Resource Center

Our library of online content is here to help you learn more—no matter what format you prefer or which topic interests you most.

Explore resources

CLEAR

Filters

Results
Displaying 55–72 of 83 Results
Article

What Is DNS Hijacking?

Read the story
asset pdf thumbnail
Whitepaper

PCI DSS v4.0 Compliance with Cortex XDR

Download the whitepaper
References and Case Studies

Ascend Money acquires a comprehensive endpoint security stack and gains advanced protection from malware

Read the customer story
asset pdf thumbnail
Use Case

Modernizing Financial Services Branch and Campus Networks for Digital Transformation

Read the story
asset pdf thumbnail
Use Case

Jumpstarting Third-Party Access for Financial Services

Read the story
References and Case Studies

High performance protection for one of Africa’s leading stock exchanges

Read the customer story
asset pdf thumbnail
Use Case

Optimized Guest Wi-Fi at Bank Branch Offices

Read the story
References and Case Studies

Transforming security posture after state-sponsored cyberattack

Read the customer story
References and Case Studies

Leading fund management company improves overall security posture with Zero Trust Network Access

Read the customer story
References and Case Studies

How Eight Organizations Transformed Their Security Operations with Cortex

Read the customer story
asset pdf thumbnail
Use Case

Elevate Customer Experience at Bank Branches through SD-WAN

Read the story
References and Case Studies

Faster incident response and reduced alert fatigue at NKGSB Bank

Read the customer story
References and Case Studies

Bangladesh Development Bank Limited secures network traffic with an integrated network security platform

Read the customer story
asset pdf thumbnail
Use Case

Modernizing Remote Access for Financial Services

Read the story
asset pdf thumbnail
Research Reports

Frost Radar™: Cloud Workload Protection Platforms, 2023

Explore research reports
References and Case Studies

Global Atlantic Financial Group Shifts Left by Integrating Security into the Development Process

Read the customer story
References and Case Studies

Automating cloud security control for Korea Credit Data

Read the customer story