VM-Series Specsheet

The VM-Series has been optimized and expanded to deliver industry-leading performance of up to 16Gbps of App-ID-enabled firewall throughput across five models.

How to Secure Your Business in a Multi-Cloud World

For many organizations, the cloud has become the sole route to market for new application deployment. It affords greater agility and scalability, higher performance, and faster access to innovative technologies, all of which help businesses maintain a competitive edge. As a result, data and applications now reside in a multitude of cloud environments, including private and public clouds, spanning infrastructure, platform and software as a service – IaaS, PaaS and SaaS, respectively. Confidently accelerating the move to the cloud requires consistent, automated protections across multi-cloud deployments that prevent data loss and business disruption. This paper highlights an innovative security approach that eliminates the wide range of cloud risks that can cause breaches, while enabling organizations to achieve consistent and frictionless cloud protections for multi-cloud environments.

Date

Displaying 1 to 10 of 59

Customer Case Study

Nexon Asia Pacific

Nexon Asia Pacific is a Managed Security Service Provider (MSSP) that delivers infrastructure and software to provide secure connectivity and productivity applications, unified communications, business intelligence and continuity, and cloud services. Nexon’s 120 employees support small to medium to enterprise-sized customers in the retail, manufacturing, telephony, insurance, hospitality, health, and not-for-profit industries in Australia, Asia Pacific, the United States, and Europe.

7
Article

2020 and Beyond: What’s Ahead for CISOs and InfoSec Teams?

To keep pace with digitization, new technology, laws and regulations, the roles of the CISO and InfoSec Team are evolving. Get 5 CISO Priorities for 2020 and Beyond.

16
White Paper

Cyber Threat Report: Reconnaissance 2.0

Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.

10
White Paper

Stop Targeted Attacks Without Decrypting Traffic

Stop Targeted Attacks Without Decrypting Traffic

8
Article

Corporate Backgrounder

As the next-generation security company, we are committed to maintaining trust in our digital age.

44
Datasheet

Traps 5.0: Advanced Endpoint Protection

Palo Alto Networks® Traps™ advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks. Traps minimizes endpoint infections by blocking malware, exploits and ransomware. Integration with your security platform delivers additional threat analysis, shared intelligence and automated containment.

14
Datasheet

Evident for Public Cloud Infrastructure

Addressing security and compliance in the cloud requires a rigorous and continuous approach that ensures risks are identified and controlled with speed. Palo Alto Networks® Evident provides continuous security of public cloud infrastructure services, enabling you to deploy applications confidently, knowing the cloud is configured according to your organization’s security requirements.

15169
Article

Evident at Work: Continuous Security & Compliance in the Cloud

Evident from Palo Alto Networks® works with InfoSec and DevOps professionals of all levels, across every industry, to make cloud infrastructure security and compliance easier. Every organization struggles with the challenges of cloud security, such as threat detection, misconfiguration management, risk remediation and compliance with industry standards. Read this report to hear how 13 organizations are managing their cloud security.

13
White Paper

Combine Network and Endpoint Security for Better Visibility, Protection, and Enforcement

This paper examines the changing threat landscape and highlights the importance of best-in-class endpoint protection working in lockstep with other security products to create coordinated and comprehensive enterprise security. Palo Alto Networks Traps advanced endpoint protection provides superior endpoint threat prevention as well as bridges the gap between endpoint security and network security, augmenting next-generation firewalls to provide stronger defense with fewer resources.

13
Article

How to Secure Your Business in a Multi-Cloud World

For many organizations, the cloud has become the sole route to market for new application deployment. It affords greater agility and scalability, higher performance, and faster access to innovative technologies, all of which help businesses maintain a competitive edge. As a result, data and applications now reside in a multitude of cloud environments, including private and public clouds, spanning infrastructure, platform and software as a service – IaaS, PaaS and SaaS, respectively. Confidently accelerating the move to the cloud requires consistent, automated protections across multi-cloud deployments that prevent data loss and business disruption. This paper highlights an innovative security approach that eliminates the wide range of cloud risks that can cause breaches, while enabling organizations to achieve consistent and frictionless cloud protections for multi-cloud environments.

17

Displaying 1 to 10 of 59