Date

Education and Professional Services

Displaying 4591 - 4616 of 4616

White Paper

Palo Alto Networks and Gigamon

Palo Alto Networks and Gigamon have partnered to deliver a highly reliable and transparent threat prevention solution. In a high-availability environment, the loss of a single device or power source cannot be allowed to jeopardize network connectivity. The addition of a network security device to protect the network cannot introduce any single points of failure. The combination of the Palo Alto Networks next-generation firewall with GigaVUE bypass functionality provides full threat prevention, transparently and with no reduction in reliability.

Video

Application Visibility and Control

How Palo Alto Networks delivers application visibility and control more effectively than other port-based offerings.

White Paper

Palo Alto Networks and Avaya Partnership

Palo Alto Networks and Avaya™ have partnered to provide high-performance next-generation security solutions for data center networks. The mission critical data centers of today have no tolerance for disruptions in throughput or availability. At the same time, the threats imposed on data centers by modern malware require a security solution that has next-generation firewall intelligence.

Resource

Symphony 2020 :: Presentations

Balancing Flexibility and Structure for MSSP Playbooks

Webinar

Control your Own Cyberspace: Migrating Threat Response Teams To Threat Intelligence Teams

Vishaal Hariprasad - Threat Intelligence Architect with Palo Alto Networks explores and explains the prevailing shift in mindset from one of signature-based defence security models to more abstract ‘Indicators of Compromise’ and knowing where and how to identify them within your own network security stack.

Webinar

Neden Palo Alto Networks Next-Generation Security Platformu?

This video is an overview of Palo Alto Networks Next-Generation firewall in Turkish.

White Paper

Palo Alto Networks and Arista Networks

Palo Alto Networks and Arista Networks have partnered to offer the highest performance next-generation firewall implementation in the industry. The modern data center has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network must be able to meet those demands. The combination of Arista Networks’ Datacenter Switches along with Palo Alto Networks’ next-generation firewalls provides unmatched security in high-performance data centers without impacting throughput.

Video

Recorded Webinar: Disrupting Credential-Based Attacks

Learn how to use the Palo Alto Networks® Next-Generation Security Platform to disrupt the unique attack lifecycle used in credential-based attacks. Get details about the strategies and key technologies for preventing both the theft and abuse of credentials. This session covers: Why the platform plays a critical role in disrupting credential-based attacks Preventing the theft of credentials, using new PAN-OS® 8.0 technologies Stopping the use of stolen credentials through new multi-factor authentication capabilities in PAN-OS 8.0

White Paper

Palo Alto Networks and Enterasys Partnership

Enterprise Mobility and BYOD trends are causing significant disruption to traditional network security practices. The growth and diversity of mobile device usage combined with the requirement of anytime, anywhere access to applications and data, has presented significant operational challenges and security risk to the IT organization. Typical legacy enterprise LAN infrastructures were not architected with adequate management, visibility, and awareness necessary to adapt to today’s application security and mobile provisioning requirements.

White Paper

Palo Alto Networks and SafeNet

As more and more daily business practices are conducted online, organizations face a growing challenge of ensuring that only authorized users may carry out transactions and access its most sensitive online resources. Moreover, businesses must protect access to network and web-based applications amid a rapidly changing security landscape of complex identity management—especially resulting from proliferation of mobile devices. Palo Alto Networks is partnering with SafeNet to provide a multi-factor authentication solution to protect user identities.

Video

Exploit Kits: How to Protect Your Organization

Today’s attackers are using exploit kits to automatically find vulnerabilities in common systems. As the use of these attacks increase, so does your chance of being compromised. In order to better protect your organization, you’ll need to understand the inner workings of exploit kits.

Webinar

Mobile Security - Russian

Mobile Security in Russian Language

Video

次世代ファイアウォール : オンラインセミナー

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Japanese.

Webinar

Revealing the Secrets- Advances in Android and IOS Attacks

Join us for this no-cost webinar to get vital details on how the rapidly changing threat landscape may affect your organization. You’ll also get comprehensive strategies for securing your mobile workforce.

White Paper

Verizon and Palo Alto Networks: Partnering for True Next-Generation Security Solutions

Verizon and Palo Networks have partnered to offer you the most advanced security technology combined with world-leading managed services.

White Paper

Traps PCI Compliance

The theft of credit card data continues to grow at an alarming rate. It is costly to credit card companies and merchants, and it undermines consumer confidence. The Payment Card Industry has developed the PCI Data Security Standard (PCI DSS), which includes 12 requirements for protecting cardholder data. Despite substantial investments made in securing their networks, organizations are realizing that being PCI compliant does not mean an enterprise is protected against advanced cyberattacks.

Video

Zero Trust Network Architecture with John Kindervag - Video

In this video, John Kindervag, Principal Analyst at Forrester Research, defines the "Zero Trust” network architecture, the three key concepts, and the architecture elements that make up a Zero Trust network.

References and Case Studies

Asia-Pacific Government Authority

As the Government Authority responsible for driving growth in the information technology sector, this agency understands technology. With a globalized economy and considered one of the most competitive countries in the world, this Asian country has one of the highest internet penetration rates in the greater Asia-Pacific region.
Displaying 4591 - 4616 of 4616