Education and Professional Services

Displaying 61 to 90 of 3150

Palo Alto Networks Appoints Amit K. Singh as President

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced that its board of directors has named Amit K. Singh as president, effective November 1, 2018. As president, Singh...
Santa Clara, CA
  • 0
  • 2562

Government use case: Maintain the integrity of election systems

Enable citizens to exercise their right to vote, preserve trust in the process, and meet recommendations and regulations for securing the vote
  • 0
  • 913

Bridging Security Gaps with Network-to-Endpoint Integration

The typical enterprise uses an average of 30 security products, most of which from variety of vendors and typically do not integrate well and offer little information sharing…if any.
  • 0
  • 118

Royal Air Forces Association

The RAF Association deployed the Palo Alto Networks Security Operating Platform, with the Next-Generation Firewall deployed in its data center and Azure public cloud.
  • 1
  • 134

Fake Adobe Flash Installers Come With a Little Malware Bonus

A recent scourge of fake Adobe installers really does provide an update to the latest version of Flash.
  • 0
  • 344

Palo Alto Networks Completes Acquisition of RedLock

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, announced today that it has completed its acquisition of RedLock Inc., a cloud threat defense company. For Palo Alto Networks, the...
Santa Clara, CA
  • 0
  • 2228

Palo Alto Networks Support Services Datasheet

Overview of service and support options available to you.
  • 8
  • 19278

Securing Developer Environments on AWS

Download this whitepaper to learn how you can secure dev environments on AWS.
  • 0
  • 904

Fake Adobe Flash Updates Hide Malicious Crypto Miners

A fake Adobe update actually updates victims’ Flash – but also installs malicious cryptomining malware.
  • 0
  • 378

Cryptomining malware discovered masquerading as Flash updates

This malware is so sneaky it updates your Flash to look legit.
  • 0
  • 355

A flood of fake installers will really update Flash for you – but also install cryptocurrency mining malware

If you think that Flash, the once-popular web plugin, couldn’t die fast enough, even those annoying fake Flash installers riddled with malware aren’t going anywhere any time soon. In fact, they’re getting even sneakier.
  • 0
  • 401

Advanced Threat Prevention

Our WildFire™ threat analysis service integrates with Aperture to provide advanced threat prevention to block known malware, and we are the only CASB to identify and block unknown malware.
  • 0
  • 479

Expose Hidden Threats With High Performance Decryption

Download the InfoGraphic to learn more about how to expose hidden threats with high-performance decryption.
  • 1
  • 202

Mobile Network Operators Use Case Handbook

The attack surface area of mobile networks has expanded due to greater use of IoT devices, converged access, public and hybrid cloud, and shared infrastructure. Sophisticated bad actors can inject malware into this ever-growing volume of traffic distribution points, then quickly spread and morph to avoid control or detection. Operators must now expand and strengthen both their security posture and visibility into all network peering points Download the use case handbook to learn about the major security challenges, threats and vulnerabilities found in mobile networks and how the Palo Alto Networks approach can benefit mobile network operators.
  • 1
  • 464

Extended Application-Layer Visibility Across Multiple Mobile Network Peering Points

Palo Alto Networks Next-Generation Security Platform includes features that enhance application-layer protection and visibility across all network peering points.
  • 1
  • 595

Malicious Cryptomining digs into mobile

For more information, download the brief.
  • 0
  • 17

Palo Alto Networks Recognized as a Leader in Gartner Magic Quadrant for Enterprise Network Firewalls Seven Times in a Row

Palo Alto Networks® (NYSE: PANW), the global cybersecurity leader, today announced that, for the seventh consecutive time, the company has been recognized in the Leaders quadrant of the "Magic...
Santa Clara, CA
  • 2
  • 1148

Best Practices for Executing on Zero Trust

Read how to apply the Zero Trust cybersecurity strategy through transformation to a prevention-based architecture. Included are technical capabilities as well as business outcomes for each level of transformation as well as tools to measure your capabilities as you progress through the transformation journey.
  • 2
  • 0

Transforming to a Prevention-Based Architecture

Transforming to a Prevention-Based Architecture
  • 0
  • 643

Transformation Services

Palo Alto Networks Transformation Services
  • 0
  • 566

Combine Network and Endpoint Security for Better Visibility, Protection, and Enforcement

This paper examines the changing threat landscape and highlights the importance of best-in-class endpoint protection working in lockstep with other security products to create coordinated and comprehensive enterprise security. Palo Alto Networks Traps advanced endpoint protection provides superior endpoint threat prevention as well as bridges the gap between endpoint security and network security, augmenting next-generation firewalls to provide stronger defense with fewer resources.
  • 0
  • 1182

Handbook: How to Create a Modern Ransomware Strategy

Read this handbook to gain insight and best practices from your peers and industry experts on creating a modern ransomware strategy.
  • 0
  • 59

Palo Alto Networks Announces Intent to Acquire RedLock

Palo Alto Networks® (NYSE: PANW), the global cybersecurity leader, today announced that it has entered into a definitive agreement to acquire RedLock, Inc., a cloud threat defence company.
Santa Clara, CA
  • 0
  • 2918

Multi-cloud security analytics

The acquisition of RedLock will add critical security analytics capabilities across multi-cloud environments to our extensive cloud security offering. The security analytics capability utilizes an innovative AI-driven approach that correlates disparate security data sets. RedLock provides comprehensive visibility, threat detection, and rapid response across an organization’s entire public cloud environment.
  • 0
  • 108

Seymour Public Schools

Seymour Public Schools was looking to replace their legacy Cisco firewalls, they checked the vulnerability of their existing system using a Security Lifecycle Review. The SLR report showed that more than 43,000 vulnerabilities were slipping past the legacy firewall. Because of this discovery they purchased the Palo Alto Networks Security Operating Platform.
  • 0
  • 158

3 Reasons to Use Policy Based SSL Decryption on Your Next-Generation Firewall

This brief highlights three reasons to use policy-based SSL decryption on a next-generation firewall.
  • 1
  • 136

Learn How Evident Protects Your Cloud Data

Evident, now part of Palo Alto Networks, keeps you secure in the public cloud by identifying potential risks and resolving them. Watch our on-demand webinar to learn about cloud security and compliance strategies to help you go fast and stay secure.
  • 0
  • 62

Prevent Hidden Threats with High Performance Decryption

Encrypted traffic is the new normal with users spending more than 80% of their time on encrypted websites and applications. Unfortunately, cyber adversaries know exactly how to use encrypted traffic to hide threats. In this video, you'll learn how to secure encrypted traffic with predictable performance, while also preserving the privacy of legitimate users.
  • 1
  • 58

3 Requirements to Safely Enable Microsoft Office 365

This brief describes three key security requirements to safely enable Microsoft Office 365 and other SaaS applications for your business.
  • 5
  • 3235

Bank Central Asia

Bank Central Asia is one of Indonesia’s leading retail banks. The bank has approximately 16 million customers, 1,213 branches, and 17,207 ATMs. It also manages a growing mobile and internet banking operation. While ATMs use dedicated connectivity for transactions, mobile transactions rely on the internet to ensure everyone has full, anytime access. However, such high exposure comes with major security risks, therefore demanding the need for advanced security protection.
  • 1
  • 274
Displaying 61 to 90 of 3150