Date

Education and Professional Services

Displaying 1 to 30 of 3363

Idaptive and Palo Alto Networks Solution Brief

Idaptive is joining forces with Palo Alto Networks to launch Intelligent MFA on Cortex. With Idaptive Next-Gen Access Cloud, organi-zations can leverage data from Cortex Data Lake to analyze event-level data and make more precise, risk-based access decisions. For example, you can now use events Cortex captures to dynamically adjust risk profiles for individual users and enforce more stringent authentication policies for high-risk access requests. Together, Palo Alto Networks and Idaptive provide more accurate and autonomous security by allowing you to constantly evolve your defenses in a seamless, frictionless way.
  • 1

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.
  • 96
  • 254174

What is a Zero Trust Architecture?

Businesses who want to prevent the exfiltration of sensitive data and improve their defense against modern cyber threats can consider a Zero Trust architecture.
  • 5
  • 52181

What Is 5G Security?

DNS hijacking has been used to take over the web domain of The New York Times. What is it, and how does it work?
  • 0
  • 102

Palo Alto Networks Appoints Two New Members to Board of Directors

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced the appointment of Lorraine Twohill, chief marketing officer at Google LLC (formerly Google Inc.), and the Right...
Santa Clara, CA
  • 0
  • 65

RedLock Editions Guide

This is a pubic facing PDF that highlights 2 main things: 1) how we define a workload in RedLock and examples across cloud service provider and 2) a feature comparison between the biz and enterprise editions
  • 0
  • 3017

What Is DNS Hijacking?

DNS hijacking has been used to take over the web domain of The New York Times. What is it, and how does it work?
  • 3

What Is DNS Tunneling?

DNS tunneling is one of the most damaging DNS attacks. What exactly is it, and how does it work?
  • 1

PA-3200 Series Datasheet

Palo Alto Networks® PA-3200 Series of next-generation firewalls comprises the PA-3260, PA-3250 and PA-3220, all of which are targeted at high-speed internet gateway deployments. The PA-3200 Series secures all traffic, including encrypted traffic, using dedicated processing and memory for networking, security, threat prevention and management.
  • 5
  • 30531

Requirements for Keeping Pace with Attackers

Zero Trust can provide the context necessary to secure what’s important and, with the right vendors in place, keep up with today’s changing landscape.
  • 0

What is Zero Trust

John Kindervag, founder of Zero Trust, defines what Zero Trust is and explains why trust must be eliminated from networks.
  • 0

The Goal of Zero Trust

John Kindervag, founder of Zero Trust, explains the ultimate goal of Zero Trust.
  • 0

What Is DNS?

DNS is as ubiquitous online as flooring is in your home – so what exactly is it, and why should you care?
  • 2

Command-and-Control Explained

Command-and-control attacks can compromise an entire network. Find out what they are and how they work.
  • 1

New variants of Mirai botnet detected, targeting more IoT devices

Palo Alto Networks researchers spot versions for 5 more processors in the wild.
  • 0
  • 66

Heavy Reading’s 2019 5G Security Survey

Read a custom research report produced for F5 Networks, Fortinet, NetNumber, and Palo Alto Networks on the service provider priorities and preferences in implementing security to their 5G networks.
  • 1

Implementing 5G Security: Priorities and Preferences

Read this white paper to get key findings from the 2019 Heavy Reading service provider survey on implementing 5G security.
  • 0

Gartner Report: Innovation and Insight for Cloud Security Posture Management (CSPM)

The rapid adoption of cloud services, along with an increasing number of cloud infrastructure and platform services, has created an explosion in complexity and unmanaged risk. While IaaS providers deliver basic configuration and risk assessment capabilities, they only address their own services, which doesn’t account for the hybrid and multi-cloud capabilities that most enterprises require. And although the underlying cloud provider infrastructure is secure, most enterprises don’t have the processes, tooling maturity or scale to use the cloud securely.
  • 0

Cortex XDR

Hunt down and stop stealthy attacks by unifying network, endpoint, and cloud data
  • 1
  • 4858

Defining Organizational Cloud Security Responsibilities

Attackers always look for quick ways to steal data. Using readily available automated tools and advanced techniques, they can do so with ease, leaving your traditional network defenses ineffective.
  • 1

Four Ways to Improve Cloud Security and Compliance

Attackers always look for quick ways to steal data. Using readily available automated tools and advanced techniques, they can do so with ease, leaving your traditional network defenses ineffective.
  • 0

Redlock Privacy Data Sheet

Describes how RedLock processes personal information
  • 0
  • 3057

Reducing the Business Risks of Cyberthreats

Your organization’s approach to cybersecurity can either securely enable your business to innovate and make use of transformational technologies, like the cloud, or it can introduce unnecessary risk and complexity. In this era of advanced threats and mega-breaches, organizations face an increasingly sophisticated adversary, aided by automation and the power of the cloud. Those companies still relying on largely manual methods to deal with such threats are now seeking ways to adjust to the changing landscape.
  • 3
  • 627

Cortex XDR Privacy Datasheet

Palo Alto Networks® engaged independent data privacy risk management provider TrustArc® to review and document the data flows and practices described in this datasheet. The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the service.
  • 0
  • 3073

Palo Alto Networks Completes Acquisition of Demisto

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced it has completed its acquisition of Demisto, a leading cybersecurity company specializing in security...
Santa Clara, CA
  • 1
  • 807

GlobalProtect Datasheet

The world you need to secure continues to expand as both users and applications shift to locations outside the traditional network perimeter. Security teams face challenges with maintaining visibility into network traffic and enforcing security policies to stop threats. Traditional technologies used to protect mobile endpoints, such as host endpoint antivirus software and remote access VPN, are not capable of stopping the advanced techniques employed by today’s more sophisticated attacker. GlobalProtect™ network security client for endpoints, from Palo Alto Networks®, enables organizations to protect the mobile workforce by extending the Next-Generation Security Platform to all users, regardless of location. It secures traffic by applying the platform’s capabilities to understand application use, associate the traffic with users and devices, and enforce security policies with next-generation technologies.
  • 6
  • 50040

Palo Alto Networks and HKT Launch Endpoint Threat Protection Service to Elevate Cybersecurity Posture of Hong Kong Enterprises

HONG KONG, 28 March 2019 -- Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, and HKT, Hong Kong’s premier telecommunications service provider, today jointly announced the launch of Endpoint Threat Protection Service by Threat Management Services. The new online defensive service utilizes the technology of Palo Alto Networks Traps™ for endpoint protection and response to protect organizations in Hong Kong against sophisticated cyberthreats.
HONG KONG
  • 0
  • 59

Palo Alto Networks Announces Three New Security Advancements

HONG KONG – March 28, 2019 – Palo Alto Networks, the global cybersecurity leader, has announced the availability of three significant advancements aimed at harnessing the power of advanced AI and machine learning.
HONG KONG
  • 0
  • 98

ON2IT Cortex Managed Services Solution Brief

Security breaches are a fact of life, and prevention efforts never offer a 100 percent guarantee. Many organizations still focus primarily on prevention—but what happens after a breach? Can you quickly find out what exactly happened, which data was affected, and how the breach was stopped? Insufficient logging often makes it difficult to identify the root cause. When a breach happens, everything in your entire organization is in scope, and you need to respond quickly
  • 0
  • 121

Cybersecurity Career Guide: Who Works in Cybersecurity, How We Got Started, Why We Need You

This book provides information and resources for students and those who are interested in starting a career in cybersecurity. We reached out to some of the best cybersecurity practitioners in the industry and asked them to share their insights on how they got started. The result is a compilation of amazing stories of how these cybersecurity practitioners got started and the tools they continue to use to learn and grow in their careers.
  • 2
  • 2464
Displaying 1 to 30 of 3363