Palo Alto Networks

Displaying 1-26 of 26 results

  • Videos // Feb 2015

    Moving Beyond Proxies

    Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy products, providing limited security functionality against today’s advanced threats. There was a time when proxies fulfilled a need traditional firewalls could not meet - visibility into web traffic starting with categorization of HTTP...

    Sponsored By Palo Alto Networks

  • White Papers // Dec 2014

    Next - Generation Security Platform for Manufacturing Companies

    This whitepaper is analysing the challenges in Security Control Systems in Manufacturing organisations such as deploying information technology in automation environments, and the use of virtualization, mobility and SaaS applications to increase productivity. It is also exploring the advantages of Palo Alto Networks Next-Generation Security Platform to address all these...

    Sponsored By Palo Alto Networks

  • White Papers // Dec 2014

    Next - Generation Security Platform for Critical Infrastructure

    SCADA and Industrial Control Systems (ICS), which are used to automate industrial processes in critical infrastructure industries such as utilities and transportation, have undergone dramatic transformations. What once was a collection of isolated, proprietary systems based on serial protocols are now highly interconnected systems which leverage the internet protocol and...

    Sponsored By Palo Alto Networks

  • White Papers // Dec 2014

    Stream Line Payment Card Industry (PCi) Compliance With Next-Gen Security

    Establishing, maintaining, and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for “… all entities involved in payment card processing—including merchants, processors, acquirers, issuers, and service providers, as well as all other entities that store, process or transmit cardholder data (CHD) and/or sensitive...

    Sponsored By Palo Alto Networks

  • White Papers // Oct 2014

    Firewall Buyers Guide 2014

    Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: • The fundamentals of modern firewall technology • The ten critical business requirements your next firewall needs to address • Information on how to create a vendor request for proposal...

    Sponsored By Palo Alto Networks

  • White Papers // Sep 2014

    Zero Trust Approach to Network Security

    Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. This paper discusses the need for a Zero Trust approach to network security, how the Palo Alto Networks® next-generation security platform delivers on these requirements, and provides guidance on...

    Sponsored By Palo Alto Networks

  • White Papers // Sep 2014

    Application Usage Threat Report 2014

    The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.

    Sponsored By Palo Alto Networks

  • White Papers // Jan 2014

    The 10 Things Your Next Firewall Must Do

    For enterprises looking at Next-Generation Firewall’s, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.

    Sponsored By Palo Alto Networks

  • eBooks // Jul 2014

    Cybersecurity for Dummies eBook

    APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before. Controlling these threats...

    Provided By Palo Alto Networks

  • White Papers // Jul 2014

    Application, Usage and Threat Report

    The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.

    Provided By Palo Alto Networks

  • White Papers // Jul 2014

    Getting Started With a Zero Trust Approach to Network Security

    Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. With Zero Trust there is no default trust for any entity—including users, devices, applications, and packets—regardless of what it is and its location on or relative to the corporate...

    Provided By Palo Alto Networks

  • eBooks // Jul 2014

    10 Things Your Next Firewall Must Do eBook

    Effectively stopping advanced threats requires a new approach to security. Find out the 10 must-haves for security products today. Download your booklet now! In this free booklet, you'll find insightful and practical advices on: The why and how of next-generation security 10 critical functions your network...

    Provided By Palo Alto Networks

  • eBooks // Jul 2014

    Cybersecurity for Dummies eBook

    APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before. Controlling these threats...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    10 Things Your Next Firewall Must Do

    For enterprises looking at Next-Generation Firewall’s, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    The 2014 Firewall Buyers Guide

    Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: The fundamentals of modern firewall technology The ten critical business requirements your next firewall needs to address Information on how to create a vendor request...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Still Using Proxies for URL Filtering? There's a Better Way.

    Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated packet filtering and...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Establishing a Logical Perimeter: The Evolution of Network Security

    An enterprise's most basic assets (employees, applications and data) are becoming increasingly flexible and independent from traditional notions of location and hardware. Unfortunately, the same is not true of enterprise security, which remains anchored to the physical perimeter of the enterprise. These shifts present a serious challenge for enterprise...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Establishing a Logical Perimeter - The Evolution of Network Security

    The boundaries of the modern enterprise have undergone massive changes, and these shifts are causing IT, security and networking teams to fundamentally revaluate the way they think about and manage the network. It is no secret that near-universal Internet connectivity has changed society and user behaviour along with it. Users...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Still Using Proxies for URL Filtering? There's a better way

    Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated packet filtering and...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Cybersecurity Imperatives: Reinvent your Network Security

    Cybersecurity has become a leading topic both within and beyond the corporate boardroom. What enterprises need to stop the escalation of cyberattacks is a network security approach that is designed from the outset to enable the safe use of the applications and technologies required to support a thriving business.

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Establishing a Logical Perimeter The Evolution of Network Security

    The boundaries of the modern enterprise have undergone massive changes, and these shifts are causing IT, security and networking teams to fundamentally reevaluate the way they think about and manage the network. It is no secret that near-universal Internet connectivity has changed society and user behavior along with it. Users...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Still Using Proxies for URL Filtering? There’s a Better Way

    Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated packet filtering and...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Firewall Buyers Guide

    Discusses the ten critical business requirements that your next firewall should address and how to create an RFP and functional test plan to assist in the vendor/solution selection process.

    Provided By Palo Alto Networks

  • White Papers // May 2012

    Proactive Insider Threat Detection Through Graph Learning and Psychological Context

    The annual incidence of insider attacks continues to grow, and there are indications this trend will continue. While there are a number of existing tools that can accurately identify known attacks, these are reactive (as opposed to proactive) in their enforcement, and may be eluded by previously unseen, adversarial behaviors....

    Provided By Palo Alto Networks

  • White Papers // Mar 2011

    Enhancing Cyber-Physical Security Through Data Patterns

    In this paper, the authors propose a data-driven approach for security management in a network that interacts or receives inputs from physical systems - including human behavior. Their goal is to leverage the unique features of cyberphysical systems. In particular they propose: (1) the use of historical data from physical...

    Provided By Palo Alto Networks

  • White Papers // Oct 2009

    Securing Network Content

    The goal of the current Internet is to provide content of interest (Web pages, voice, video, etc.) to the users that need it. Access to that content is achieved using a communication model designed in terms of connections between hosts. This conflation of what content that user wants to access...

    Provided By Palo Alto Networks

  • White Papers // Dec 2014

    Next - Generation Security Platform for Manufacturing Companies

    This whitepaper is analysing the challenges in Security Control Systems in Manufacturing organisations such as deploying information technology in automation environments, and the use of virtualization, mobility and SaaS applications to increase productivity. It is also exploring the advantages of Palo Alto Networks Next-Generation Security Platform to address all these...

    Sponsored By Palo Alto Networks

  • Videos // Feb 2015

    Moving Beyond Proxies

    Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy products, providing limited security functionality against today’s advanced threats. There was a time when proxies fulfilled a need traditional firewalls could not meet - visibility into web traffic starting with categorization of HTTP...

    Sponsored By Palo Alto Networks

  • White Papers // Jan 2014

    The 10 Things Your Next Firewall Must Do

    For enterprises looking at Next-Generation Firewall’s, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.

    Sponsored By Palo Alto Networks

  • White Papers // Sep 2014

    Zero Trust Approach to Network Security

    Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. This paper discusses the need for a Zero Trust approach to network security, how the Palo Alto Networks® next-generation security platform delivers on these requirements, and provides guidance on...

    Sponsored By Palo Alto Networks

  • White Papers // Oct 2014

    Firewall Buyers Guide 2014

    Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: • The fundamentals of modern firewall technology • The ten critical business requirements your next firewall needs to address • Information on how to create a vendor request for proposal...

    Sponsored By Palo Alto Networks

  • White Papers // Sep 2014

    Application Usage Threat Report 2014

    The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.

    Sponsored By Palo Alto Networks

  • White Papers // Dec 2014

    Next - Generation Security Platform for Critical Infrastructure

    SCADA and Industrial Control Systems (ICS), which are used to automate industrial processes in critical infrastructure industries such as utilities and transportation, have undergone dramatic transformations. What once was a collection of isolated, proprietary systems based on serial protocols are now highly interconnected systems which leverage the internet protocol and...

    Sponsored By Palo Alto Networks

  • White Papers // Dec 2014

    Stream Line Payment Card Industry (PCi) Compliance With Next-Gen Security

    Establishing, maintaining, and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for “… all entities involved in payment card processing—including merchants, processors, acquirers, issuers, and service providers, as well as all other entities that store, process or transmit cardholder data (CHD) and/or sensitive...

    Sponsored By Palo Alto Networks

  • White Papers // Mar 2011

    Enhancing Cyber-Physical Security Through Data Patterns

    In this paper, the authors propose a data-driven approach for security management in a network that interacts or receives inputs from physical systems - including human behavior. Their goal is to leverage the unique features of cyberphysical systems. In particular they propose: (1) the use of historical data from physical...

    Provided By Palo Alto Networks

  • White Papers // May 2012

    Proactive Insider Threat Detection Through Graph Learning and Psychological Context

    The annual incidence of insider attacks continues to grow, and there are indications this trend will continue. While there are a number of existing tools that can accurately identify known attacks, these are reactive (as opposed to proactive) in their enforcement, and may be eluded by previously unseen, adversarial behaviors....

    Provided By Palo Alto Networks

  • White Papers // Oct 2009

    Securing Network Content

    The goal of the current Internet is to provide content of interest (Web pages, voice, video, etc.) to the users that need it. Access to that content is achieved using a communication model designed in terms of connections between hosts. This conflation of what content that user wants to access...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Cybersecurity Imperatives: Reinvent your Network Security

    Cybersecurity has become a leading topic both within and beyond the corporate boardroom. What enterprises need to stop the escalation of cyberattacks is a network security approach that is designed from the outset to enable the safe use of the applications and technologies required to support a thriving business.

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    10 Things Your Next Firewall Must Do

    For enterprises looking at Next-Generation Firewall’s, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.

    Provided By Palo Alto Networks

  • eBooks // Jul 2014

    Cybersecurity for Dummies eBook

    APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before. Controlling these threats...

    Provided By Palo Alto Networks

  • White Papers // Jul 2014

    Application, Usage and Threat Report

    The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.

    Provided By Palo Alto Networks

  • White Papers // Jul 2014

    Getting Started With a Zero Trust Approach to Network Security

    Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. With Zero Trust there is no default trust for any entity—including users, devices, applications, and packets—regardless of what it is and its location on or relative to the corporate...

    Provided By Palo Alto Networks

  • eBooks // Jul 2014

    10 Things Your Next Firewall Must Do eBook

    Effectively stopping advanced threats requires a new approach to security. Find out the 10 must-haves for security products today. Download your booklet now! In this free booklet, you'll find insightful and practical advices on: The why and how of next-generation security 10 critical functions your network...

    Provided By Palo Alto Networks

  • eBooks // Jul 2014

    Cybersecurity for Dummies eBook

    APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before. Controlling these threats...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    The 2014 Firewall Buyers Guide

    Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: The fundamentals of modern firewall technology The ten critical business requirements your next firewall needs to address Information on how to create a vendor request...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Still Using Proxies for URL Filtering? There's a Better Way.

    Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated packet filtering and...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Establishing a Logical Perimeter: The Evolution of Network Security

    An enterprise's most basic assets (employees, applications and data) are becoming increasingly flexible and independent from traditional notions of location and hardware. Unfortunately, the same is not true of enterprise security, which remains anchored to the physical perimeter of the enterprise. These shifts present a serious challenge for enterprise...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Establishing a Logical Perimeter - The Evolution of Network Security

    The boundaries of the modern enterprise have undergone massive changes, and these shifts are causing IT, security and networking teams to fundamentally revaluate the way they think about and manage the network. It is no secret that near-universal Internet connectivity has changed society and user behaviour along with it. Users...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Still Using Proxies for URL Filtering? There's a better way

    Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated packet filtering and...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Establishing a Logical Perimeter The Evolution of Network Security

    The boundaries of the modern enterprise have undergone massive changes, and these shifts are causing IT, security and networking teams to fundamentally reevaluate the way they think about and manage the network. It is no secret that near-universal Internet connectivity has changed society and user behavior along with it. Users...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Still Using Proxies for URL Filtering? There’s a Better Way

    Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated packet filtering and...

    Provided By Palo Alto Networks

  • White Papers // Jan 2014

    Firewall Buyers Guide

    Discusses the ten critical business requirements that your next firewall should address and how to create an RFP and functional test plan to assist in the vendor/solution selection process.

    Provided By Palo Alto Networks