All resources sponsored by:

Palo Alto Networks

101 - 125 of 144 Matches
Cloud Security in a Distributed World
sponsored by Palo Alto Networks
VIDEO:As organizations continue to opt for cloud, multi-cloud and hybrid cloud environments, it’s critical to keep in mind the impact this has on the cyberthreat landscape. In this webinar, discover a comprehensive look at cloud security in today’s distributed world – watch now to get started.
Posted: 12 Mar 2021 | Premiered: 12 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Data Center & Hybrid Cloud Security for Dummies
sponsored by Palo Alto Networks
EBOOK:Data Center & Hybrid Cloud Security For Dummies helps you rethink your approach to security to better protect your data and workload in the on-premises data center and across multi-cloud environments. Download the 83-page chapter book today.
Posted: 12 Mar 2021 | Published: 12 Mar 2021
Get This Now

TOPICS:  Security

Better Together: Prisma Access And Cloudgenix SD-WAN
sponsored by Palo Alto Networks
DATA SHEET:In this brief, learn how CloudGenix SD-WAN and Prisma Access have joined together to deliver hybrid applications to branch offices over any network while providing consistent, cloud-delivered security.
Posted: 11 Mar 2021 | Published: 11 Mar 2021
Get This Now


Why Seconds Matter
sponsored by Palo Alto Networks
WHITE PAPER:As cyberattacks grow, security programs need to evolve to meet each new threat. Inline machine learning has emerged as one of the most effective ways of stopping new threats without sacrificing resources, time and people – read this whitepaper to learn more.
Posted: 11 Mar 2021 | Published: 11 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Secure Transformation: Replacing Remote Access VPN With Prisma Access
sponsored by Palo Alto Networks
WHITE PAPER:Today’s workforces are largely remote– and organizations that don’t enable a 100% remote workforce likely embrace a hybrid model. So, given the state of today’s workforces, are VPNs still relevant? Read this whitepaper to learn more about the limitations of VPNs and discover how to future proof your remote access security strategy.
Posted: 08 Mar 2021 | Published: 08 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Why Native Security Controls in Public Clouds Are Not Enough
sponsored by Palo Alto Networks
EBOOK:The security and compliance challenges that accompany a cloud migration are deal-breakers for some organizations – understanding and addressing these concerns is the key to a confident, and secure, migration. Read this e-book to unlock exclusive insight from the cloud security experts at Palo Alto and AWS.
Posted: 08 Mar 2021 | Published: 08 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Endpoint Prevention and Response: Comparative Report
sponsored by Palo Alto Networks
ANALYST REPORT:Businesses are using endpoint prevention and response (EPR) to detect, prevent, analyze and respond to targeted attacks such as advanced persistent threats (ATPs). In this AV Comparatives report, study a comparison of 9 different EPR platforms and examine whether they took an active or passive response to threats.
Posted: 22 Jan 2021 | Published: 17 Dec 2020
Get This Now


Stay Ahead of New Ransomware Threats: Protect against data exfiltration and extortion
sponsored by Palo Alto Networks
WHITE PAPER:Recent data shows that threats are developing in two key areas: data exfiltration and extortion. Bad actors are using ransomware as a means to these ends. Organizations must be aptly prepared by knowing what these processes look like. View this white paper to get an in-depth look at an exfiltration-focused attack as well as the extortion phase.
Posted: 22 Jan 2021 | Published: 16 Dec 2020
Get This Now


2020 State of SOAR Report
sponsored by Palo Alto Networks
WHITE PAPER:Get your copy of the State of SOAR Report 2020 and see how your security team can leverage SOAR to improve, automate and securely enable your SOC.
Posted: 05 Jan 2021 | Published: 05 Jan 2021
Get This Now


Whitepaper: How SOAR is Transforming Threat Intelligence Management (G)
sponsored by Palo Alto Networks
RESEARCH CONTENT:SOAR is gaining traction as a way to improve security operations. Security and risk management leaders should evaluate how these tools can support and optimize their broader security operations capabilities. Read this Gartner Marketing Guide to learn more about sifting through the noise and choosing the best-fit SOAR tool for your needs.
Posted: 31 Dec 2020 | Published: 21 Sep 2020
Get This Now

TOPICS:  Security

Cloud Threat Report 2H 2020
sponsored by Palo Alto Networks
RESEARCH CONTENT:In the Unit 42 Cloud Threat Report, 2H 2020, Unit 42 researchers detail how one common access misconfiguration allowed the team to compromise an entire cloud environment and bypass a full set of security controls.
Posted: 09 Dec 2020 | Published: 09 Dec 2020
Get This Now

TOPICS:  Security

The 2020 State Of Security Operations
sponsored by Palo Alto Networks
WHITE PAPER:A successful data breach can have devastating impacts – from loss of data to loss of customer trust and potential litigation. This Forrester report aims to identify and understand the challenges facing security operations (SecOps) teams as they work to manage the growing threat of sophisticated data breaches.
Posted: 01 Sep 2020 | Published: 30 Apr 2020
Get This Now


XDR: Extended Detection and Response
sponsored by Palo Alto Networks
WHITE PAPER:Extended detection & response (XDR) has emerged in the wake of a need to detect, investigate and respond to threats across all threat vectors in a company’s infrastructure (network, endpoint and cloud) rather than just one. Dive into this white paper to learn about XDR and how it uses integration and orchestration as defense.
Posted: 31 Aug 2020 | Published: 31 Aug 2020
Get This Now


The Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation
sponsored by Palo Alto Networks
ANALYST REPORT:Endpoint detection and response (EDR) is quickly becoming a ubiquitous security technology in the age of remote work. As such, it is critical for security professionals to be aware of the vendors in the space. Tap into the Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation to help you pick the right tool for your organization.
Posted: 28 Aug 2020 | Published: 28 Aug 2020
Get This Now


Security Orchestration For Dummies
sponsored by Palo Alto Networks
EBOOK:Security orchestration is a new term to the market, but it could simplify the lives of security professionals. It refers to the integration of security tools, unifying intelligence and automating tasks, resulting is a more effective security operations center that better detects and responds to threats. Dive into this e-book for a detailed guide.
Posted: 28 Aug 2020 | Published: 28 Aug 2020
Get This Now


The State of Cloud Native Security
sponsored by Palo Alto Networks
ANALYST REPORT:As more and more applications are migrated into the cloud, and organizations focus less on their own on-premises hardware, countless cloud and app security questions have arisen. This State of Cloud Native Security Report delves into the current market landscape for cloud and cloud-native security.
Posted: 16 Jul 2020 | Published: 16 Jul 2020
Get This Now


Top Security Orchestration Use Cases
sponsored by Palo Alto Networks
WHITE PAPER:In this e-book, take a look at some use cases where security orchestration’s capabilities can help simplify, automate, and improve efficiencies of incident response and security operations.
Posted: 26 Jun 2020 | Published: 26 Jun 2020
Get This Now


2020 Unit 42 IoT Threat Report
sponsored by Palo Alto Networks
RESEARCH CONTENT:To assess the current state of the IoT threat landscape, Palo Alto Network's Unit 42 threat intelligence and IoT security experts analyzed security incidents throughout 2018 and 2019 across 1.2 million IoT devices in the U.S. Read the report for steps you can take to develop an effective IoT strategy that prepares your business for the long term.
Posted: 17 Jun 2020 | Published: 17 Jun 2020
Get This Now


The Continuum of Cloud Native Topologies
sponsored by Palo Alto Networks
WHITE PAPER:This guide breaks down the cloud native continuum, evaluating the different technologies that the continuum is composed of (such as VMs, containers, and serverless) while providing guidance on how to choose between them.
Posted: 12 Jun 2020 | Published: 12 Jun 2020
Get This Now

TOPICS:  Cloud Computing

The Business Case for Cloud Threat Defense
sponsored by Palo Alto Networks
WHITE PAPER:In order to protect the growing security and compliance requirements needed to protect cloud data and applications, organizations are implementing cloud threat defenses. Download this white paper to get a better understanding of the benefits, costs, issues and risks associated with implementing cloud threat defenses.
Posted: 09 Jun 2020 | Published: 09 Jun 2020
Get This Now


Container Security 101: Understanding the Basics of Securing Containers
sponsored by Palo Alto Networks
WHITE PAPER:Container environments bring a range of cybersecurity issues involving images, containers, hosts, runtimes, registries, and orchestration platforms, which all need to be secured. Not sure where to begin? Download Container Security 101: Understanding the Basics of Securing Containers for everything you need to know.
Posted: 08 Jun 2020 | Published: 08 Jun 2020
Get This Now


How SOAR Is Transforming Threat Intelligence
sponsored by Palo Alto Networks
WHITE PAPER:Businesses are using endpoint prevention and response (EPR) to detect, prevent, analyze and respond to targeted attacks such as advanced persistent threats (APTs). In this AV Comparatives report, study a comparison of 9 different EPR platforms and examine whether they took an active or passive response to threats.
Posted: 27 Apr 2020 | Published: 27 Apr 2020
Get This Now


Why Native Security Controls in Public Clouds Are Not Enough
sponsored by Palo Alto Networks
WHITE PAPER:According to Gartner, cloud security should not be viewed as “Is the cloud secure?” but instead as “Am I using the cloud securely?” This e-book highlights key objectives and best practices for ensuring your organization is using public cloud environments securely. Read on to get started.
Posted: 27 Apr 2020 | Published: 27 Apr 2020
Get This Now


Buyer's Guide: Cybersecurity
sponsored by Palo Alto Networks
RESOURCE:Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. This Cybersecurity Buyer's Guide provides an approach for organizations to use when evaluating cybersecurity protection strategies.
Posted: 29 Nov 2017 | Published: 29 Nov 2017
Get This Now


Firewall Buyer's Guide
sponsored by Palo Alto Networks
WHITE PAPER:Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.
Posted: 28 Nov 2017 | Published: 28 Nov 2017
Get This Now


101 - 125 of 144 Matches
Page: 1 2 3 4 6 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences