Cloud Security 101: Best Practices & Self-Assessment
EGUIDE:
In this eguide, review best security practices in the age of cloud, and read through two cloud security quizzes from industry experts.
Posted: 13 Apr 2021 | Published: 16 Mar 2021
|
|
CASB, CSPM, CWPP Emerge as Future of Cloud Security
EGUIDE:
In this eguide, learn about the emergence and the future of Cloud security tools that will help bring successful and securely protected cloud environments.
Posted: 13 Apr 2021 | Published: 16 Mar 2021
|
|
Multi-Cloud: A Blessing or Curse? What Security Teams Need to Keep in Mind
EGUIDE:
In this eguide, read through a glossary of terms related to multi-cloud security, discover the risks of single vs multi-cloud security, and gain insight into different multi-cloud security strategies.
Posted: 13 Apr 2021 | Published: 16 Mar 2021
|
|
Cloud Workload Security, Q1 2022
ANALYST REPORT:
The cloud workload security (CWS) market has been undergoing considerable consolidation – according to Forrester, organizations increasingly prefer suite providers over disparate tools. Access this Forrester Wave report for a comprehensive evaluation of 12 CWS market leaders.
Posted: 22 Apr 2022 | Published: 12 Apr 2022
|
|
Buyer's Guide: Cybersecurity
RESOURCE:
Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. This Cybersecurity Buyer's Guide provides an approach for organizations to use when evaluating cybersecurity protection strategies.
Posted: 29 Nov 2017 | Published: 29 Nov 2017
|
|
Firewall Buyer's Guide
WHITE PAPER:
Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.
Posted: 28 Nov 2017 | Published: 28 Nov 2017
|
|
Buyers Guide: Network Security Management
WHITE PAPER:
When it comes to network security, organizations often repeat processes. In this buyers guide, access 10 features your network security management should include and the benefits of network security management. As an added bonus, quiz yourself to determine if it's time to move to network security management.
Posted: 28 Nov 2017 | Published: 28 Nov 2017
|
|
Comprehensive Data Security In The Cloud
WHITE PAPER:
In this white paper, learn about some common cloud and SaaS application threats, as well as the 3 step guide to protecting your data in this new environment.
Posted: 30 May 2017 | Published: 30 May 2017
|
|
Protect Yourself From Antivirus
WHITE PAPER:
Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016
|
|
Buyer's Guide to Cybersecurity Solutions
WHITE PAPER:
Risks are evolving, and so are solutions. Learn how to evaluate and select the best technology for your organization.
Posted: 10 Dec 2015 | Published: 10 Dec 2015
|
|
Application Usage and Threat Report
WHITE PAPER:
Find out the biggest threats, as well as the most important tactics to defend your organization, in this annual report.
Posted: 10 Dec 2015 | Published: 10 Dec 2015
|
|
Breaking the Cyber Attack Lifecycle
WHITE PAPER:
This white paper discusses the modern landscape of cybersecurity, and how enterprises can detect and prevent attacks at every stage of the attack lifecycle, and remain agile in the face of advanced attacks.
Posted: 10 Dec 2015 | Published: 31 Mar 2015
|
|
Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention
WHITE PAPER:
Join this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.
Posted: 16 Jun 2014 | Published: 10 Jul 2014
|
|
Modern network security for modern threats
WHITE PAPER:
This exclusive paper discusses the current state of network security and examines a set of flexible solutions that account for changes to applications, threats, and users, providing air-tight security.
Posted: 14 Mar 2014 | Published: 14 Mar 2014
|
|
Taming the Integration Nightmares of a 1,000 App Enterprise
WHITE PAPER:
Access this informative white paper today, which highlights an innovative integration approach that will enable you to significantly boost business agility and cost control.
Posted: 26 Dec 2013 | Published: 28 Jan 2014
|
|
Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks
WHITE PAPER:
In this valuable resource, discover a security platform designed to keep up with today's ever-evolving threat landscape, which offers optimum network security without lowering network performance or reducing business productivity.
Posted: 26 Dec 2013 | Published: 31 Aug 2013
|
|
Palo Alto Networks in the Data Center: Eliminating Compromise
WHITE PAPER:
This resource explores best practices for data center network security. Learn how to protect your business without compromising flexibility and application availability.
Posted: 20 Apr 2012 | Published: 20 Apr 2012
|
|
A Pragmatic Approach to Network Security for Virtualized Computing Environments
WHITE PAPER:
Organizations often struggle when it comes to virtualization technologies, especially in providing adequate network security for modern computing environments. In this paper, explore the common challenges organizations face today and uncover a framework and best practices that organizations can use to address them.
Posted: 16 Apr 2012 | Published: 16 Apr 2012
|
|
The Application Usage and Risk Report
WHITE PAPER:
This Application Usage and Risk Report from Palo Alto Networks provides a global review of enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide. View now to uncover key findings so that you can build effective strategies to mitigate the risks inherent in certain application.
Posted: 16 Apr 2012 | Published: 01 Dec 2011
|
|
Solution Note: Enabling the Secure Use of Facebook
WHITE PAPER:
With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner.
Posted: 13 Apr 2012 | Published: 13 Apr 2012
|
|
Protecting your Network and Data Center with Next-Gen Firewalls
EGUIDE:
Learn how your organization can take advantage of next-generation firewalls. This resource provides clarity on this popular security solution so you can determine which features are right for your needs.
Posted: 13 Apr 2012 | Published: 13 Apr 2012
|
|
Next-generation firewalls are mainstream: What to expect
EGUIDE:
Today, as enterprises increasingly implement next-generation firewalls, there are a number of kinks that must be addressed. In this e-guide, explore the ins and outs of next-generation firewalls including the potential implementation headaches and how to overcome them.
Posted: 19 Mar 2012 | Published: 15 Mar 2012
|
|
The Application Usage and Risk Report
WHITE PAPER:
The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.
Posted: 30 Jun 2010 | Published: 30 Jun 2010
|
|
To Block or Not. Is that the Question?
WHITE PAPER:
This White Paper is a practical guide to how to properly deal with Enterprise 2.0 applications (and what they are to begin with), from getting visibility to how to create and enforce policies that allow for safe enablement.
Posted: 05 Jan 2010 | Published: 01 Dec 2009
|