Date

Education and Professional Services

  • Cybersecurity Academy (4)
  • Federal Government
Displaying 31 to 60 of 77

Continuous Diagnostics and Mitigation

This white paper describes how the Palo Alto Networks Next-Generation Security Platform, in combination with select technology and delivery partners, supports all three CDM phases and enables agencies to achieve the security objectives of the program.
  • 0
  • 5859

How Palo Alto Networks Next-Generation Security Platform Supports Use of the NIST Cybersecurity framework

Since the release of the Cybersecurity Framework (CSF) by the U.S. National Institute of Standards and Technology (NIST), organizations worldwide have implemented the framework to better understand and manage cyber risk. The CSF can be applied to businesses of all sizes, across regions and industries, and is being incorporated into national risk frameworks around the globe. Given its proven ability to aid in risk management and reduction, some industries have even begun to mandate its implementation. Namely, the White House recently issued an executive order requiring all federal agencies to immediately begin using the CSF to assess and manage cyber risk to protect critical infrastructure in their enterprises. Designed to foster positive and productive risk and cybersecurity management dialogue among internal and external business stakeholders, the CSF provides a common language for all appropriate teams, spanning IT, operations, security, finance, C-suite and board of directors. Based on this open dialogue, organizations can more effectively quantify risk and prioritize investments to mitigate it. Palo Alto Networks® Next-Generation Security Platform aligns with the CSF’s primary directive of enabling critical infrastructure operations to effectively identify, manage and reduce cyber risk. Rooted in prevention, the Next-Generation Security Platform is natively integrated to counter cyberattacks before they manifest in an organization’s environment. With full visibility into traffic – across the network, endpoints and the cloud – organizations can prevent cyberattacks based on how or where applications and data reside or are being used. This allows critical infrastructure organizations to identify the most serious ongoing threats to key business operations and reduce overall cybersecurity risk. Download this white paper to explore the benefits of the CSF and how Palo Alto Networks Next-Generation Security Platform capabilities map to and fulfill CSF subcategories.
  • 2
  • 1376

Navigating the Digital Age

Navigating the Digital Age includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials.
  • 1
  • 1544

Navigating the Digital Age for the United Kingdom

Navigating the Digital Age includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials for the UK.
  • 0
  • 486

Navigating the Digital Age for Singapore

Navigating the Digital Age includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials for Singapore.
  • 0
  • 401

Navigating the Digital Age for Australia

Navigating the Digital Age includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials for Australia.
  • 0
  • 304

The Next Board Problem: Automatic Enterprise Security Orchestration — A Radical Change in Direction

Commercial boards and senior government officials may be the only groups capable of kick-starting this new and necessary direction in the evolution of cybersecurity...
  • 1
  • 499

8 Imperatives for Governments to Defeat Advanced Threats

Advanced attacks are organized campaigns that leverage multiple techniques. Don’t be the government organization flying blind to attacks against your organization.
  • 1
  • 397

Demo: Preventing Credential-Based Attacks

Watch our product managers and threat researchers demonstrate how protections in the Palo Alto Networks platform neutralize an attacker's ability to steal credentials, as well as stop them from abusing stolen credentials to gain unauthorized access.
  • 1
  • 2118

Government Brochure 

Governments around the world are undergoing change. Whether reducing data center footprints, virtualizing existing services to reduce costs and "go green", or advancing security strategies to thwart advanced attacks in the field or at home, governments are demanding more from their cybersecurity solutions today.
  • 8
  • 1502

MeriTalk - Pedal to the Metal:
Mitigating New Threats Faster with Rapid Intel & Automation

Cyberattacks are one of the most pressing national security and economic concerns of governments around the world. Government agencies are taking an “all-in” approach to fight back, sharing more cyberthreat information with one another and purchasing threat feeds. However, with the influx of threat data, many agencies are having difficulty using these insights to update their sensors with real-time protection and reconfigure their defenses on the fly. And during a cyberattack, responding quickly is crucial to minimizing potential damage.
  • 0
  • 304

Military Tactical Case Study

Read how Palo Alto Networks VM-Series Next-Generation Security Platform secures communications for mission-command applications for this military customer.
  • 0
  • 996

Government Endpoint Use Case

Read how government endpoints can be protected against today’s threat environment with minimal disruptions to operations while meeting the needs of end users.
  • 0

Best Practices - Data Center Security

See how Palo Alto Networks Next-Generation Security Platform helps you to implement an effective Zero Trust security model to protect your data center assets.
  • 1
  • 3106

The Advantages of User Awareness in Public Sector Network Security 

To serve their citizens, federal/national, state and local governments must gather, create, or process sensitive information. As various high-profile breaches have demonstrated, this data is not sufficiently protected, particularly from the insiders whose actions are responsible for the majority of public sector security incidents. 
  • 1
  • 687

Meeting CSIP Objectives With an Automated and Preventive Security Approach 

Every day, the U.S. federal government experiences increasingly sophisticated and persistent cyberthreats. The government is expending significant resources to ensure the cybersecurity of federal networks, systems and data remains a top priority. This white paper: Gives a short backgrounder on the U.S. government’s Cybersecurity Strategy and Implementation Plan (CSIP). Describes how the Palo Alto Networks® Next-Generation Security Platform enables U.S. federal agencies to identify and protect High Value Assets (HVAs) and information and detect and rapidly respond to cyber incidents. Provides a case study on how one U.S. federal agency used Palo Alto Networks to help meet CSIP objectives.
  • 0
  • 636

Scarlet Mimic

The Palo Alto Networks threat research team, Unit 42, has spent the last seven months investigating a series of attacks, determining that they are the result of a long-standing cyber espionage campaign. The campaign, which we refer to as “Scarlet Mimic,” has activity dating back over four years. The result of our analysis has allowed us to connect a series of disparate attacks into a coherent picture of the Scarlet Mimic operation, which has targeted human rights activists, as well as organizations with knowledge about these groups, including government entities.
  • 5
  • 1427

Uncover SSL-Encrypted Attacks in Government Networks

A comprehensive security strategy for federal and other government agencies requires in-depth analysis of encrypted traffic to detect and prevent hidden attacks and data leakage. As more Internet traffic is encrypted, increasing numbers of attackers, including state-sponsored actors, are using this technology to hide malware, and botnet-based command and control traffic to exfiltrate data and escalate the likelihood of successful attacks. Palo Alto Networks Next-Generation Security Platform provides a combination of advanced capabilities to prevent undesired applications and malicious content, including the decryption and scrutinization of encrypted communications, along with Hardware Security Module (HSM) support for enhanced performance and security of certificate and key management.
  • 1
  • 707

Moving Beyond Proxies

Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy security products, providing limited security functionality against today’s advanced threats. Once upon a time, Proxies fulfilled a need traditional firewalls could not meet: visibility into web traffic starting with categorization of HTTP and later HTTPS traffic. However, little to no emphasis was put on traffic and the vast number of applications utilizing other avenues of accessing corporate networks. Proxy vendors still over-emphasize the importance of HTTP and HTTPS traffic while downplaying the role of applications utilizing other entry points in cyber attacks. This whitepaper highlights the short comings of proxies, and showcases how a next generation security platform can provide faster, simpler and more comprehensive security. This white paper is available in Portuguese.
  • 8
  • 3837

Heart of the Network – Data Center Defense

Feds need to protect the data center from internal and external threats as they transition to cloud environments. How are they managing the transition?
  • 0
  • 312

Cybersecurity: Reassessing the Cyber Threat Landscape

Security responsibilities cut across many disciplines within a government organization: networking, cyber/network security, desktop, and data center. Sadly, despite the urgency reiterated in very public attacks to government infrastructure, some organizations choose to continue to run their networks in silos, in the blind, failing to work together to secure the network and prevent threats.
  • 5
  • 261

Governance of Cybersecurity 2015 Report

Palo Alto Networks joined Financial Services Roundtable and Forbes as sponsors of the Georgia Tech Governance of Cybersecurity: 2015 Report in order to increase the awareness among senior leaders on the importance of cybersecurity risk management and proper investments in the right people, process and technologies need to prevent cyber threats.
  • 0
  • 2009

Palo Alto Networks Appoints New Federal CSO and Adds Global Defense and Intelligence Leader to its Public Sector Council

Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced the addition of two decorated military and intelligence leaders to further enhance the company’s cybersecurity strategy and global policy expertise.
Santa Clara, CA
  • 0
  • 2387

Palo Alto Networks Unit 42 Uncovers New Cyberattacks Targeting Government and Military Networks in Southeast Asia

Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, today shared research that uncovers a series of potentially state-sponsored cyberattacks targeting government and military organizations in countries throughout Southeast Asia.
Santa Clara, CA
  • 10
  • 1203

UK Cabinet Office Technology

The UK Cabinet Office Technology Transformation programme was established to replace an end-of-life outsourced IT service. The aim of the programme is to enable modern flexible ways of working and to provide civil servants with technology at least as good as they have at home. During user testing at the start of this project, staff told the UK Cabinet Office IT team that they wanted better connectivity; greater choice of applications; to be able to be more mobile with more portable devices and to be able to collaborate on documents in real time.
  • 0
  • 505

Uk Cabinet Office Uses Global Protect Provides Workforce Security and Flexibility With Their Mobility

The UK Cabinet Office Technology Transformation programme was established to replace an end-of-life outsourced IT service. The aim of the programme is to enable modern flexible ways of working and to provide civil servants with technology at least as good as they have at home.
  • 0
  • 736

Palo Alto Networks Continues Public Sector Momentum

Santa Clara, Calif., February 12, 2015 – Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, today announced several public sector focused activities, including the formation of the Palo Alto Networks Public Sector Advisory Council, which officially convened in 2014, and the appointment of Ryan Gillis as Vice President of Government Affairs and Policy.
Santa Clara, CA
  • 2
  • 1012

Palo Alto Networks CEO To Participate In White House Summit On Cybersecurity And Consumer Protection

Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, today announced its participation in the White House Summit on Cybersecurity and Consumer Protection at Stanford University on February 13, 2015, which will bring together government and industry leaders to help shape public and private sector efforts aimed at protecting American consumers and companies from growing cyber threats.
Santa Clara, CA
  • 0
  • 968

Government APT video series Part 2: WILDFIRE VS. STANDALONE SANDBOXING

In Part 2 of Palo Alto Networks 3-part Government APT video series, we review current standalone solutions and then explore the Palo Alto Networks WildFire® approach to the APT and zero-day problem.
  • 0
  • 569
Displaying 31 to 60 of 77