forward to the incoming administration making further strides in the next four years. Federal CSO John Davis provides recommendations for the next administration in Federal Computer Week.

  • 0
  • 489

How to Securely Migrate to Microsoft Cloud

This brief highlights how organizations can securely migrate to the Microsoft Cloud.

  • 0
  • 83

SILVERTERRIER: The Next Evolution in Nigerian Cybercrime

Unit 42 tracks Nigerian Threat Actors and finds they’ve evolved into capable and formidable adversaries successfully attacking major companies and governments.

  • 0
  • 249

Cybersecurity and Election Time: How to Avoid Being a Victim

The 2016 U.S. presidential election is a global phenomenon, but candidates aren’t the only ones vying to connect with the people. Behind the scenes, stealthy cybercriminals are immersing themselves in the political banter, gathering information and intel to drive their own agendas. What exactly motivates a cyber attacker to take advantage of elections?

  • 0
  • 195

Palo Alto Networks to Announce Fiscal First Quarter 2017 Financial Results on Monday, November 21, 2016

Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced that it will release its financial results for its fiscal first quarter 2017 ended October 31, 2016 after U.S. markets close on Monday, November 21, 2016. Palo Alto Networks will host a conference call that day at 1:30 p.m. Pacific Time (4:30 p.m. Eastern Time) to discuss the results.

Santa Clara, CA
  • 0
  • 192

Nigerian Prince scammers now a 'formidable threat'

According to a research report and accompanying blog post by Palo Alto Networks' Unit 42 threat research team, the Nigerian cybercriminals traditionally known for their 419 advance-fee scams have evolved from silly spray-and-pray email spam campaigns to more refined con games that target large business organizations with malware and fetch princely sums totaling millions of dollars.

  • 0
  • 417

Palo Alto Networks CEO: When And Why SMBs Buy Security Platform Offerings

Buying triggers for security customers can range from seeing a hack in headlines to word-of-mouth recommendations, but Palo Alto Networks CEO Mark McLaughlin said in the security platform business, it’s often detection alerts from a company’s own systems. “The biggest [buying trigger] is the overwhelming number of just detection alerts that are happening,” said McLaughlin. “This would be true in a very large enterprise, but it would probably be even more painful in smaller businesses.”

  • 0
  • 465

3 Key Requirements for Safely Enabling Microsoft Apps on the Network

This brief highlights 3 key requirements for safely enabling Microsoft applications on the network.

  • 0
  • 62

Endpoint Security: That was then. This is now.

Times have changed, and so should your endpoint security solution.

  • 1
  • 173
Displaying 31 to 60 of 2499