Date

Education and Professional Services

Displaying 31 - 60 of 4280

White Paper

Artificial Intelligence and Machine Learning in the Security Operations Center

Provides an overview of how Palo Alto Networks solutions for the SOC use artificial intelligence and machine learning to find important security events without generating low-value alerts that require analyst time, attention, and manual remediation.

Webinar

Threat Hunting 101 Webinar - on-demand

Highly skilled attackers can break into the most well-protected organizations. They can trick users, compromise hosts and devise other under-handed schemes to infiltrate targeted networks. Your mission is to find these adversaries and root them out fast--before the damage is done.

Webinar

APP-ID WITH POLICY OPTIMIZER WEBINAR - On-demand

App-ID increases the value of our next-generation firewalls by making it easier and faster to determine the exact identity of applications traversing the network, enabling teams to set and enforce the right policies. Join Palo Alto Networks experts and learn how you can use the New Policy Optimizer capability to migrate your legacy rule set to App-ID based rules.

Article

Secure Access Service Edge (SASE) Key Requirements

It is important to understand what a Secure Access Service Edge solution encompasses as you look for vendors to help you on your cloud journey.

Article

What Is SASE?

Secure Access Service Edge or SASE (pronounced sassy), is an emerging concept that Gartner recently described in their The Future of Network Security in the Cloud report, released in August 2019.

Article

What is Data Loss Prevention (DLP)?

Data loss prevention (DLP) is the practice of protecting and securing a company’s data to prevent it from being lost, stolen, accessed, or misused by unauthorized individuals.

Article

What Is Cloud Data Protection?

Cloud data protection is the practice of protecting and securing all of a company’s data in a cloud environment, regardless of where that data is located, whether it’s at rest or in motion, or if it’s managed internally by the company or externally by a third party.

Unit 42

Attacker’s Tactics and Techniques in Unsecured Docker Daemons Revealed

We found an additional 1,400 unsecured Docker hosts and outline in this research some of the common tactics and techniques being used by attackers in compromised Docker engines.
Jay Chen,

Video

Lightboard Series: Managed Detection and Response (MDR), Powered by Cortex XDR

Check out this video to learn more about our partners' services powered by Cortex XDR.

Webinar

The Most Devastating Attacks and How to Prevent Them

Sign up now to learn the steps you can take to defeat the most dangerous cyber adversaries.

In The News

Hacking becoming a profession: Palo Alto Networks CEO

Palo Alto Networks CEO Nikesh Arora argues cyber threats will only get worse as there is increasing demand for user data, but that servers are more secure now than they were even a few years ago.

In The News

Internet routers running Tomato are under attack by notorious crime gang

Internet routers running the Tomato alternative firmware are under active attack by a self-propagating exploit that searches for devices using default credentials.

In The News

U.S. Gov Agency Targeted With Malware-Laced Emails

The malicious email campaign included a never-before-seen malware downloader called Carrotball, and may be linked to the Konni Group APT.

In The News

Hackers spearphished U.S. government agency with North Korea-related content last year

In the second half of 2019, a U.S. government agency was targeted by repeated spearphishing attempts that could be from a mysterious group that has evaded attribution for years, according to new research issued Thursday by security firm Palo Alto Networks.

In The News

U.S. Govt Agency Hit with New CARROTBALL Malware Dropper

A new malware called CARROTBALL, used as a second-stage payload in targeted attacks, was distributed in phishing email attachments delivered to a U.S. government agency and non-US foreign nationals professionally affiliated with current activities in North Korea.

Unit 42

xHunt Campaign: New Watering Hole Identified for Credential Harvesting

New xHunt campaign activities show a Kuwaiti organization’s webpage used as an apparent watering hole.
Brittany AshRobert Falcone,

Article

What Is Cloud Native Security?

Cloud native security refers to tools and practices for managing dynamic application architectures. This summary discusses challenges and possible solutions.

Datasheet

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.

Video

Video: Network Security’s Future Is in the Cloud

Prisma Access, a secure access service edge (SASE) platform, brings together industry-leading security and SD-WAN capabilities in the cloud.

Webinar

Data Center and Hybrid Cloud Security Best Practices

Watch this on-demand webcast, and you’ll learn the simple way to secure modern DCs and hybrid clouds and how to consistently secure all physical and virtual networks and cloud environments.

White Paper

Cortex XDR Endpoint Protection Overview

This paper provides a deeper look at the Cortex XDR agent features, functionality, and technical architecture.

Use Case

Federal Government: Multi-Cloud Security, Governance and Compliance

The federal governments will use cloud as a new foundation to build more effective security capabilities across domains - including cyberspace. An explosion of government adoption of public, private, hybrid, and cloud services have introduced new ways to scale and deliver efficient operations across multiple cloud platforms. As federal agencies continue to transition and expand their footprint into the cloud, it is critical to ensure these systems are secure and vulnerabilities are addressed immediately.

Article

What Is a Transit Virtual Private Cloud (VPC)?

Transit VPC is an architecture that connects far-flung virtual private clouds (VPCs) or virtual networks (VNETS) to each other and remote networks.

Unit 42

The Fractured Statue Campaign: U.S. Government Agency Targeted in Spear-Phishing Attacks

Unit 42 observed several malware families typically associated with the Konni Group primarily targetting a US government agency at the height of the US interacting with North Korea.
Adrian McCabe,

White Paper

Public Cloud as Outsourcing for Financial Services

Read this white paper to learn some common areas of interest shared by financial regulators over public cloud use by financial institutions.

Datasheet

Migration Service from Traps Management Service to Cortex XDR

Read about our TMS to Cortex XDR Migration Service

Article

What Is Cloud Native?

Cloud native is an approach to designing, deploying and operating apps using cloud service providers. This article explores the relationship in detail.

Press Release

Palo Alto Networks Named a Best Place to Work for LGBTQ Equality

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today proudly announced it received a perfect score on the Human Rights Campaign Foundation's 2020 Corporate Equality Index (CEI)....
Santa Clara, CA

White Paper

Cortex XDR

Security teams face a dizzying array of threats, from ransomware and cyberespionage to fileless attacks and damaging data breaches. However, the biggest headache for many security analysts is not the endless number of risks that dominate news headlines but the frustrating, repetitive tasks they must perform every day as they triage incidents and attempt to whittle down an endless backlog of alerts.
Displaying 31 - 60 of 4280