Executive Overview: The Next Evolution in Cloud Security

The current landscape of networking and security overlay products are creating administrative problems with cost and complexity, and falling short on the protections that organizations need. Learn about how Palo Alto Networks is changing the game with GlobalProtect Cloud Service and Aperture.

11 Things to Focus on to be PCI Compliant in AWS

This ebook will explore some practical tips and guidance that we’ve collected from our security and compliance experts who have built and managed PCI-compliant environments in AWS.

Date

Displaying 1 to 10 of 90

Press Release

More than half of Australian Enterprises Have Misplaced Confidence in their Cloud Service Providers’ Security

SYDNEY, Australia – Oct. 24, 2019 – Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today released a report that uncovers the truth about the state of cloud security among large enterprises across Asia-Pacific including Australia, with many cases where perception doesn’t match the reality when it comes to securing the cloud.

11
Article

Corporate Backgrounder

As the next-generation security company, we are committed to maintaining trust in our digital age.

190
White Paper

Maximize the ROI of Detection and Response

Download this white paper to learn how to maximize the ROI and cut the cost of detection and response.

13
White Paper

Simplify Zero Trust Implementation Using A Five-Step Methodology

Building Zero Trust networks is actually simpler than building legacy networks. This 5-step methodology makes deploying Zero Trust networks manageable, cost effective and non-disruptive.

11
Datasheet

Executive summary: A more secure everywhere

The journey to the cloud is not a linear one, and organizations choose to migrate to the cloud in a multitude of ways and approaches. The resulting complexity is the enemy of security. In fact, according to ESG, “36% of organizations use between 24 to 49 different security products while 19% use more than 50 different products from an assortment of vendors.” All this noise only makes way for more security concerns such as integration issues, misconfigurations, and access control. To overcome this complexity and succeed in the cloud, organizations must demand security solutions that can quickly and effectively scale with changing business needs. Prisma by Palo Alto Networks is the industry’s most complete cloud security offering for today and tomorrow, providing unprecedented visibility into data, assets, and risks across the cloud and delivered with radical simplicity.

25
White Paper

11 Things to Focus on to be PCI Compliant in AWS

This ebook will explore some practical tips and guidance that we’ve collected from our security and compliance experts who have built and managed PCI-compliant environments in AWS.

45
White Paper

How to Pick a Winner in EDR

The endpoint security marketplace is crowded with vendors claiming to have superior capabilities. Cutting through all the marketing and sales pitches to understand how these products perform isn’t easy. Luckily, The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading endpoint detection and response (EDR) products against real-world attack sequences. We’ll break down MITRE’s methodology, the results, and what it all means for your organization as you assess your current and future endpoint security toolkit.

49
White Paper

Prisma: Secure DevOps

DevOps driven software development approaches are pervasive among organizations embracing cloud. Unlike traditional software development approaches, DevOps helps organizations shorten the time to build and ship cloud applications. Introducing security early into the software development lifecycle along with continuous monitoring in production environments improves the overall security posture of cloud applications reduces business risk.

35
White Paper

Prisma Cloud Threat Protection

The dynamic nature of public cloud environments requires security operations teams to adapt and embrace a new approach to securing the cloud. Threat assessment and mitigation are significantly impacted due to ephemeral cloud environments, decentralized management models, and distributed data across multi-cloud deployments. Threat prevention for the cloud needs to be built around the principles of attack surface reduction through segmentation and prevention controls, advanced threat detection measures built around user, network and host activity monitoring and behavioral baselines, and rapid response through automated remediation.

41
White Paper

13 Things Your Next Firewall Must Do

This paper outlines the 10 key things your next firewall must do to secure your network and your business.

66

Displaying 1 to 10 of 90