Palo Alto Networks

Displaying 1 - 10 of 61 results

  • Comprehensive Data Security In The Cloud (DLP WP)

    White Papers // Dec 2017 // provided by Palo Alto Networks

    Data and applications reside everywhere, on the network, endpoints, and in the constantly evolving cloud ecosystem. As a result, organizations are now faced with securing a multitude of applications, users, devices and infrastructures – all hosting sensitive data that is critical to business operations, reputation, longevity, and success. However, once ...

    Download Now
  • Data Breaches: Is Prevention Practical? (SANS Report)

    White Papers // Dec 2017 // provided by Palo Alto Networks

    SANS conducted this survey to explore how organizations are handling prevention. Breaking down possible preventive measures into four major categories or domains (business, architectural design and development, operational, and technology), the survey sought to answer three major questions: 1. What measures have respondents implemented that they believe will prevent breaches? ...

    Download Now
  • PwC: A Security Framework for Business Leaders

    White Papers // Dec 2017 // provided by Palo Alto Networks

    While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue. The goal of this document is to address this gap by providing corporate leaders ...

    Download Now
  • Choose the Right Platform for Securing SaaS

    White Papers // Nov 2017 // provided by Palo Alto Networks

    A new survey commissioned by Palo Alto Networks and conducted by Enterprise Strategy Group explores why enterprise IT leaders are embracing CASB products, where they are using them, and what capabilities are most important to them. One of the most critical needs is securing the use of SaaS applications. Here’s ...

    Download Now
  • 5 Mistakes to Avoid When Evaluating a NGFW

    White Papers // Nov 2017 // provided by Palo Alto Networks

    The firewall is the foundation of enterprise data security. All firewalls are not created equal, though and no two organizations have the same needs, risks and data flow. You need a firewall to protect against today’s advanced attacks while preserving the performance and uptime critical to foster innovation and growth. ...

    Download Now
  • Understand the Role of Stolen Credentials in Data Breaches

    White Papers // Nov 2017 // provided by Palo Alto Networks

    Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of ...

    Download Now
  • Firewall Buyer's Guide

    White Papers // Nov 2017 // provided by Palo Alto Networks

    Even with more advanced features and supposed higher throughput than ever before, firewalls are not able to keep up with modern demands or advanced threats. Users are more distrusted than ever, and so is data. Threats are changing rapidly, and traditional defense mechanisms that rely on layered security do not ...

    Download Now
  • Buyer's Guide: Network Security Management

    White Papers // Nov 2017 // provided by Palo Alto Networks

    Today’s security deployments need to focus on streamlined management, improved visibility into the most critical threats, and reduced response times. The right network security management solution provides all of these components. Companies can gain much from the deployment of good network security management. The benefits range from time ...

    Download Now
  • App-ID: A foundation for visibility and control in the Palo Alto Networks Security Platform

    Webcasts // Nov 2017 // provided by Palo Alto Networks

    App-ID uses multiple identification techniques to determine the exact identity of applications traversing your network - irrespective of port, protocol, evasive tactic, or encryption. Identifying the application is the very first task performed by App-ID, providing you with the knowledge and flexibility needed to safely enable applications and secure your ...

    Watch Now
  • Safely Enable Office 365

    White Papers // Nov 2017 // provided by Palo Alto Networks

    Securing Office 365 Is Easier Than You Think Concerns over data leaving the corporate network and opening the network to external threats through unknown collaborators has caused many organizations to take a "wait and see" approach to SaaS. However, now that SaaS services come with the application that ...

    Find Out More