All resources sponsored by:

Palo Alto Networks

1 - 25 of 41 Matches
First Principles for Network Defenders: A Unified Theory for Security Practitioners
sponsored by Palo Alto Networks
WHITE PAPER:In this paper, we propose that the first principle for all network defenders is to prevent high-risk material impact to the organization. The three essential tasks that support the first principle are: threat prevention, threat detection, and threat eradication.
Posted: 05 Jul 2016 | Published: 01 Jun 2016
Get This Now


3 Steps to Taking Control of SaaS Apps
sponsored by Palo Alto Networks
WHITE PAPER:In this tech brief, you'll find a quick 3-step guide to get SaaS under control and prevent threats.
Posted: 01 Jul 2016 | Published: 01 Jul 2016
Get This Now


Advanced Endpoint Protection for Windows Server 2003 After End-of-Support
sponsored by Palo Alto Networks
WHITE PAPER:Identify how you can maintain security in your network, despite the fact that Windows Server 2003 has reached its End-of-Support.
Posted: 01 Jul 2016 | Published: 01 Jul 2016
Get This Now


Top 10 Zero-Day Exploits of 2015
sponsored by Palo Alto Networks
WHITE PAPER:This paper provides a list of the Top 10 Zero-Day Exploits of 2015 and offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns. It also provides additional details on three particularly effective zero-day exploits in brief case studies.
Posted: 30 Jun 2016 | Published: 01 May 2016
Get This Now


Securing Office 365 Is Easier Than You Think
sponsored by Palo Alto Networks
WHITE PAPER:Learn how you can tighten up the safety features present in Microsoft Office 365 and other SaaS applications critical to your network operations.
Posted: 30 Jun 2016 | Published: 30 Jun 2016
Get This Now


Cybersecurity Buyer's Guide
sponsored by Palo Alto Networks
RESOURCE:Inside this buyer's guide, you'll find 10 criteria for choosing a cybersecurity solution that can block cyberattacks and protect allowed traffic from threats, and advice on how to effectively evaluate cybersecurity solutions through the request for proposal (RFP) process.
Posted: 30 Jun 2016 | Published: 30 Jun 2016
Get This Now


Securing Windows XP with Traps and Advanced Endpoint Protection
sponsored by Palo Alto Networks
PRODUCT LITERATURE:Uncover a way to continue using Windows XP while maintaining acceptable levels of security and compliance even though its end-of-life has passed.
Posted: 29 Jun 2016 | Published: 29 Jun 2016
Get This Now


Firewall Deployment for Hybrid Cloud
sponsored by Palo Alto Networks
RESEARCH CONTENT:Your applications and data are an attacker's target, and protecting them in AWS introduces similar security challenges as in your on-premises network. Access this white paper for guidance on how to control and protect your apps with a virtualized firewall for AWS.
Posted: 28 Jun 2016 | Published: 28 Jun 2016
Get This Now


How to Secure Retail’s Highly Distributed Environment and POS
sponsored by Palo Alto Networks
WHITE PAPER:Discover how to secure a highly distributed computing infrastructure with security from the core to the edge of the network. Read on to arm yourself to combat brand/customer trust protection, PCI compliance, destructive malware, and more.
Posted: 23 Jun 2016 | Published: 31 Jan 2015
Get This Now


Unlocking Ransomware, the Lucrative Criminal Business Model: An Analyst Report
sponsored by Palo Alto Networks
ANALYST REPORT:Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organizations around the world. Access this analyst report to properly understand today's brand of ransomware, examine the future of ransomware, and identify 6 key strategies with which you will execute your defense.
Posted: 22 Jun 2016 | Published: 22 Jun 2016
Get This Now


Security Reference Blueprint for Industrial Control Systems
sponsored by Palo Alto Networks
WHITE PAPER:Targeted attacks against national, critical infrastructure are a serious threat that must be addressed with the highest priority, given how these systems are responsible for controlling critical services. Learn ways to reduce operational risks, prevent system breaches, and become compliant with both government and internal governance.
Posted: 21 Jun 2016 | Published: 21 Jun 2016
Get This Now


Architecture Matters: Beyond Layered Security Approaches
sponsored by Palo Alto Networks
WHITE PAPER:The foundational architecture of a firewall and security platform matters. Explore ways to build a comprehensive set of defenses that not only discourages attackers, but also prevent data breaches.
Posted: 17 Jun 2016 | Published: 17 Jun 2016
Get This Now


Key Findings on Endpoint Security and Real-Time Prevention
sponsored by Palo Alto Networks
WEBCAST:Discover the results of a Forrester study aimed at uncovering which security strategies are most effective at protecting endpoints from advanced threats, plus what your peers believe are the challenges and pitfalls of today's endpoint protection solutions.
Posted: 15 Apr 2016 | Premiered: Oct 30, 2015
Get This Now


Next-Generation Datacenter Security Implementation Guidelines
sponsored by Palo Alto Networks
WHITE PAPER:You need to implement new security policies to protect your data center from breach, but the complex architecture causing integration issues. What's next? Access these implementation guidelines for deploying new firewall and advanced threat prevention features in a physical, virtualized, or hybrid data center.
Posted: 14 Apr 2016 | Published: 30 Nov 2015
Get This Now


How to Architect Zero Trust Network Segmentation in Industrial Control Systems
sponsored by Palo Alto Networks
WEBCAST:This webcast discusses Zero Trust network segmentation, what it is, and how it gives you better access control and visibility over your network. It also introduces the framework for a system that implements this zero trust network strategy in your enterprise.
Posted: 14 Apr 2016 | Premiered: Nov 30, 2015
Get This Now


Cybersecurity to Protect Financial Data
sponsored by Palo Alto Networks
WEBCAST:This webcast discusses the security challenges of legacy network architecture, and how a security platform approach can benefit security managers who are concerned about their enterprise vulnerability.
Posted: 14 Apr 2016 | Premiered: Apr 14, 2016
Get This Now


Next-Generation Security Platform for Manufacturing
sponsored by Palo Alto Networks
WHITE PAPER:Vulnerabilities to cyberattacks have made the challenge of ensuring strong security in industries like manufacturing a formidable one. Discover ways a platform approach to security can protect networks, improve your ability to meet regulation, and more.
Posted: 13 Apr 2016 | Published: 31 Dec 2014
Get This Now


A Path Towards Secure Banking IT
sponsored by Palo Alto Networks
WHITE PAPER:This paper discusses a security blueprint particularly focused on enabling financial institutions to detect and prevent threats to their networks. This new detection capacity does not need to add complexity and overhead, indeed, it can improve network capability.
Posted: 13 Apr 2016 | Published: 31 Dec 2015
Get This Now


Actionable Threat Intelligence: Logging and Reporting
sponsored by Palo Alto Networks
WHITE PAPER:This resource highlights the capabilities of one network security tool that makes critical information visible and rapidly actionable. It showcases the utility of a highly visual, interactive, and customizable network security monitoring interface.
Posted: 13 Apr 2016 | Published: 31 Dec 2015
Get This Now


Closing the Cybersecurity Gap
sponsored by Palo Alto Networks
WEBCAST:Access this webcast today to learn how to improve your overall security response with advanced detection to create a safer network that is more resilient for the modern age.
Posted: 12 Apr 2016 | Premiered: Apr 12, 2016
Get This Now


Automation in Network Security Management: Friend or Foe?
sponsored by Palo Alto Networks
WEBCAST:This webcast discusses the risks and benefits of automation as it pertains to security the psychological aspects of being against automation, and how you can automate your network processes for threat analysis and also from a management perspective.
Posted: 11 Apr 2016 | Premiered: Apr 11, 2016
Get This Now


Cybersecurity Buyer's Guide
sponsored by Palo Alto Networks
RESOURCE:This white paper provides guidance on choosing the right cybersecurity solution for your organization. If you are looking for a new tool, discover 10 things your solution must do, and a checklist that you can use to make your decision.
Posted: 06 Apr 2016 | Published: 31 Dec 2015
Get This Now


10 Things Your Cybersecurity Solution Must Do
sponsored by Palo Alto Networks
WHITE PAPER:As cybercrime evolves, so must your defence strategy to secure your organisation; however, multiple tools often do not mesh perfectly and vulnerabilities are left open. In this white paper, learn the 10 must-have security capabilities for your strategy.
Posted: 15 Feb 2016 | Published: 23 Dec 2015
Get This Now


Zero Trust on the Endpoint
sponsored by Palo Alto Networks
WHITE PAPER:There needs to be a paradigm shift for organizations to rethink their security infrastructure. Forrester's Zero Trust model remedies the deficiencies with perimeter-centric strategies and legacy technologies. Learn how to better organize and connect your defenses while preventing the execution of malicious executables and exploits.
Posted: 11 Feb 2016 | Published: 31 Mar 2015
Get This Now


Buyer's Guide to Cybersecurity Solutions
sponsored by Palo Alto Networks
WHITE PAPER:Risks are evolving, and so are solutions. Learn how to evaluate and select the best technology for your organization.
Posted: 10 Dec 2015 | Published: 10 Dec 2015
Get This Now

TOPICS:  IT Management

1 - 25 of 41 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement