Palo Alto Networks

Displaying 1 - 10 of 36 results

  • Traps for Windows Server 2003

    White Papers // Jun 2016 // provided by Palo Alto Networks

    Advanced Endpoint Protection for Windows Server 2003 After End-of-Support Microsoft announced Windows Server 2003 End-of-Support (EOS) on July 14, 2015. Many businesses are forced by circumstance to leave these systems in service for some time. Retiring a major enterprise component has always been a challenge for IT departments. In ...

    Download Now
  • VM-Series for AWS Hybrid Cloud Deployment Guidelines

    White Papers // Jun 2016 // provided by Palo Alto Networks

    Hybrid deployments are one of the most common Amazon Web Services (AWS) scenarios as they extend your on-premises data center (physical, virtualized or both). This white paper provides guidelines and recommendations addressing common questions that arise during hybrid use case deployments, specifically using the Palo Alto Networks VM-Series virtualized next-generation ...

    Download Now
  • First Principles for Network Defenders:

    White Papers // Jun 2016 // provided by Palo Alto Networks

    A Unified Theory for Security Practitioners In this paper, we propose that the first principle for all network defenders is to prevent high-risk material impact to the organization. The three essential tasks that support the first principle are: threat prevention, threat detection, and threat eradication. These are the network ...

    Download Now
  • Secure Windows XP with Traps

    White Papers // Jun 2016 // provided by Palo Alto Networks

    Securing Windows XP with Traps Advanced Endpoint Protection Windows XP end-of-life is a critical threat exposure for XP users. Security was one of the major drivers for Microsoft’s decision to end support for this operating system. No doubt, the intention was to urge enterprises to upgrade their systems. In ...

    Download Now
  • Safely Enable Office 365

    White Papers // Jun 2016 // provided by Palo Alto Networks

    Securing Office 365 Is Easier Than You Think Concerns over data leaving the corporate network and opening the network to external threats through unknown collaborators has caused many organizations to take a "wait and see" approach to SaaS. However, now that SaaS services come with the application that many ...

    Download Now
  • Top 10 Zero-Day Exploits of 2015:

    White Papers // Jun 2016 // provided by Palo Alto Networks

    How to Prevent Security Breaches that Leverage Unknown Exploits This paper provides a list of the Top 10 Zero-Day Exploits of 2015 and offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns. It also provides additional details on three particularly effective zero-day exploits ...

    Download Now
  • Architecture Matters

    White Papers // Jun 2016 // provided by Palo Alto Networks

    Beyond Layered Security Approaches This white paper looks at how the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business and protecting it against a wide variety of attacks, how it enables unique and specific security scenarios, and how it supports a prevention-oriented approach

    Download Now
  • Securing Traditional and Cloud-Based Data Centers

    White Papers // Oct 2015 // provided by Palo Alto Networks

    As your organization evolves from traditional data centers to virtualized and cloud environments, your security architectures must evolve to support your changing set of requirements.Read this white paper, where we discuss the challenges of virtualized data centers and cloud computing environments, and how to address them with next-generation firewalls.

    Download Now
  • Application Usage and Threat Report - Palo Alto Networks

    White Papers // Oct 2015 // provided by Palo Alto Networks

    The AUTR provides visibility into the real-world threat and application landscape, helping security teams to understand how adversaries are attempting to attack organizations around the world and build proactive, actionable controls. Built by the Unit 42 threat research team, the report correlates data from more than 7,000 enterprise organizations, providing ...

    Download Now
  • Breaking the Cyber Attack Lifecycle - Reinventing Enterprise Operations and Defense

    White Papers // Oct 2015 // provided by Palo Alto Networks

    The attack lifecycle is the sequence of events a cyberattacker has to go through to successfully infiltrate a network and exfiltrate data from it. The good news is that blocking just one step in this sequence will protect an organization from having its network breached and data stolen. The Enterprise ...

    Find out more

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?