An Insider's Guide to SOAR Adoption
WEBCAST:
Often too busy handling manual processes, SecOps teams can struggle to manage complex logging at scale and respond to threats fast enough. Watch this webinar to get an insider’s guide to SOAR adoption and discover the 3 phases for becoming an automation leader.
Posted: 03 Jun 2023 | Premiered: Jun 3, 2023
|
|
Race Against Time
WEBCAST:
Picture this: A known vulnerability has been discovered in your network, but there is no known exploit code. You are now facing a race against time to remediate this emerging threat before it does considerable damage. Watch this webinar to see how a security expert assesses this troubling situation and remediates a zero-day exploit live in action.
Posted: 02 Jun 2023 | Premiered: Jun 2, 2023
|
|
A Leader’s Guide to Security Operations
WEBCAST:
As cyber threats become more sophisticated and frequent, security operations centers (SOCs) are under increasing pressure to detect, respond to, and mitigate security incidents. Introducing threat intelligence and automation can help improve productivity and get SOCs on the right track. Watch this webinar to learn more from experts in the field.
Posted: 01 Jun 2023 | Premiered: Jun 1, 2023
|
|
Automating SecOps
WEBCAST:
When fighting against a variety of threats, recent high-profile cyberattacks have proven human defense teams cannot always be relied upon to initiate a timely response and may need additional support. Watch this webinar to explore key considerations for beginning your automation journey and learn how to define your use cases.
Posted: 31 May 2023 | Premiered: May 31, 2023
|
|
Value of Cortex XSOAR
RESOURCE:
Discover the potential annual value of implementing Cortex XSOAR based on your organization's size and targeted areas for automation in this interactive infographic.
Posted: 25 May 2023 | Published: 25 May 2023
|
|
How Eight Organizations Transformed Their Security Operations with Cortex®
CASE STUDY:
No matter how big your security team is, it’s simply impossible for people to respond fast enough to stop an attack in progress. Discover the stories of 8 organizations who introduced automation into their security operations with Cortex.
Posted: 24 May 2023 | Published: 24 May 2023
|
|
Scale Your SOC with Cortex Xpanse and Cortex XSOAR Government
WHITE PAPER:
3 attack vectors pose risks to federal agencies due to a lack of visibility, risk assessments, and lateral movement detection: the cloud, connected supply chain vendors, and connected contractors. Discover how automating attack surface management can address these unique security challenges for government agencies in this e-book.
Posted: 23 May 2023 | Published: 23 May 2023
|
|
Scale Your SOC with Cortex
EBOOK:
As financial institutions adopt direct internet access to optimize the end-user experience, it becomes difficult to inventory and manage all of these connections centrally, and each untracked internet connection is a potential point of exposure. Download this e-book to learn how to scale your SOC and automate your attack surface management.
Posted: 20 May 2023 | Published: 20 May 2023
|
|
Scale Your SOC with Cortex Xpanse and Cortex XSOAR Healthcare
EBOOK:
Healthcare organizations are an attractive target for adversaries due to unencrypted medical IoT device traffic and a prevalence of healthcare devices running outdated and insecure operating systems. Discover how automating attack surface management can address these unique security challenges for healthcare organizations in this e-book.
Posted: 19 May 2023 | Published: 19 May 2023
|
|
Cloud Threat Report Navigating the Expanding Attack Surface
ANALYST REPORT:
As cloud technologies become more prevalent and integral to organizations, the security risk they present also rises. This Unit 42 Cloud Threat Report analyzes the status of common misalignments leading to increased risk, leveraging data from a range of sources to identify the most pressing threats facing organizations today. Read on to learn more.
Posted: 05 May 2023 | Published: 06 May 2023
|
|
THE STATE OF CLOUD-NATIVE SECURITY
ANALYST REPORT:
The cloud-native security landscape is constantly changing. To equip security teams with the resources they need, it’s necessary to understand the challenges they face, the solutions they use, and the effectiveness of solutions in helping them meet their responsibilities. Download this report for an overview of the state of cloud security.
Posted: 19 Apr 2023 | Published: 20 Apr 2023
|
|
XDR Myths ebook
WHITE PAPER:
In this white paper, security experts debunk 10 myths about XDR. Read now to unlock insights from professionals from ESG, Omdia Cyber, Palo Alto Networks and more.
Posted: 14 Apr 2023 | Published: 14 Apr 2023
|
|
Unit 42 Ransomware Threat report
RESEARCH CONTENT:
To accomplish their goals, many ransomware threat actors employ extortion techniques. So, along with augmenting their cyber defenses, today’s businesses must prepare their employees to face these aggressive tactics. Review this report to learn about major extortion techniques and trends.
Posted: 14 Apr 2023 | Published: 14 Apr 2023
|
|
SOC Transformation Infographic
INFOGRAPHIC:
Your business, like all businesses, may need some help facing an attack surface overflowing with threats. Palo Alto Network’s Cortex Platform is here to offer that support. Dig into this infographic to understand how the platform’s use of automation can take some pressure off of your security team and augment your defense strategy.
Posted: 14 Apr 2023 | Published: 14 Apr 2023
|
|
Zerotrust Infographic for the SOC
INFOGRAPHIC:
Along with great flexibility, the shift to hybrid work has brought businesses security challenges, driving IT leaders to reassess their trust decisions. The result? Many SOCs have adopted a zero-trust security posture. Download this infographic to discover the benefits of doing so.
Posted: 14 Apr 2023 | Published: 14 Apr 2023
|
|
Attack Surface Management
EBOOK:
With more cloud environments and digital assets in play than ever before, the enterprise attack surface has become increasingly complex and difficult to manage. This Attack Surface Management (ASM) for Dummies, e-book presents a coherent overview of ASM. Download now to unlock the extensive e-book and all the insights contained within it.
Posted: 07 Apr 2023 | Published: 08 Apr 2023
|
|
Now Tech: Security Orchestration, Automation, And Response (Soar), Q2 2022
ANALYST REPORT:
To choose the right security orchestration, automation and response (SOAR) tool for your organization, first, you must determine the functionality and value that you need the solution to deliver. Have you already done so? Then it’s time to explore the market and its many options. Check out this Forrester report to compare 31 SOAR providers.
Posted: 04 Apr 2023 | Published: 04 Apr 2023
|
|
Magic Quadrant for Endpoint Protection Platforms
ANALYST REPORT:
While all vendors in this Gartner report may have effective solutions for combating malicious attacks, the ability to integrate with security operations is what sets top-performing vendors apart. Discover which offerings fit the bill by reading your copy now.
Posted: 27 Mar 2023 | Published: 28 Mar 2023
|
|
Protecting Applications, Data, and Users with Next-Generation CASB
ESG:
With hundreds of SaaS applications, each with a unique mix of settings, it can be difficult for IT and security teams to ensure resources are properly configured, protected, and compliant. Download this ESG white paper to explore today’s changing IT environments in detail and unlock key attributes for next-generation CASBs.
Posted: 24 Mar 2023 | Published: 25 Mar 2023
|
|
Value Drivers for an Attack Surface Management (ASM) Program
ANALYST REPORT:
Today’s organizations possess Internet-facing attack surfaces, filled with thousands of assets. Due to this growth in complexity, traditional attack surface management platforms (ASMs) are no longer sufficient. In this white paper, ESG analyze the demands of a modern-day attack surface and what is needed in an ASM offering. Read on to learn more.
Posted: 24 Mar 2023 | Published: 24 Mar 2023
|
|
A CISO’s Guide to Attack Surface Management
WHITE PAPER:
To protect your attack surface, a modern ASM must work at the speed and scale of the internet to continuously discover, identify, and mitigate all risks. Learn which features to look for in a new ASM, and how to put into place, in this white paper.
Posted: 23 Mar 2023 | Published: 23 Mar 2023
|
|
Market Guide for Security Orchestration, Automation and Response Solutions
ANALYST REPORT:
Security orchestration, automation and response solutions are garnering interest from large organizations as a pure-play technology to improve productivity and efficiency, but its benefits are much more far-reaching. Download this Gartner report for a market guide to SOAR solutions and what they bring to the table.
Posted: 21 Mar 2023 | Published: 21 Mar 2023
|
|
Cortex: Proactive Security Operations from End-to- End
DATA SHEET:
View in this datasheet, Cortex Xpanse, an end-to-end solution that provides an inventory of an organization’s global, internet-facing cloud assets and exposures to continuously discover, evaluate, and mitigate attacks.
Posted: 03 Mar 2023 | Published: 03 Mar 2023
|
|
Palo Alto Networks 2Nd Special Edition
EBOOK:
Most network and network security products on the market today weren’t designed to handle today’s security concerns. To address these challenges, Gartner came up with secure access service edge (SASE). Read this e-boo for an in-depth look at SASE and learn how you can secure your organization against today’s threats.
Posted: 23 Nov 2022 | Published: 24 Nov 2022
|
|
Raising The Bar For Web Application And Api Security
PRODUCT OVERVIEW:
As web applications and APIs continue to evolve, businesses are challenged to ensure security in the face of changing coverage needs. To help organizations overcome this, Palo Alto Networks developed Web Application and Security (WAAS) for its Prisma Cloud platform. Dig into this product overview to learn more.
Posted: 23 Nov 2022 | Published: 23 Nov 2022
|