All resources sponsored by:

Palo Alto Networks

1 - 25 of 46 Matches
Cybersecurity Buyer's Guide
sponsored by Palo Alto Networks
RESOURCE:Inside you'll find criteria for choosing a cybersecurity solution that can block cyberattacks and protect allowed traffic from threats, and learn how to effectively evaluate cybersecurity solutions through the Request for Proposal (RFP) process.
Posted: 30 Jun 2016 | Published: 30 Jun 2016
Get This Now


Securing Windows XP with Traps and Advanced Endpoint Protection
sponsored by Palo Alto Networks
PRODUCT LITERATURE:Locate a way to continue using Windows XP even though its end-of-life has passed. Using a lightweight security client you can keep your legacy systems viable even longer.
Posted: 29 Jun 2016 | Published: 29 Jun 2016
Get This Now


Deployment Series for Hybrid Cloud
sponsored by Palo Alto Networks
RESEARCH CONTENT:Hybrid deployments are one of the most common Amazon Web Services (AWS) scenarios as they extend your on-premises data center. This white paper provides guidelines and recommendations addressing common questions that arise during hybrid use case deployments, specifically using the Palo Alto Networks VM-Series virtualized next-generation firewall.
Posted: 28 Jun 2016 | Published: 28 Jun 2016
Get This Now


How to Secure Retail’s Highly Distributed Environment and POS
sponsored by Palo Alto Networks
WHITE PAPER:Discover how to secure a highly distributed computing infrastructure with security from the core to the edge of the network. Read on to arm yourself to combat brand/customer trust protection, PCI compliance, destructive malware, and more.
Posted: 23 Jun 2016 | Published: 31 Jan 2015
Get This Now


Unlocking the Lucrative Criminal Business Model: An Analyst Report
sponsored by Palo Alto Networks
ANALYST REPORT:Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organisations around the world. Access this analyst report to properly understand today's brand of ransomware, examine the future of ransomware, and identify 6 key strategies with which you will execute your defense.
Posted: 22 Jun 2016 | Published: 22 Jun 2016
Get This Now


Security Reference Blueprint for Industrial Control Systems
sponsored by Palo Alto Networks
WHITE PAPER:Targeted attacks against national, critical infrastructure are a serious threat that must be addressed with the highest priority, given how these systems are responsible for controlling critical services. Learn ways to reduce operational risks, prevent system breaches, and become compliant with both government and internal governance.
Posted: 21 Jun 2016 | Published: 21 Jun 2016
Get This Now


Architecture Matters: Beyond Layered Security Approaches
sponsored by Palo Alto Networks
WHITE PAPER:The foundational architecture of a firewall and security platform matters. Explore ways to build a comprehensive set of defenses that not only discourages attackers, but also prevent data breaches.
Posted: 17 Jun 2016 | Published: 17 Jun 2016
Get This Now


Flipping the Economics of Attacks
sponsored by Palo Alto Networks
RESEARCH CONTENT:Discover the results of this independent study of over 300 security experts on the topic of building a security plan with the bottom line in mind. You'll discover the most economical way to prevent your enterprise from falling victim to attack.
Posted: 13 May 2016 | Published: 29 Jan 2016
Get This Now


Why a Modern Security Architecture Matters
sponsored by Palo Alto Networks
WHITE PAPER:Discover the benefits of an integrated, unified security architecture over the sequential, additive approaches that have evolved the industry. Understand the ability of security architectures to address modern threats while supporting the use of new applications.
Posted: 13 May 2016 | Published: 01 Apr 2016
Get This Now


Key Findings on Endpoint Security and Real-Time Prevention
sponsored by Palo Alto Networks
WEBCAST:This webinar contains the results of a study aimed at revealing which security strategies are most effective at dealing with today's dangerous array of cyber-threats.
Posted: 15 Apr 2016 | Premiered: Oct 30, 2015
Get This Now


Next-Generation Datacenter Security Implementation Guidelines
sponsored by Palo Alto Networks
WHITE PAPER:Discover the 3 critical pieces of a successful datacenter security system. You'll learn about a comprehensive firewall monitoring traffic through your network, and how centralized management can make managing security significantly easier.
Posted: 14 Apr 2016 | Published: 30 Nov 2015
Get This Now


How to Architect Zero Trust Network Segmentation in Industrial Control Systems
sponsored by Palo Alto Networks
WEBCAST:This webcast discusses Zero Trust network segmentation, what it is, and how it gives you better access control and visibility over your network. It also introduces the framework for a system that implements this zero trust network strategy in your enterprise.
Posted: 14 Apr 2016 | Premiered: Nov 30, 2015
Get This Now


Cybersecurity to Protect Financial Data
sponsored by Palo Alto Networks
WEBCAST:This webcast discusses the security challenges of legacy network architecture, and how a security platform approach can benefit security managers who are concerned about their enterprise vulnerability.
Posted: 14 Apr 2016 | Premiered: Apr 14, 2016
Get This Now


Security for Healthcare IT
sponsored by Palo Alto Networks
WHITE PAPER:This security blueprint enables healthcare security and IT pros to reduce security threats and protect patient data from compromise while maintaining compliance and improving uptime and availability.
Posted: 13 Apr 2016 | Published: 31 Dec 2015
Get This Now


Next-Generation Security Platform for Manufacturing
sponsored by Palo Alto Networks
WHITE PAPER:Vulnerabilities to cyberattacks have made the challenge of ensuring strong security in industries like manufacturing a formidable one. Discover ways a platform approach to security can protect networks, improve your ability to meet regulation, and more.
Posted: 13 Apr 2016 | Published: 31 Dec 2014
Get This Now


A Path Towards Secure Banking IT
sponsored by Palo Alto Networks
WHITE PAPER:This paper discusses a security blueprint particularly focused on enabling financial institutions to detect and prevent threats to their networks. This new detection capacity does not need to add complexity and overhead, indeed, it can improve network capability.
Posted: 13 Apr 2016 | Published: 31 Dec 2015
Get This Now


Actionable Threat Intelligence: Logging and Reporting
sponsored by Palo Alto Networks
WHITE PAPER:This resource highlights the capabilities of one network security tool that makes critical information visible and rapidly actionable. It showcases the utility of a highly visual, interactive, and customizable network security monitoring interface.
Posted: 13 Apr 2016 | Published: 31 Dec 2015
Get This Now


Closing the Cybersecurity Gap
sponsored by Palo Alto Networks
WEBCAST:This webcast assesses the growing risk that hackers pose to your enterprise. Watch now to learn about improving your overall security response, from advanced detection tools to creating safer networks that are more immune to attack.
Posted: 12 Apr 2016 | Premiered: Apr 12, 2016
Get This Now


Automation in Network Security Management: Friend or Foe?
sponsored by Palo Alto Networks
WEBCAST:Tune in to learn the pros and cons of network security management automation, and how you can automate your processes for threat analysis and network management.
Posted: 11 Apr 2016 | Premiered: Apr 11, 2016
Get This Now


Cybersecurity Buyer's Guide
sponsored by Palo Alto Networks
RESOURCE:This white paper provides guidance on choosing the right cybersecurity solution for your organization. If you are looking for a new tool, discover 10 things your solution must do, and a checklist that you can use to make your decision.
Posted: 06 Apr 2016 | Published: 31 Dec 2015
Get This Now


10 Things Your Cybersecurity Solution Must Do
sponsored by Palo Alto Networks
WHITE PAPER:As cybercrime evolves, so must your defence strategy to secure your organisation; however, multiple tools often do not mesh perfectly and vulnerabilities are left open. In this white paper, learn the 10 must-have security capabilities for your strategy.
Posted: 15 Feb 2016 | Published: 23 Dec 2015
Get This Now


Next Generation Firewall for Dummies
sponsored by Palo Alto Networks
EBOOK:This eBook provides and in-depth overview of next-gen firewalls.
Posted: 15 Feb 2016 | Published: 27 Jan 2016
Get This Now


Lightboard WildFire vs Standalone Sandboxing
sponsored by Palo Alto Networks
VIDEO:This presentation shows you how to simplify your network traffic monitoring and get rid of your existing Sandbox appliance. Protect against zero-day threats by using both static and dynamic analysis techniques.
Posted: 12 Feb 2016 | Premiered: 17 Oct 2014
Get This Now


End Point Lightboard
sponsored by Palo Alto Networks
VIDEO:In this video, you will see the battle security pros fight every day and what new tools are needed to stop hackers.
Posted: 11 Feb 2016 | Premiered: 31 Aug 2015
Get This Now


Zero Trust on the Endpoint
sponsored by Palo Alto Networks
WHITE PAPER:There needs to be a paradigm shift for organizations to rethink their security infrastructure. Forrester's Zero Trust model remedies the deficiencies with perimeter-centric strategies and legacy technologies. Learn how to better organize and connect your defenses while preventing the execution of malicious executables and exploits.
Posted: 11 Feb 2016 | Published: 31 Mar 2015
Get This Now


1 - 25 of 46 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement