Technology is great. People are better. “People of Palo Alto Networks” celebrates the employees who preserve our unique culture of innovation and collaboration. Episode 3 Karyn Priel Executive Coordinator
Technology is great. People are better. “People of Palo Alto Networks” celebrates the employees who preserve our unique culture of innovation and collaboration. Episode 2 Watch us break ground on our new campus. Big changes are in the future for us – want to be a part of it?
Technology is great. People are better. “People of Palo Alto Networks” celebrates the employees who preserve our unique culture of innovation and collaboration. Episode 1 Warby Warburton Manager, Technical Marketing Engineering
The oil and gas industry is the largest industry in the world. Hundreds of global enterprises are involved in exploring, extracting, refining, and transporting oil and gas products. The Palo Alto Networks Next-Generation Security Platform is the solution of choice for global oil and gas conglomerates today, ensuring the safety of intellectual property, monitoring and reporting the proper usage of networks, data, and applications, and protecting vulnerable endpoints.
Hi all. I am reviewing the "Threat" section on the Palo Alto firewall and I noticed some weird thing, perhaps it is normal, but I can't tell, thus this thread. There are couple of threat in the "Critical" category indicated with the "dropped" action. Yet when I opened the threat
Manually searching through the policies can be pretty hard if there are many rules and it's been a long day. Luckily there are search functions available to you to make life a little easier. First off, you can simply type in any keyword you are looking for, which can be
The typical journey to the cloud is based on a partnership between the cloud vendor and an enterprise or business, so the next logical question becomes: who is responsible for what, when it comes to cloud security and protecting the very important data within cloud applications? Solely relying on the cloud provider for security is not a viable approach. Rather, cloud security is a shared responsibility between the provider and the tenant that should be meticulously defined and understood by both parties. Only then can they work together to prevent …
This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017. Here’s what we predict for cloud in 2017: Sure Things A multi-cloud, hybrid security strategy will be the new normal among InfoSec teams In the last few years, the digital footprint of organizations has expanded beyond the confines of the on-premise data center and private cloud to a model that now incorporates SaaS and public clouds. To …
The Advantages of the Cloud Come with Certain Risk. Organizations must concentrate on a prevention-focused cloud security architecture for deployment — designed to stop threats across all potential attack vectors. For secure cloud adoption, there are three key questions to consider: 1. Who’s really responsible for our data? You. In public cloud environments, as the data owner, you’re responsible for your data — not the cloud service provider (CSP). And although the CSP will secure the underlying infrastructure, the safety of your applications and data is your responsibility. So you need a …
Hi, Users trying to update AdobeCC are getting blocked, the PA seems to think the below files are wildfire-virus, but when uploaded to WF they are tagged as benign. http://ccmdl.adobe.com/AdobeProducts/KCCC/1/win32/packages/ACCC_4_1_1_utils_202/Utils.zip This triggers wildfire-virus 182090415 - Win32.WGeneric.mkcan - SHA256 - f1edb3877014862c8a08a48384cffad392f11f5490bcfa4a46f03250ae7f2eda and so does CreativeCloudSetup.exe is also triggering the
Hi, There doesn't seem to be anything official on how to set up Minemeld to use corporate proxies. When trying to contact external URLs from within minemeld, it does not respect the proxy settings in either /etc/profile or /etc/default. It tries to access the Internet directly, and fails miserably,
Hello, I have a problem with json output. I have configured output node with "value":true configured but I still cant get indicator value in json format. I try to get data in this way -> https://xxx.xxx.xxx.xxx/feeds/node-1498136004722?v=json But value field in reply is empty: 0 indicator
Hi, Could you please white-list our software installer as it's marked as generic.pup on virustotal.com website which should be a false-positive. 1/ File Hash: 2a20eb78c8d47b6e1da47e476a0adf13693f1c21336bfb53590dfdb980c3f523 Current VT Verdict: generic.pup Link to Virustotal for the file: https://www.virustotal.com/en/file/2a20eb78c8d47b6e1da47e476a0adf13693f1c21336bfb53590dfdb980c3f523/analysis/1498454618/ Description: False positive detection in driver-updater-setup-auslogics.exe with Palo Alto Networks definition version 20170529 on
Some more great questions and answers posted @ Ignite 2017. I'm sure these are very helpful to anyone with similar questions. How do you record URLs without a URL filtering license? Posted answer: You can record URLs without the URL filtering license BUT there will be no correct categorization. My
File Hash: 867a8834dcdcd53b9b61b54d950d4eee77da9bb2c2b8b95b149d47c477952c74 Link to Virustotal report for the file: https://www.virustotal.com/en/file/867a8834dcdcd53b9b61b54d950d4eee77da9bb2c2b8b95b149d47c477952c74/analysis/1498305645/ Current VirustTotal Verdict: generic.ml Description: Update tool for Network Auditor application
Hello, I am new to MineMeld and was trying to figure out how to customiz the alienvault reputation prototype to only pull in values with a alienvault_reliability > 5. I have the feed setup to an stdlib.aggregatorIPv4Generic and then to a FeedHCwithValue that I customized to drop anything with an
Hi guys, I am working on migrating Juniper SRX firewall xml configs into the PAN. Everything works with the exception of the static routes. The MT logs show no errors. The version is 3.1. The vr1 instance for the interfaces shows no routes ('0'). The Juniper's xml follows this
Taken from the install guide, but is this still the correct repostitory: :~$ sudo add-apt-repository "deb http://minemeld-updates.panw.io/ubuntu trusty-minemeld main" :~$ sudo apt-get update Hit http://security.debian.org wheezy/updates Release.gpg Hit http://security.debian.org wheezy/updates Release Hit http://security.debian.org wheezy/updates/main Sources Hit http://security.debian.org wheezy/updates/main amd64 Packages Hit http://security.debian.org wheezy/updates/main Translation-en Hit http://debian.uchicago.edu wheezy Release.gpg Hit http://debian.uchicago.edu
TOM, KIM, and JOE take on your questions from Ignite, with both the posted answer (but a sticky note can hold only so much info, right?) as well as more expansive responses where irresistible. We think you'll really like our dedicated Live Community engineers' perspectives on your questions. We'll continue to present more questions
Advanced attacks have been able to evade traditional security measures, target specific users and vulnerable applications, steal sensitive information or commit outright fraud. One approach to preventing such advanced persistent threats (APTs) is to identify and protect against new exploits, malware and malicious URLs. This can be accomplished by “sandbox” analysis of unknown threats. Organizations such as financial institutions that are uncomfortable with cloud-based threat analysis may choose on-premise threat analysis solutions to address any data privacy concerns.
Download this whitepaper to read about how Financial Services organizations can use on-premise threat analysis solutions to mitigate compliance risks and maximize prevention against cyberattacks.
Establishing, maintaining, and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for everyone in payment card processing—including merchants, processors, acquirers, issuers, and service providers, as well as companies that store, process or transmit cardholder data (CHD) and/or sensitive authentication data. With approximately three hundred individual requirements to address, organizations subject to the standard have their work cut out for them.
This white paper will explain how Palo Alto Networks® Next Generation Security Platform allows PCI system operators to significantly enhance security and exceed PCI DSS requirements through segmentation and mitigating risks of malware and unpatched systems.
A couple more great questions and answers posted on the #GetAnswers wall at Ignite2017 I hope can be useful to anyone with similar questions How can you do a wildcard search in Traffic Monitor? Posted answer: Wildcards cannot be used in the traffic log filter. My side