id="info"

Palo Alto Networks

Displaying 1 - 10 of 36 results

  • Traps for Windows Server 2003

    White Papers // Jun 2016 // provided by Palo Alto Networks

    Advanced Endpoint Protection for Windows Server 2003 After End-of-Support Microsoft announced Windows Server 2003 End-of-Support (EOS) on July 14, 2015. Many businesses are forced by circumstance to leave these systems in service for some time. Retiring a major enterprise component has always been a challenge for IT departments. In ...

    Read more
  • Secure Windows XP with Traps

    White Papers // Jun 2016 // provided by Palo Alto Networks

    Securing Windows XP with Traps Advanced Endpoint Protection Windows XP end-of-life is a critical threat exposure for XP users. Security was one of the major drivers for Microsoft’s decision to end support for this operating system. No doubt, the intention was to urge enterprises to upgrade their systems. In ...

    Find out more
  • Safely Enable Office 365

    White Papers // Jun 2016 // provided by Palo Alto Networks

    Securing Office 365 Is Easier Than You Think Concerns over data leaving the corporate network and opening the network to external threats through unknown collaborators has caused many organizations to take a "wait and see" approach to SaaS. However, now that SaaS services come with the application that many ...

    Find out more
  • Top 10 Zero-Day Exploits of 2015:

    White Papers // Jun 2016 // provided by Palo Alto Networks

    How to Prevent Security Breaches that Leverage Unknown Exploits This paper provides a list of the Top 10 Zero-Day Exploits of 2015 and offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns. It also provides additional details on three particularly effective zero-day exploits ...

    Read more
  • VM-Series for AWS Hybrid Cloud Deployment Guidelines

    White Papers // Jun 2016 // provided by Palo Alto Networks

    Hybrid deployments are one of the most common Amazon Web Services (AWS) scenarios as they extend your on-premises data center (physical, virtualized or both). This white paper provides guidelines and recommendations addressing common questions that arise during hybrid use case deployments, specifically using the Palo Alto Networks VM-Series virtualized next-generation ...

    Read more
  • First Principles for Network Defenders:

    White Papers // Jun 2016 // provided by Palo Alto Networks

    A Unified Theory for Security Practitioners In this paper, we propose that the first principle for all network defenders is to prevent high-risk material impact to the organization. The three essential tasks that support the first principle are: threat prevention, threat detection, and threat eradication. These are the network ...

    Read more
  • Architecture Matters

    White Papers // Jun 2016 // provided by Palo Alto Networks

    Beyond Layered Security Approaches This white paper looks at how the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business and protecting it against a wide variety of attacks, how it enables unique and specific security scenarios, and how it supports a prevention-oriented approach

    Learn more
  • Breaking the Cyber Attack Lifecycle - Reinventing Enterprise Operations and Defense

    White Papers // Oct 2015 // provided by Palo Alto Networks

    The attack lifecycle is the sequence of events a cyberattacker has to go through to successfully infiltrate a network and exfiltrate data from it. The good news is that blocking just one step in this sequence will protect an organization from having its network breached and data stolen. The Enterprise ...

    Find out more
  • Securing Traditional and Cloud-Based Data Centers

    White Papers // Oct 2015 // provided by Palo Alto Networks

    As your organization evolves from traditional data centers to virtualized and cloud environments, your security architectures must evolve to support your changing set of requirements.Read this white paper, where we discuss the challenges of virtualized data centers and cloud computing environments, and how to address them with next-generation firewalls.

    Download Now
  • Buyers Guide: Cybersecurity - The Definitive Guide for Evaluating Cybersecurity Solutions

    Research // Oct 2015 // provided by Palo Alto Networks

    In this comprehensive guide, you'll get recommended criteria for choosing a cybersecurity solution that can block cyberattacks and protect allowed traffic from threats, and learn how to effectively evaluate cybersecurity solutions through the Request for Proposal (RFP) process.

    Download Now