Date

Education and Professional Services

Displaying 31 - 60 of 4376

Datasheet

QuickStart Services for Strata

Read about the QuickStart Services for Strata help you increase your security capabilities and investments by helping you plan and execute your firewall-as-a-platform implementation.

Video

Lightboard series: Extend the power of SOAR with Threat Intelligence Management

Quick overview of Cortex XSOAR with threat intel management and how it enables security to leverage proven capabilities of SOAR and close the gap between tools, process and people.

Infographic

Where do you need a virtual firewall?

View this infographic to explore the use cases for a virtual firewall.

Video

Digital Anarchist+Prisma Cloud at RSA 2020: IaC vulnerabilites, shift left security, shared reponsibility model.

Prisma Cloud and Digital Anarchist discuss cloud security at RSA 2020.

Video

Digital Anarchist+Prisma Cloud at RSA 2020: Container security, DevSecOps, multi-cloud, cloud native security.

Prisma Cloud and Digital Anarchist discuss containers and cloud native security at RSA 2020

Use Case

Cortex XSOAR Application Development Case Study

Discover how an Application Developer uses Cortex XSOAR to scale their secuirty operations by reducing alerts, automating repetitive tasks, and leveraging investigative playbooks.

Research Reports

How Enterprises Respond to the Incident Response Challenge

Dark Reading recently surveyed IT and cybersecurity professionals from a variety of businesses and organizations. According to their new report, 94% of enterprises feel the first 24 hours after discovering a cyberattack are the most critical. They also found that, despite increasing emphasis on the importance of effective and timely incident response, security teams may actually be overconfident in assessing their current IR capabilities.

Use Case

Cortex XSOAR Energy Utility Case Study

Cortex XSOAR in an Electric Utility Company

Datasheet

Launch a Virtual SOC Today with Cortex XSOAR

When your workforce goes remote, it’s time to rethink your business processes and tool strategy for optimum collaboration. A shift to virtual work is redefining how teams interact and complete complex tasks together. For security professionals, quickly overcoming the challenges of operating a virtual security operations center (SOC) is critical to maintain business continuity and protect the organization from emerging threats.

Datasheet

Cortex XDR

Hunt down and stop stealthy attacks by unifying network, endpoint, and cloud data

In The News

How security and DevOps teams can agree on cloud infrastructure

Matt Chiodi, Chief Security Officer for Public Cloud at Palo Alto Networks, talks with Greg Otto on how his company is helping enterprises set up cloud instances that help both development and security teams get their job done through their Unit 42 Cloud Threat Report.

In The News

The security implications of cloud infrastructure in IoT

Cloud computing is now at the center of nearly every business strategy. But, as with the rapid adoption of any new technology, growing pains persist.

In The News

Zyxel Flaw Powers New Mirai IoT Botnet Strain

In February, hardware maker Zyxel fixed a zero-day vulnerability in its routers and VPN firewall products after KrebsOnSecurity told the company the flaw was being abused by attackers to break into devices.

White Paper

Secure Transformation: Replacing Remote Access VPN with Prisma Access

This solution brief provides an overview for using GlobalProtect Cloud Service as remote access VPN.

Video

Cortex XDR: Rewire your security operations

Security teams are drowning in alerts, but still can’t find the threats that matter. Siloed tools and data sources lead to disjointed analytics, complex investigations and missed attacks.

Guide

Securing Remote Workforces with Prisma Access

Learn to secure remote workforces with Prisma Access. Prisma Access is a Secure Access Service Edge (SASE) solution for securely connecting users anywhere they are, to applications and services everywhere, including the cloud (public and private), SaaS, your data center and the Internet.

Unit 42

Don’t Panic: COVID-19 Cyber Threats

Threat actors are taking advantage of COVID-19 with new cyber threats so we've outlined how to protect yourself and your organization.
Ryan Olson,

White Paper

Cortex XDR

Security teams face a dizzying array of threats, from ransomware and cyberespionage to fileless attacks and damaging data breaches. However, the biggest headache for many security analysts is not the endless number of risks that dominate news headlines but the frustrating, repetitive tasks they must perform every day as they triage incidents and attempt to whittle down an endless backlog of alerts.

Webinar

Running Your SOC Remotely - How Cortex XSOAR Will Get You There

As we all suddenly find ourselves working remote, we know this is a critical time for security operations teams to stay connected and overcome the shifting challenges of protecting their organizations.

Webinar

Cortex XSOAR Demo: Running Your SOC Remotely

Watch ondemand webinar where we share an overview of Prisma Accessby Palo Alto Networks, the cloud-delivered firewall platform that enables state & local governments and educational institutions to quickly provision new remote workers and students while maintaining their organization’s security posture.

Other

Cortex XSOAR Overview

CortexTM XSOAR is a comprehensive security orchestration, automation and response (SOAR) platform that unifies case management, automation, real-time collaboration and threat intel management to serve security teams across the incident lifecycle.

Webinar

Securely Connect and Scale Remote Workforces

Watch this on-demand webinar where our Field CTO Jason Georgi will walk through architecture and configuration options, share customer examples, and answer questions about deployment and scalability.

In The News

Cloud Misconfig Mistakes Show Need For DevSecOps

Unit 42 researchers discuss public cloud misconfiguration issues that are leading to breaches of sensitive data.

Unit 42

New Mirai Variant Targets Zyxel Network-Attached Storage Devices

Unit 42 researchers discovered a new Mirai variant, dubbed Mukashi, exploiting CVE-2020-9054 to infect vulnerable versions of Zyxel network-attached storage (NAS) devices.
Ken HsuZhibin ZhangRuchna Nigam,

Datasheet

Decoding Network Security - Don’t Be Fooled by Cryptic Information from Vendors Touting Cheap Firewalls

Don’t be fooled by misleading and cryptic datasheet numbers

White Paper

Palo Alto Networks & Securonix Integration Guide

For technical details and to configure the integration between our two products, download this integration guide.

White Paper

How Palo Alto Networks Next-Generation Security Platform Supports Use of the NIST Cybersecurity framework

Since the release of the Cybersecurity Framework (CSF) by the U.S. National Institute of Standards and Technology (NIST), organizations worldwide have implemented the framework to better understand and manage cyber risk. The CSF can be applied to businesses of all sizes, across regions and industries, and is being incorporated into national risk frameworks around the globe. Given its proven ability to aid in risk management and reduction, some industries have even begun to mandate its implementation. Namely, the White House recently issued an executive order requiring all federal agencies to immediately begin using the CSF to assess and manage cyber risk to protect critical infrastructure in their enterprises. Designed to foster positive and productive risk and cybersecurity management dialogue among internal and external business stakeholders, the CSF provides a common language for all appropriate teams, spanning IT, operations, security, finance, C-suite and board of directors. Based on this open dialogue, organizations can more effectively quantify risk and prioritize investments to mitigate it. Palo Alto Networks® Next-Generation Security Platform aligns with the CSF’s primary directive of enabling critical infrastructure operations to effectively identify, manage and reduce cyber risk. Rooted in prevention, the Next-Generation Security Platform is natively integrated to counter cyberattacks before they manifest in an organization’s environment. With full visibility into traffic – across the network, endpoints and the cloud – organizations can prevent cyberattacks based on how or where applications and data reside or are being used. This allows critical infrastructure organizations to identify the most serious ongoing threats to key business operations and reduce overall cybersecurity risk. Download this white paper to explore the benefits of the CSF and how Palo Alto Networks Next-Generation Security Platform capabilities map to and fulfill CSF subcategories.

White Paper

Security Offerings: Buyer Beware

Cost is only one of many variables to consider when evaluating your security platform provider. Are you investing in the right security?

White Paper

Minimize Role-Based Access Control Challenges with Dynamic User Groups

Available with PAN-OS® 9.1, Dynamic User Groups (DUGs) solve RBAC challenges by allowing admins to change a user’s group membership on the Next-Generation Firewall instantaneously, without waiting for changes to be applied in the directory.

Resource

What is SOAR?

Security orchestration, automation, and response (SOAR) is technology that helps security operations teams automate workflows between disparate tools and teams.
Displaying 31 - 60 of 4376