Date

Education and Professional Services

Displaying 61 to 90 of 4016

Traps Technical Overview

Most organizations deploy a number of security products to protect their endpoints, including one or more traditional antivirus solutions. Nevertheless, cyber breaches continue to increase in frequency, variety and sophistication. Faced with the rapidly changing threat landscape, current endpoint security solutions and antivirus can no longer prevent security breaches on the endpoint. Palo Alto Networks® Traps™ advanced endpoint protection replaces traditional antivirus with a unique combination of the most effective, purpose-built, malware and exploit prevention methods that pre-emptively block known and unknown threats from compromising a system.
Santa Clara, CA
  • 18
  • 46303

Traps Management Service Privacy Datasheet

Traps Management Service Privacy Datasheet
  • 0
  • 7336

The 10 Coolest New Cybersecurity Tools And Products Of 2019 (So Far)

Prisma was released in May, and gives customers what they need to consistently govern access, protect data, and secure applications. Palo Alto Networks CEO Nikesh Arora said Prisma is the largest cloud security business in the world with 9,000 enterprise customers and a billings run rate in excess of $250 million.
  • 0
  • 75

Securing Data in the Private Data Center and Public Cloud with Zero Trust

Details how to design for Zero Trust with the Security Operating Platform in the data center and public cloud. Discusses the relevant features, and capabilities, as well as provides example Zero Trust policies.
  • 0

Protecting Data in the Cloud with Prisma SaaS

Learn how to discover the hidden risks and threats of SaaS applications by utilizing a cloud access security broker (CASB) such as Prisma SaaS to protect your data through visibility and protections that are consistent across all your SaaS applications.
  • 0

Picking a Winner in Detection and Response

Find out how Cortex XDR solves common EDR challenges.
  • 0

Deployment Guide for Securing Box

Provides deployment scenarios and policy examples for configuring the Next-Generation Firewall and Aperture to secure Box.
  • 0

Deployment Guide for VMware NSX

Provides implementation guidelines for deploying Palo Alto Networks® virtualized VM-series next generation firewalls within VMware NSX powered software-defined data center.
  • 0

Deployment Guide for Securing Google G Suite

Provides deployment scenarios and policy examples for configuring the Next-Generation Firewall and Aperture to secure G Suite.
  • 0

Reference Architecture Guide for SaaS

This reference document provides an overview of the Security Operating platform for securing the enterprise, securing the cloud and securing the future with Cortex.
  • 1

Deployment Guide for Securing Microsoft Office 365

This reference document provides an overview of the Security Operating platform for securing the enterprise, securing the cloud and securing the future with Cortex.
  • 1

Zero Trust Overview

Introduces the concepts of the Zero Trust security model and explains why the Palo Alto Networks Security Operating Platform is the right platform to implement it on.
  • 0

Deployment Guide for Securing Dropbox

Provides deployment scenarios and policy examples for configuring the Next-Generation Firewall and Aperture to secure Dropbox.
  • 0

WildFire Threat Analysis Service

WildFire is the industry's most advanced analysis and prevention engine for highly evasive zero-day exploits and malware.
  • 1

How to Select the Best EDR in the Market

Making a decision on endpoint detection and response (EDR) tools is complex. The MITRE ATT&CK framework is used to evaluate the efficacy and efficiency of the top EDR offerings available today. Understand where your current EDR tools stand as you learn from MITRE’s Round 1 evaluation, which tests multiple vendors across an extensive list of capabilities and techniques adversaries use in real-world attacks.
  • 1
  • 58

Data Center Hybrid Cloud Overview

Data is now everywhere. Application workloads are moving across multiple data centers as well as private, public and hybrid clouds. New trends in the data center and hybrid cloud IT help organizations deliver greater business opportunities, but introduce new risks. Watch this webinar and learn how to rethink your approach to security to better protect your data and workload in the data center and across multi-cloud environments.
  • 1

Network Control Service - Transformation Level 2

Read this datasheet to see how Palo Alto Networks can accelerate your implementation of Prisma Access to protect your remote networks and mobile users.
  • 0
  • 6417

Nesine.com Protects Sensitive Data over Four Million Customers with Palo Alto Networks Security Operating Platform

Nesine.com Protects Sensitive Data over Four Million Customers with Palo Alto Networks Security Operating Platform.
  • 2
  • 129

NSS Labs NGFW Group Test Report on Palo Alto Networks PA-5220

In 1H 2019, NSS Labs performed an independent test of the Palo Alto Networks PA-5220. This comprehensive testing compared security effectiveness, performance and cost among 12 NGFW products. Palo Alto Networks achieved the highest security effectiveness score and a "Recommended" rating."
  • 2
  • 67

USBCreator D-Bus Privilege Escalation in Ubuntu Desktop

A vulnerability in the USBCreator D-Bus interface allows an attacker with access to a user in the sudoer group to bypass the password security policy imposed by the sudo program. The vulnerability allows an attacker to overwrite arbitrary files with arbitrary content, as root - without supplying a password. This trivially leads to elevated privileges, for instance, by overwriting the shadow file and setting a password for root. The issue was resolved in June when Ubuntu patched the relevant packages in response to a vulnerability disclosure from Unit 42.
Nadav Markus,
  • 0

Hybrid Data Center Best Practice Planner

The data center is evolving to allow fast and flexible application deployment. Implementing data center best practices will enable you to better protect data and application workloads in the data center on premises, and across multi-cloud.
  • 1

Palo Alto Networks Welcomes Jean English as New Chief Marketing Officer

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced the appointment of marketing veteran Jean English to the position of chief marketing officer (CMO).
Santa Clara, CA
  • 1
  • 296

Secure Transformation: Branch Offices Go Directly to the Cloud

Cloud transformation is changing the ways that organizations approach enterprise networking, especially at the branch office. Learn about how to implement branch security with direct-to-internet networking.
  • 1
  • 74

Secure Transformation: Replacing Remote Access VPN with Prisma Access

This solution brief provides an overview for using GlobalProtect Cloud Service as remote access VPN.
  • 1
  • 127

4 Reasons Government Security Teams Should Choose Cloud-Based Malware Analysis Over Legacy Approaches

Read this info-insights brief to learn why a cloud-based malware analysis and prevention service is the right choice for your federal agency.
  • 0

Using Wireshark: Exporting Objects from a Pcap

When reviewing packet captures (pcaps) of suspicious activity, security professionals may need to export objects from the pcaps for a closer examination.This tutorial offers tips on how to export different types of objects from a pcap. The instructions assume you understand network traffic fundamentals. We will use these pcaps of network traffic to practice extracting objects using Wireshark. The instructions also assume you have customized your Wireshark column display as previously demonstrated in this tutorial.
Brad Duncan,
  • 0

Using Wireshark: Exporting Objects from a PCAP

When reviewing packet captures (pcaps) of suspicious activity, security professionals may need to export objects from the pcaps for a closer examination.This tutorial offers tips on how to export different types of objects from a pcap. The instructions assume you understand network traffic fundamentals. We will use these pcaps of network traffic to practice extracting objects using Wireshark. The instructions also assume you have customized your Wireshark column display as previously demonstrated in this tutorial.
Brad Duncan,
  • 0

Securing SD-WAN with the Palo Alto Networks Next-Generation Security Platform

Protect your SD-WAN deployment using Prisma Access
  • 0
  • 7803

Achievement First

Achievement First one of the top-performing charter school networks in the U.S., adopted the Palo Alto Networks Security Operating Platform which brought next-generation security capabilities and threat intelligence to automatically detect and block malicious network traffic without impeding everyday learning activity..
  • 0
  • 56

Palo Alto Networks Completes Acquisition of Twistlock

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, announced today that it has completed its acquisition of Twistlock, the leader in container security, to extend its Prisma™ cloud security strategy. .
Santa Clara, CA
  • 6
  • 1093
Displaying 61 to 90 of 4016