Date

Education and Professional Services

Displaying 31 - 60 of 4673

Article

An Overview of FedRAMP and Why You Should Care About It

In 2017, the White House signed an executive order to strengthen the cybersecurity of federal networks and critical infrastructure. With this directive, combined with the Modernizing Government Technology Act, U.S federal agencies are focusing on modernizing their IT infrastructure while making security a top priority. A key component of this modernization is accelerating the adoption of secure, cloud-based services. The Federal Risk and Authorization Management Program, or FedRAMP, was conceived as a way to minimize cybersecurity risk for federal agencies as they move to the cloud.

Article

Top 5 Requirements for Securing Your Branch Offices

Securing your branch office is a crucial and necessary tactic to protecting your organization’s data and employees, as well as ensuring your organization does not suffer the consequences of a breach.

Article

What Is a Hybrid Data Center?

A hybrid data center is an evolution strategy that allows for creating the right mix of cloud and traditional IT that best suits your organizational needs.

Article

What Is a Cloud VPN?

A cloud VPN (also known as virtual private network as a service (VPNaas) or hosted VPN) is a new type of VPN technology that’s specifically designed for the cloud.

White Paper

Federal Cloud Journey Guidance

Helping to guide federal organizations as they continue to migrate to cloud environments.

Article

3 Ways to Prevent Evasive Threats

To identify and prevent evasive threats, security tools must employ purpose-built virtual analysis, bare metal analysis, and incorporate threat intelligence.

Datasheet

Prisma Access (GlobalProtect Cloud Service) Datasheet

Global expansion, mobile workforces and cloud computing are shifting the locations of your applications, data and users. These changes introduce new opportunities for business efficiencies, but they also create a set of unique cybersecurity challenges.

Unit 42

Kubernetes Vulnerability Puts Clusters at Risk of Takeover (CVE-2020-8558)

CVE-2020-8558 exposed internal services of Kubernetes nodes. Read more details about the issue and recommendations for mitigation.
Yuval AvrahamiAriel Zelivansky,

Datasheet

XDR RFP CHECKLIST

XDR must deliver a wide range of common EDR capabilities to provide efficient and effective security against modern attacks, while also integrating with other key prevention, detection, and response tools across the infrastructure. The following RFP checklist includes requirements within nine key categories to help you evaluate the quality of the platforms you’re considering. Use this checklist as a starting point and tailor it to your company’s needs to ensure you’re able to identify vendors that can best support your organization.

White Paper

Cortex XSOAR and Google Chronicle Integration

In today’s ever-changing cloud landscape, it's easy for incident response teams to miss out on potential threats that can impact their organization because they’re time-strapped by manual processes or unable to take advantage of the breadth of external threat intelligence available and how these threats impact their organizations.

White Paper

Agile and keyless cloud security response

Cortex XSOAR’s security orchestration and automation capabilities can now be used to deploy and manage a variety of AWS services in a keyless and secure manner.

Datasheet

Redefining cloud security orchestration

Cloud security demands agility and flexibility in the face of an expanded threat surface and disparate teams. Cortex XSOAR primes users for fast and standardized cloud security through multi-source ingestion of cloud data and playbooks that coordinate and automate incident response actions across cloud and on-premises environments.

In The News

Minorities in cybersecurity face unique and lasting barriers

IT is facing renewed scrutiny into its lack of diversity. Explore the unique barriers minorities in cybersecurity face and why hiring approaches are ill equipped to address them.

Unit 42

Evolution of Valak, from Its Beginnings to Mass Distribution

Valak is an information stealer and malware loader that has become increasingly common in our threat landscape and is being mass distributed by an actor known as Shathak/TA551.
Brad Duncan,

References and Case Studies

Wright Pierce Case Study - Palo Alto Networks CloudGenix SD-WAN

Learn how Wright Pierce simplified their network management.

In The News

Taking on the perfect storm in cybersecurity

The cybersecurity industry is at a turning point. Traditional security approaches were already struggling to deal with rising cyberattacks, a shift to cloud and explosive growth in Internet of Things (41.6 billion IoT devices by 2025, anyone?).

References and Case Studies

Yancey Bros. Case Study - Palo Alto Networks CloudGenix SD-WAN

Read this case study to learn why Yancey Bros. chose CloudGenix SD-WAN.

White Paper

Panorama at a Glance

Panorama reduces network complexity with logical, functional device groups, simplifies network management with easy, global policy control, and reduces the time that threats linger on your network with actionable data highlighting critical information for response prioritization.

Unit 42

OilRig Targets Middle Eastern Telecommunications Organization and Adds Novel C2 Channel with Steganography to Its Inventory

We discovered a variant of an OilRig-associated tool that uses a novel email-based C2 channel with steganography to exfiltrate data.
Robert Falcone,

Video

IoT Security by Palo Alto Networks

Solving security issues in IoT is no longer an option when it comes to preventing cyber attacks. Watch this video to learn about how our industry-first cloud-delivered IoT Security solutionwas created from the ground up to discover, secure,and protectall the IoT devices in your network.

White Paper

Federal Cloud Journey

Helping to guide federal organizations as they continue to migrate to cloud environments.

Datasheet

Cortex XSOAR for MSSPs

Cortex™ XSOAR supercharges MSSP efficiency by unifying case management, automation, real-time collaboration, and native Threat Intel Management in the industry’s first extended security orchestration, automation, and response (SOAR) offering.

Datasheet

Cortex XDR Privacy Datasheet

Palo Alto Networks® engaged independent data privacy risk management provider TrustArc® to review and document the data flows and practices described in this datasheet. The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the service.

Unit 42

Threat Brief: Microsoft DNS Server Wormable Vulnerability CVE-2020-1350

We suggest mitigation actions to protect against exploitation of CVE-2020-1350 within the Microsoft Windows DNS Server.
Mike HarbisonBrandon Young,

References and Case Studies

Members Credit Union Case Study - Palo Alto Networks CloudGenix SD-WAN

Learn how this credit union gained agility and simplified their WAN.

White Paper

Questions CISOs Should Ask to Modernize Their Network Security Strategy

Here are six questions CISOs should ask to modernize their network security strategy.

White Paper

How Security Approaches Must Evolve to Address Modern Network Threats

Security approaches must evolve to address modern network threats. Learn what organizations should look for as they undertake digital transformation.

Article

How to Secure IoT Devices in the Enterprise

As connected devices continue to increase in numbers, it is increasingly challenging for enterprises to secure them and keep threats at bay.

References and Case Studies

ProAmpac Case Study - Palo Alto Networks CloudGenix SD-WAN

Read why ProAmpac chooses CloudGenix SD-WAN to simplified their remote sites.

References and Case Studies

Uwharrie Bank Case Study - Palo Alto Networks CloudGenix SD-WAN

Read this case study to learn why Uwharrie trusts CloudGenix SD-WAN.
Displaying 31 - 60 of 4673