Date

Education and Professional Services

Displaying 61 to 90 of 4272

What Is Managed Detection and Response (MDR)?

Find out more about what Managed Detection and Response (MDR) services are and how they augment your security team.
  • 0
  • 65

Security Reference Blueprint for K-12 Education IT

This reference blueprint suggests ways K-12 institutions can reduce cyber risks and protect operations, data and students with a consistent and coordinated approach to cybersecurity.
  • 1
  • 993

Security Operations Optimization Service for Next-Generation Firewall

Customize elements of the Security Operating Platform® to provide consistent incident handling, simplify operations with automation, and improve response times.
  • 0
  • 60

What Is a Site-to-Site VPN?

Site-to-site VPN is a common tool used by organizations to create a secure connection between multiple networks.
  • 0

What is Secure Web Gateway (SWG)?

Secure Web Gateway is crucial to protect employees from malicious websites, but a new approach to security is needed to address the cloud and remote workers.
  • 0
  • 175

Prisma Cloud: At a Glance

With Prisma Cloud by Palo Alto Networks®, organizations can maintain compliance, govern security, and enable security operations across public cloud computing environments.
  • 2
  • 9333

Threat Brief: Windows CryptoAPI Spoofing Vulnerability CVE-2020-0601

Unit 42 provides analysis and mitigation actions for Microsoft's latest patches, including one for CVE-2020-0601 - AKA "Curveball"
Brandon YoungMike Harbison,
  • 0

Exploits in the Wild for Citrix ADC and Citrix Gateway Directory Traversal Vulnerability CVE-2019-19781

We provide the root cause analysis of the vulnerability identified in Citrix Application Delivery Controller (ADC) and Citrix Gateway, CVE-2019-19781, as well as Proof of Concept examples (PoC), additional Indicators of Compromise we've identified and attack activities we observed in the wild.
Yue GuanQi DengZhibin ZhangSiddhart ShibirajZhanhao ChenCecilia HuJohn Harrison,
  • 0

Consulting Services for Demisto

This describes the specific deliverables that are part of the our professional service and customer success offerings.
  • 0

QuickStart Service for Demisto

This describes the specific deliverables that are part of the our professional service and customer success offerings.
  • 0

Why is Data Protection so Difficult?

Data protection is not easy. Learn why data loss prevention and cloud data protection is so difficult in this short video.
  • 1

The Challenges of Data Protection

Learn the challenges organizations face with data loss prevention and data protection solutions, and how automation can help in this short video.
  • 0

Solving Data Protection Challenges with Palo Alto Networks

Learn how Palo Alto Networks is redefining data loss prevention and cloud data protection strategies in this short video.
  • 0

Cortex XDR 2.0 Demo

This demo reveals how to shut down attacks without disrupting your users. Watch it now to get an edge against advanced adversaries.
  • 0
  • 194

Prisma Cloud Compute Edition

Learn about the different customer success plans for Prisma Cloud Compute Edition
  • 0
  • 116

Prisma Access Customer Success Datasheet

Learn about the different customer success plans for Prisma Cloud
  • 0
  • 74

Overcoming Cloud Data Protection Challenges

Data loss prevention is a necessary tool for protecting users and data. Learn how a next-gen cloud DLP solution protect data everywhere in this ebook.
  • 0
  • 361

Secure The Cloud: Zero Trust Network Access

Learn how Zero Trust Network Access provides an integrated, comprehensive solution for segmentation, access control, and threat prevention in this interactive.
  • 0
  • 60

Top 5 Requirements for Effective Endpoint Protection

Attackers must complete a certain sequence of events, known as the attack lifecycle, to accomplish their objectives, whether stealing information or running ransomware. Nearly every attack relies on compromising an endpoint to succeed, and although most organizations have deployed endpoint protection, infections are still common.
  • 0

Palo Alto Networks Panorama vs. Cisco FMC

PanoramaTM network security management reduces network complexity with logical device groups; simplifies management with easy, global policy control; and reduces network dwell time for threats by highlighting critical information for response priori- tization.
  • 0
  • 59

Advanced Threat Visibility and Response

When an incident occurs, SOCs tend to respond based on defined processes and procedures to mitigate the threat and protect the network. When attackers target networks or systems, however, they tend to use multiple TTPs (tools, tactics and procedures) to compromise them, maintain presence and exfiltrate data. While responding to an incident, it is imperative to understand the entire scope of the incident, including the compromise of other networks/subnetworks, related incidents and threat attribution, wherever possible. Once the SOC has visibility into these aspects, it becomes much easier to respond to the incident and mitigate the threat as well as improve visibility and response to such threats in the future.
  • 0

Palo Alto Networks & Claroty Integration Guide

Technology Partner, Integration, Integration guide, use case, deployment guide, tech partner, Claroty, IoT, ot.
  • 0

Enabling Secure Industrial Digital Transformation

This executive-level whitepaper from industrial automation market experts, ARC Advisory Group, covers the challenges industrial asset owner-operators will face as they embark on their OT digital transformation initiatives.
  • 1
  • 87

Making Secure SD-WAN Manageable: Take an Integrated Approach

Learn how consolidating and integrating networking and security functions, as well as unifying management and monitoring with SD-WAN in the branch, can lead to more secure and efficient operations.
  • 0
  • 121

Kuveyt Türk

To strengthen Kuveyt Türk’s security architecture against emerging threats and make the network more resistant to cyberthreats.
  • 0
  • 54

Threat Brief: Iranian-Linked Cyber Operations

With elevated tensions in the Middle East region, there is significant attention being paid to the potential for cyber attacks emanating from Iran. The following threat brief contains a summary of historical campaigns that are associated with Iranian activity and does not expose any new threat or attack that has occurred since the events of January 3rd, 2020.
Unit 42,
  • 0

Reference Architecture Guide for Google Cloud Platform

This reference document links the technical design aspects of the Google Cloud Platform with Palo Alto Networks solutions and then explores several technical design models. The design models include a model with all instances in a single project to enterprise-level operational environments that span across multiple projects using Shared VPC.
  • 0
  • 4792

Deployment Guide - GCP VPC Network Peering

Provides deployment details for using the VM-Series in the GCP VPC Network Peering design model, which centralizes security resource management while allowing administrators of peered projects to manage their network resources independently. This design model is also useful when you want to provide security to existing disparate projects.
  • 0
  • 3147

Deployment Guide for Google Cloud Platform - Shared VPC Design Model

This reference document provides detailed guidance on the requirements and functionality of the Shared VPC design model and explains how to successfully implement that design model using Panorama and Palo Alto Networks® VM-Series firewalls on Google Cloud Platform.
  • 1
  • 3852

Deployment Guide for Panorama on Google Cloud Platform

This reference document provides detailed guidance on how to deploy Panorama on GCP
  • 1
  • 3411
Displaying 61 to 90 of 4272