Palo Alto Networks

Displaying 1 - 10 of 38 results

  • Firewall Buyer's Guide: The Definitive Guide for Evaluating Enterprise Network Firewalls.

    White Papers // Sep 2016 // provided by Palo Alto Networks

    Even with more advanced features and supposed higher throughput than ever before, firewalls are not able to keep up with modern demands or advanced threats. Users are more distributed than ever, and so is data. Threats are changing rapidly, and traditional defense mechanisms that rely on layered security do not ...

    Learn more
  • Magic Quadrant for Enterprise Network Firewalls

    White Papers // Sep 2016 // provided by Palo Alto Networks

    "Next generation" capability has been achieved by the products in the network firewall market, and vendors differentiate on feature strengths. Buyers must consider the trade-offs between best-of-breed function and costs.

    Read more
  • Architecture Matters

    White Papers // Jun 2016 // provided by Palo Alto Networks

    Beyond Layered Security Approaches This white paper looks at how the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business and protecting it against a wide variety of attacks, how it enables unique and specific security scenarios, and how it supports a prevention-oriented approach

    Learn more
  • Safely Enable Office 365

    White Papers // Jun 2016 // provided by Palo Alto Networks

    Securing Office 365 Is Easier Than You Think Concerns over data leaving the corporate network and opening the network to external threats through unknown collaborators has caused many organizations to take a "wait and see" approach to SaaS. However, now that SaaS services come with the application that ...

    Find out more
  • Traps for Windows Server 2003

    White Papers // Jun 2016 // provided by Palo Alto Networks

    Advanced Endpoint Protection for Windows Server 2003 After End-of-Support Microsoft announced Windows Server 2003 End-of-Support (EOS) on July 14, 2015. Many businesses are forced by circumstance to leave these systems in service for some time. Retiring a major enterprise component has always been a challenge for IT departments. In ...

    Read more
  • Secure Windows XP with Traps

    White Papers // Jun 2016 // provided by Palo Alto Networks

    Securing Windows XP with Traps Advanced Endpoint Protection Windows XP end-of-life is a critical threat exposure for XP users. Security was one of the major drivers for Microsoft’s decision to end support for this operating system. No doubt, the intention was to urge enterprises to upgrade their systems. In ...

    Find out more
  • Top 10 Zero-Day Exploits of 2015:

    White Papers // Jun 2016 // provided by Palo Alto Networks

    How to Prevent Security Breaches that Leverage Unknown Exploits This paper provides a list of the Top 10 Zero-Day Exploits of 2015 and offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns. It also provides additional details on three particularly effective zero-day exploits ...

    Read more
  • First Principles for Network Defenders:

    White Papers // Jun 2016 // provided by Palo Alto Networks

    A Unified Theory for Security Practitioners In this paper, we propose that the first principle for all network defenders is to prevent high-risk material impact to the organization. The three essential tasks that support the first principle are: threat prevention, threat detection, and threat eradication. These are the network ...

    Read more
  • VM-Series for AWS Hybrid Cloud Deployment Guidelines

    White Papers // Jun 2016 // provided by Palo Alto Networks

    Hybrid deployments are one of the most common Amazon Web Services (AWS) scenarios as they extend your on-premises data center (physical, virtualized or both). This white paper provides guidelines and recommendations addressing common questions that arise during hybrid use case deployments, specifically using the Palo Alto Networks VM-Series virtualized next-generation ...

    Read more
  • Application Usage and Threat Report - Palo Alto Networks

    White Papers // Oct 2015 // provided by Palo Alto Networks

    The AUTR provides visibility into the real-world threat and application landscape, helping security teams to understand how adversaries are attempting to attack organizations around the world and build proactive, actionable controls. Built by the Unit 42 threat research team, the report correlates data from more than 7,000 enterprise organizations, providing ...

    Download Now