Executive Overview: The Next Evolution in Cloud Security

The current landscape of networking and security overlay products are creating administrative problems with cost and complexity, and falling short on the protections that organizations need. Learn about how Palo Alto Networks is changing the game with GlobalProtect Cloud Service and Aperture.

How to Pick a Winner in EDR

The endpoint security marketplace is crowded with vendors claiming to have superior capabilities. Cutting through all the marketing and sales pitches to understand how these products perform isn’t easy. Luckily, The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading endpoint detection and response (EDR) products against real-world attack sequences. We’ll break down MITRE’s methodology, the results, and what it all means for your organization as you assess your current and future endpoint security toolkit.

Date

Displaying 11 to 20 of 103

White Paper

Consistent Security with SD-WAN

In this eBook, you’ll learn the key SD-WAN features and capabilities to consider and understand how to choose an SD-WAN solution that delivers connectivity and security to users regardless of location.

64
White Paper

Simplify Zero Trust Implementation with a five-step methodology

Companies are often reluctant to begin their Zero Trust journey because they believe it is difficult, costly, and disruptive but building Zero Trust networks is actually much simpler than building legacy 20th-century hierarchical networks.

33
White Paper

Cloudy with a Chance of Entropy

This Unit 42 report highlights key learnings from public cloud security incidents and presents original research from the cloud-focused division of the Unit 42 threat research team.

34
White Paper

The Business Case for Cloud Threat Defense

Read this report for an understanding of how RedLock can reduce financial risks due to security breaches, third-party tools and labor requirements to resolve issues faster; provide security governance and increase cross-team visibility such as asset management; and easily generate compliance reports that map and provide audit trails for your cloud resources.

27
White Paper

Applying Zero Trust to Cloud Environments

This whitepaper details how establishing a Zero Trust strategy will better protect your growing organization for the long-term.

21
White Paper

Security for Cloud-Native Architectures

Read our new e-book to take a deep dive into various cloud-native architectures and CI/CD workflows, how they affect your security posture, and how the latest cloud security tools – including containers – can dramatically boost your protection.

69
Datasheet

Prisma Access for Clean Pipe

Overview of Prisma Access for Clean Pipe, an outbound internet security solution for managed service providers.

30
White Paper

Three Use Cases for Securing a Hybrid Data Center

Securing the modern, hybrid data center requires a uniform approach across physical, virtualized, and cloud environments. The key is to gain granular visibility, control, and consistent threat protection in your hybrid data center without added complexity.

48
Press Release

More than half of Australian Enterprises Have Misplaced Confidence in their Cloud Service Providers’ Security

SYDNEY, Australia – Oct. 24, 2019 – Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today released a report that uncovers the truth about the state of cloud security among large enterprises across Asia-Pacific including Australia, with many cases where perception doesn’t match the reality when it comes to securing the cloud.

32
Article

Corporate Backgrounder

As the next-generation security company, we are committed to maintaining trust in our digital age.

213

Displaying 11 to 20 of 103