palo alto networks

Results 1 - 25 of 73Sort Results By: Published Date | Title | Company Name
Published By: Palo Alto Networks     Published Date: Jul 05, 2012
While the next-generation firewall (NGFW) is well defined by Gartner as something new, enterprise-focused, and distinct, many network security vendors are claiming NGFW is a subset of other functions.
Tags : 
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Dec 11, 2013
The 10 Things Your Next Firewall Must Do outlines the latest capabilities that a firewall should possess and helps you learn how to choose a firewall that can safely enable your business in the ever-changing world of network security. In this free booklet, you'll find an insight and practical advice on: - Considerations for choosing your next firewall - Best practices for implementing safe application enablement policies - Essential firewall capabilities for battling modern threats
Tags : 
firewall, palo alto, security, network security, safe applications, cyber threats
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored.
Tags : 
palo alto, firewall, applications, ssl, ssh
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting a job.
Tags : 
firewall, optimization, security risks, business, devices, employees, technology
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Jul 05, 2012
The threats that enterprise network and security teams face are evolving rapidly, and the security products that they implement play a major role in the success or failure of the organization's overall security strategy.
Tags : 
firewall, 2011-2012, enterprise, network, security
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Dec 04, 2015
Simplify your maintenance management software evaluation process with this free download!
Tags : 
palo alto, maintenance management, pricing guide, software guide
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Dec 04, 2015
Simplify your maintenance management software evaluation process with this 2015 software pricing guide!
Tags : 
palo alto, maintenance management, pricing guide, software guide
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Today’s threats are more sophisticated than ever before. All types of organizations and information are being targeted. Attackers exploit vulnerabilities in software and use malware to further their attack objectives.
Tags : 
palo alto, advanced enpoint protection, strategy works, company protection, security
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Microsoft® announced Windows Server® 2003 End-of-Support (EOS) on July 14, 2015. Many businesses are forced by circumstance to leave these systems in service for some time. Retiring a major enterprise component has always been a challenge for IT departments.
Tags : 
palo alto, advanced enpoint protection, strategy works, company protection, security, microsoft
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Jul 05, 2012
The Application Usage and Risk Report from Palo Alto Networks provides a global view into enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide.
Tags : 
palo alto networks, risk report, application usage
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Jun 19, 2014
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.
Tags : 
palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Every year, record levels of money are spent on new IT security technology yet major breaches and compromises are more prevalent than ever. The concept of “layered security” in which an organization supports a wide variety of security technologies in order to discourage attackers doesn’t seem to be working. It’s time to rethink IT security not just the technology, but the way it’s approached from a strategic, architectural perspective.
Tags : 
palo alto, security, security architecture, saas, applications
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Feb 24, 2016
Automation in Network Security Management
Tags : 
palo alto, network security, data, threat
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Today, working remotely has never been easier, due to the ubiquity of mobile devices and reliable Internet connectivity. The ease with which a worker can get connected to the corporate network delivers the impression that your co-worker is down the hall, when in fact they are traveling internationally. Global Workplace Analytics’ research shows that increasingly, working remotely is not only commonplace, it is encouraged and has shown to improve productivity.
Tags : 
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
A new survey commissioned by Palo Alto Networks and conducted by Enterprise Strategy Group explores why enterprise IT leaders are embracing CASB products, where they are using them, and what capabilities are most important to them. One of the most critical needs is securing the use of SaaS applications. Here’s what you need to know.
Tags : 
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
A new survey commissioned by Palo Alto Networks and conducted by Enterprise Strategy Group explores why enterprise IT leaders are embracing CASB products, where they are using them, and what capabilities are most important to them.
Tags : 
palo alto, saas, casb, security
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered.
Tags : 
palo alto, automated malware, security, cloud
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: May 09, 2012
In this on-demand video broadcast, hear Nir Zuk, CTO and co-founder of Palo Alto Networks and Rich Mogull, Analyst and CEO of Securosis, provide insights and recommendations on how to handle consumerization and the proliferation of devices.
Tags : 
palo alto, palo alto networks, consumerization, proliferations, applications, mobile, mobile devices, controls
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Jul 05, 2012
Read this white paper to learn how botnets work and about the role of next-generation firewalls in controlling threats. Download now.
Tags : 
palo alto, botnets, firewall, malware
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Jul 05, 2012
Introducing WildFire: the Next-Generation of Malware Defense
Tags : 
palo alto, malware, wildfire
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Cyber criminals constantly innovate their threat tactics to more efficiently breach organizations and make off with valuable data. As cybercrime evolves, we see increased innovation in the hacking tools and techniques used to evade known security mechanisms. In the past few years, we have seen more advanced, targeted attacks, where hackers spent ample time investigating the target and tailoring the threat. Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. In a world of cyberthreats where the only constant is change, architecting a cybersecurity solution that dynamically adapts to constant change is crucial.
Tags : 
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Palo Alto Networks is leading a new era in cybersecurity by securing thousands of enterprise, government, and service provider network from cyber threats and protecting our digital way of life.
Tags : 
palo alto, firewall, cyber security, automation, cybersecurity for dummies
    
Palo Alto Networks
Start   Previous   1 2 3    Next    End
Search Resource Library