All resources sponsored by:

Palo Alto Networks

1 - 25 of 40 Matches
The State of Cloud Native Security
sponsored by Palo Alto Networks
ANALYST REPORT:As more and more applications are migrated into the cloud, and organizations focus less on their own on-premises hardware, countless cloud and app security questions have arisen. This State of Cloud Native Security Report delves into the current market landscape for cloud and cloud-native security.
Posted: 16 Jul 2020 | Published: 16 Jul 2020
Get This Now


An Ideal Match with Analyst's SOAR Recommendations
sponsored by Palo Alto Networks
DATA SHEET:According to Gartner, the ‘ideal’ SOAR solution is defined by the convergence of security orchestration and automation, incident response, and threat intelligence. These capabilities are native to the Cortex XSOAR platform – but does that make it ideal? Read this data sheet to see how Cortex XSOAR stacks up to Gartner’s recommendations.
Posted: 29 Jun 2020 | Published: 29 Jun 2020
Get This Now


Cortex XSOAR
sponsored by Palo Alto Networks
DATA SHEET:Security teams are often overburdened with a growing volume of threats and security alerts that require manual attention. Download this data sheet for an in-depth look at Cortex XSOAR, a security platform designed to streamline security operation center (SOC) efficiency by empowering teams with enhanced automation and collaboration capabilities.
Posted: 29 Jun 2020 | Published: 29 Jun 2020
Get This Now


Transforming Detection and Response: A SANS Review of Cortex XDR
sponsored by Palo Alto Networks
ANALYST REPORT:Cortex XDR is a platform designed to help organizations detect and respond to threats. It brings multiple data sources together to assist analysts in performing enterprise investigations. This SANS report found that organizations looking for a holistic view of their environment would benefit from the correlation/response capabilities of Cortex XDR.
Posted: 29 Jun 2020 | Published: 30 Apr 2020
Get This Now


Cortex XDR Endpoint Protection Solution Guide
sponsored by Palo Alto Networks
PRODUCT OVERVIEW:To protect your endpoints against the threats used by today’s cyberattackers, prevention tactics and AI-based analysis tools are needed to simplify operations and outpace hackers. Download this solution guide for a closer look at Cortex EDR, a cloud-delivered agent designed to help with endpoint detection, protection and response.
Posted: 29 Jun 2020 | Published: 29 Jun 2020
Get This Now


Top Security Orchestration Use Cases
sponsored by Palo Alto Networks
WHITE PAPER:In this e-book, take a look at some use cases where security orchestration’s capabilities can help simplify, automate, and improve efficiencies of incident response and security operations.
Posted: 26 Jun 2020 | Published: 26 Jun 2020
Get This Now


Cortex XDR Managed Threat Hunting
sponsored by Palo Alto Networks
DATA SHEET:Get peace of mind knowing your organization is safe with a Managed Threat Hunting Service. Read on to learn all about the benefits of Cortex XDR Managed Threat Hunting.
Posted: 26 Jun 2020 | Published: 26 Jun 2020
Get This Now


Secure Transformation: Replacing Remote Access VPN with Prisma Access
sponsored by Palo Alto Networks
WHITE PAPER:With the continued growth of mobile workforces and cloud-based applications, organizations are quickly finding remote access can't keep up with or secure the cloud. In this white paper, learn how to create a scalable, cloud-based infrastructure that provides secure access to all applications with Prisma Access.
Posted: 18 Jun 2020 | Published: 18 Jun 2020
Get This Now


Ten Tenets of an Effective SASE Solution
sponsored by Palo Alto Networks
WHITE PAPER:This e-book guides you through the top 10 requirements to keep in mind as you look for an effective SASE offering.
Posted: 18 Jun 2020 | Published: 18 Jun 2020
Get This Now


Secure Access Service Edge (SASE) for Dummies
sponsored by Palo Alto Networks
EBOOK:As defined by Gartner, a secure access service edge (SASE) supports cloud-enabled organizations by combining networking and network security services into a single cloud-delivered offering. Get a copy of Secure Access Service Edge (SASE) For Dummies and dive into this new security approach.
Posted: 17 Jun 2020 | Published: 17 Jun 2020
Get This Now


The Continuum of Cloud Native Topologies
sponsored by Palo Alto Networks
WHITE PAPER:This guide breaks down the cloud native continuum, evaluating the different technologies that the continuum is composed of (such as VMs, containers, and serverless) while providing guidance on how to choose between them.
Posted: 12 Jun 2020 | Published: 12 Jun 2020
Get This Now

TOPICS:  Cloud Computing

Spring 2020 Cloud Threat Report: Putting the Sec in DevOps
sponsored by Palo Alto Networks
RESEARCH CONTENT:For the Palo Alto Networks Spring 2020 edition of the Unit 42 Cloud Threat Report, cloud threat researchers focused their attention on the practices of DevOps. The research aimed to uncover where cloud vulnerabilities are surfacing. Read on to uncover the results.
Posted: 09 Jun 2020 | Published: 09 Jun 2020
Get This Now


The Business Case for Cloud Threat Defense
sponsored by Palo Alto Networks
WHITE PAPER:In order to protect the growing security and compliance requirements needed to protect cloud data and applications, organizations are implementing cloud threat defenses. Download this white paper to get a better understanding of the benefits, costs, issues and risks associated with implementing cloud threat defenses.
Posted: 09 Jun 2020 | Published: 09 Jun 2020
Get This Now


Container Security 101: Understanding the Basics of Securing Containers
sponsored by Palo Alto Networks
WHITE PAPER:Container environments bring a range of cybersecurity issues involving images, containers, hosts, runtimes, registries, and orchestration platforms, which all need to be secured. Not sure where to begin? Download Container Security 101: Understanding the Basics of Securing Containers for everything you need to know.
Posted: 08 Jun 2020 | Published: 08 Jun 2020
Get This Now


How SOAR Is Transforming Threat Intelligence
sponsored by Palo Alto Networks
WHITE PAPER:Today’s cyberthreats are more complex and frequent than ever before. Lack of control and visibility, as well as siloed workflows, prevent organizations from responding to these threats. In this white paper, learn more about SOAR and how it’s transforming threat intelligence.
Posted: 27 Apr 2020 | Published: 27 Apr 2020
Get This Now


Cortex XDR: Breaking the Security Silos for Detection and Response
sponsored by Palo Alto Networks
PRODUCT OVERVIEW:Although dealing with threats and vulnerabilities is stressful, managing the repetitive tasks associated with incident detection and response is arguably an equally frustrating responsibility. This white paper highlights the key capabilities of Cortex XDR, designed to alleviate this process by automating certain tasks. Read on to learn more.
Posted: 27 Apr 2020 | Published: 27 Apr 2020
Get This Now


Secure the Cloud-Enabled Mobile Workforce
sponsored by Palo Alto Networks
WHITE PAPER:As organizations continue to migrate their workloads and applications to the cloud, it becomes clear that traditional remote access tools like VPNs are unable to keep pace with both threats and operational requirements. Read on to uncover a modern architecture for the mobile workforce designed to support key cloud initiatives.
Posted: 27 Apr 2020 | Published: 27 Apr 2020
Get This Now


Securely Connect Remote Workforces During the COVID-19 Outbreak
sponsored by Palo Alto Networks
PRODUCT OVERVIEW:The recent surge in remote work trends has underlined the importance of adequate security preparations when it comes to protecting endpoints and users. This white paper overviews a few offerings from Palo Alto, and highlights the key features that position them to be helpful in supporting remote workers.
Posted: 27 Apr 2020 | Published: 27 Apr 2020
Get This Now


Secure Transformation: Replacing Remote Access VPN with Prisma Access
sponsored by Palo Alto Networks
WHITE PAPER:Remote access VPN has been an enterprise network staple for years; however, enterprises are rapidly adopting cloud applications that are changing the requirements for security and networking. In this white paper, learn about the limitations of VPNs and how Prisma Access can help provide secure access to all applications.
Posted: 24 Apr 2020 | Published: 24 Apr 2020
Get This Now


Buyer's Guide: Cybersecurity
sponsored by Palo Alto Networks
RESOURCE:Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. This Cybersecurity Buyer's Guide provides an approach for organizations to use when evaluating cybersecurity protection strategies.
Posted: 29 Nov 2017 | Published: 29 Nov 2017
Get This Now


Firewall Buyer's Guide
sponsored by Palo Alto Networks
WHITE PAPER:Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.
Posted: 28 Nov 2017 | Published: 28 Nov 2017
Get This Now


Buyers Guide: Network Security Management
sponsored by Palo Alto Networks
WHITE PAPER:When it comes to network security, organizations often repeat processes. In this buyers guide, access 10 features your network security management should include and the benefits of network security management. As an added bonus, quiz yourself to determine if it's time to move to network security management.
Posted: 28 Nov 2017 | Published: 28 Nov 2017
Get This Now


Comprehensive Data Security In The Cloud
sponsored by Palo Alto Networks
WHITE PAPER:In this white paper, learn about some common cloud and SaaS application threats, as well as the 3 step guide to protecting your data in this new environment.
Posted: 30 May 2017 | Published: 30 May 2017
Get This Now


Protect Yourself From Antivirus
sponsored by Palo Alto Networks
WHITE PAPER:Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016
Get This Now


Buyer's Guide to Cybersecurity Solutions
sponsored by Palo Alto Networks
WHITE PAPER:Risks are evolving, and so are solutions. Learn how to evaluate and select the best technology for your organization.
Posted: 10 Dec 2015 | Published: 10 Dec 2015
Get This Now

TOPICS:  IT Management

1 - 25 of 40 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info