Palo Alto Networks Awards & Certifications

2015, 2016, 2017 & 2018 J.D. Power Certified Assisted Technical Support Program

Palo Alto Networks, Inc. has been recognized by J.D. Power for four consecutive years for providing “An Outstanding Customer Service Experience” for its Assisted Technical Support.

Four Consecutive Years of Award-Winning Global Support from Palo Alto Networks

J.D. Power 2018 Certified Assisted Technical Support Program, developed in conjunction with TSIA. Based on successful completion of an audit and exceeding a customer satisfaction benchmark for assisted support operations.

For more information, visit www.jdpower.com or www.tsia.com.


2015, 2016, 2017 & 2018 TSIA Global Rated Outstanding Assisted Certification

TSIA certification recognizes that Palo Alto Networks has achieved Global Rated Outstanding Assisted Support for a fourth  consecutive year for 2018. Customers can purchase Palo Alto Networks products with confidence knowing that Palo Alto Networks meets the highest industry support standards.

 




Recommended Resources

What is a denial of service attack (DoS) ?

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users by flooding it with traffic.
  • 8
  • 109321

What is Zero Trust?

Like “machine learning” and “AI,” Zero Trust has become one of cybersecurity’s latest buzzwords. With all the noise out in the market, it’s imperative to understand what Zero Trust is, as well as what Zero Trust isn’t.
  • 16
  • 86542

What is an Intrusion Prevention System?

An Intrusion Prevention System (IPS) is a network security prevention technology that examines network traffic flow to detect and prevent vulnerability exploits
  • 9
  • 145382

Best practices for complete cloud security

The way your business leverages cloud and SaaS technologies evolves each and every day -- including where they access systems and data from. As a result, many security and technology executives find it a challenge to strike the right balance between speed and risk. If you’re looking for ideas and best practices to ensure consistent, comprehensive security without adding additional complexity, check out our Prisma resource center for tips and best practices to inform how your next step in your cloud security journey.
  • 22
  • 41148

What is an Endpoint?

Endpoints are remote computing devices that connect to a network and communicates back and forth with the network.
  • 1
  • 46681

What is Cybersecurity?

Cybersecurity refers to the preventative techniques used to protect the integrity of networks, programs and data from attack, damage, or unauthorized access.
  • 9
  • 105911