Date

By Source

By Technology

By Services

By Audience

Displaying 61 to 90 of 10068

Rethink Mobile Security Monetization

This paper for mobile network operators provides a framework for value and revenue opportunities across the entire subscriber base.

  • 2
  • 228

Establish An Effective Security Posture In Next-Generation Mobile Networks

Mobile network operators need a new approach to security that will keep up with rapid network evolution and growing threats.

  • 0
  • 229

Extended Application-Layer Visibility Across Multiple Mobile Network Peering Points

Palo Alto Networks Next-Generation Security Platform includes features that enhance application-layer protection and visibility across all network peering points.

  • 0
  • 227

Reducing the Business Risks of Cyberthreats

Your approach to cybersecurity can enable your business to innovate or introduce unnecessary risk. Consider reducing the business risks of cyberthreats.

  • 1
  • 343

3 Requirements to Safely Enable Microsoft Office 365

This brief describes three key security requirements to safely enable Microsoft Office 365.

  • 0
  • 620

Palo Alto Networks & Centrify

Read this brief to learn how to protect user credentials with Palo Alto Networks and Centrify.

  • 0
  • 147

Endpoint Security: That was then. This is now.

Times have changed, and so should your endpoint security solution.

  • 1
  • 325

Mobile Network Operators Use Case Handbook

Download the use case handbook to learn about the major security challenges, threats and vulnerabilities found in mobile networks and how the Palo Alto Networks approach can benefit mobile network operators.

  • 0
  • 87

Securing the Hybrid Data Center with the VM-Series

In this webinar, we cover key security considerations to protect your hybrid data center from cyber criminals with the VM-Series.

  • 0
  • 831

Protect Your Microsoft Endpoints From Known and Unknown Threats

Read how a next-generation security platform equipped with advanced endpoint protection prevents endpoints on your Windows system from known and unknown threats.

  • 1
  • 193

The Security Risk Lurking in the Board of Directors

An enterprise's board of directors is there to steer the business. However, in some cases, it is wearing a security blindfold and the vehicle they are steering is drifting off the road. A series of training sessions with Palo Alto Networks Inc. now shows that the classic strengths of the board can actually be weaknesses when it comes to shoring up the company, according to some of the output captured from those sessions and shared with Security Now.

  • 0
  • 16

Prevent Credential Theft in Healthcare

Theft and abuse of stolen passwords is one of the oldest attacks in the book, yet it remains highly effective. Adversaries can use stolen credentials to impersonate valid users, allowing them to bypass the entire attack lifecycle, move uninterrupted throughout their target organization’s network and shift to the abuse of credentials from within. You can prevent credential theft with Palo Alto Networks Next-Generation Security Platform by stopping credential leakage, blocking access to phishing sites and enforcing multi-factor authentication security policy in the network.

  • 0
  • 687

New Aperture R25 features + New UI

New Aperture features release R25 The Aperture team is constantly updating features. The November 2017 update, known as R25, includes a handful of features that you may want to know about that can help you use Aperture better. Please read about all the new features, including a new user interface.  

jdelio,
  • 0
  • 0

How CISOs Can Successfully Talk Security to CEOs

It would be funny, if it were not so frustrating, that two individuals so intent on managing risk don’t understand one another. But that is the fundamental problem between business and security leaders. The gap is so huge that bridging it may seem nearly impossible. Yet, it can be done. Here’s some much-needed illumination on why previous attempts to close...

  • 0
  • 11

The Power of Dialogue: Women’s Topics at the Fore in November 30 Community Events

The power of dialogue: Wendy Barnes, SVP of Human Resources, recaps two recent Women's Networking Community events at Palo Alto Networks.

Wendy Barnes,
  • 0
  • 2

Practice Makes Prevention

Realistic practice can enhance your cybersecurity efforts.

Justin Hall,
  • 0
  • 7

UBoatRAT targets East Asia

The initial RAT code (Remote Access Trojan) was discovered in May this year.  With added features to the code, the new variant UBoatRAT has nothing to do with a RAT on a submarine.   While it's still unclear what the exact targets are, Unit 42 believes that the targets are personnel and

kiwi,
  • 0
  • 2

Whitelist Vendor IP range from Paloalto IPS

Hi All, I am looking for more effective way to whitelist a vendor on IPS without whitelisting at the FW as well.   I am looking for traffic from vendore ip range to be completely exempted from Vulnerability / antivirus / Anti-spyware without creating any firewall rule and security profile.   Is it

mnadeem,
  • 0
  • 4

Securing the Unpatchable in Financial Services

This case study discusses the security, risk and compliance ramifications of operating unpatchable systems, such as Windows® XP and Windows Server 2003. In financial services, these unsupported operating systems may still be found in ATMs and aging systems that support check scanners, printers for passbooks (bankbooks), ATM cards, on-demand checkbooks and other legacy banking applications.

  • 2
  • 109

Maine Township High School District 207

Why Maine Township HS District 207 chose Palo Alto Networks Security Platform with Aruba ClearPass to secure network access for students, faculty and staff.

  • 0
  • 657

Top 10 Public Cloud Security Recommendations

The move to the public cloud is the biggest computing paradigm to unfold since the early 2000s, when the internet boom first exploded. According to the 451 Group®, enterprise IT executives expect 60 percent of workloads will run in the cloud by 2018.1 Driving this growth are greater agility and scalability, higher performance, and faster access to innovative technologies, all of which enable organizations to gain a competitive edge.

  • 0
  • 103

Secure and Protect Medical Devices in Healthcare

Read this whitepaper to understand how Palo Alto Networks security platform provides best-in-class security for medical devices in a healthcare environment.

  • 2
  • 274

How to Securely Migrate to Microsoft Cloud

This brief highlights how organizations can securely migrate to the Microsoft Cloud.

  • 0
  • 179

Fundamentals of Secure Cloud Adoption

The challenge of moving to the cloud is how to protect applications and data without adding complexity or cost. Read Securely Enabling Cloud Adoption for solutions.

  • 0
  • 383

Vendor Q&A Series: Karl Soderlund, Palo Alto Networks

The Palo Alto Networks NextWave Channel Partner Program is designed to help partners with technical differentiation and specializations, gain access to more profitable opportunities, simplify the way we interact with and support partners and to help them build sustainable, breach prevention-focused security practices.

  • 0
  • 16

Detection off, Prevention on

Learn how Palo Alto Networks prevention strategy can help you to protect your enterprise.

  • 0
  • 33

Next-Generation Security for Aviation Environments

Cybersecurity has become an elevated risk for the aviation industry. Palo Alto Networks is noticing that today’s cyber adversaries are more persistent, trained, skilled and technologically savvy than before. This is also recognized by the leaders in this industry, highly sensitive nature of flight systems, passenger data, increase of Wi-Fi connectivity, PCI-DSS compliance and IoT revolution could potentially introduce cyber security vulnerabilities that affect the business.

  • 1
  • 73

Firewall Region Code Legend

In PAN-OS 8.0 and later, the security policy rule creation window will not show a legend for each Region Code.    We have created the following table for your reference:  Organized by Region Code A1 Anonymous Proxy A2 Satellite ISPs ISO 3166-1-alpha-2 code Country names AD ANDORRA AE UNITED ARAB

mdensley,
  • 0
  • 2

This Is How to Prepare for a Cyber Attack

Cybersecurity is only in the spotlight when it fails. After high-profile, large-scale data breaches, it takes a beating. But cybersecurity provides critical layers of infrastructure in our modern, cyber-dependent society. Rehearsing for potential failures is always worthwhile. Executives tend to relegate cybersecurity to the IT department. That is a mistake, because cyber incidents affect the entire organization. We should conduct...

William H. Saito,
  • 0
  • 16

10 Things to Test In Your Future NGFW

Find out what network admins need to know to improve perimeter defense

  • 0
  • 7
Displaying 61 to 90 of 10068