Displaying 1 - 30 of 59
References and Case Studies
TES gains simplified SecOps and greater visibility across all data with the Cortex XDR platform
Palo Alto Networks MSSP and XMDR partner RightSec deployed solution in record time of 14 days
References and Case Studies
Inspira’s Cyber Fusion Centers automate incident response with Cortex XSOAR
Optimized frameworks result in automation, orchestration, and faster response time for incident management, benefitting end customers.
References and Case Studies
Next-Generation Firewalls enable unified security control and enhanced visibility at Movate
NGFW, Panorama, and Cortex XDR from Palo Alto Networks ensure a more proactive approach to cybersecurity.
References and Case Studies
Palo Alto Networks Global Help Desk increases staff productivity and enhances user experience with AI-Powered ADEM
Autonomous Digital Experience Management integrates with Zoom Quality of Service Subscription to identify and troubleshoot the root cause of connectivity issues in minutes.
References and Case Studies
Defense contractor contains APT with Unit 42 Incident Response expertise
A nation-state associated with the TiltedTemple campaign used sophisticated tactics to breach a defense contractor. Learn how the Unit 42 IR team investigated and remediated the incident.
References and Case Studies
Quantiphi stays ahead with proactive vulnerability management and resolution of misconfigurations
Comprehensive cloud security, visibility, compliance coverage, and proactive vulnerability management with Prisma® Cloud
Article
5Gセキュリティとは
5Gは、洗練されたモバイル ブロードバンド体験の提供と、企業や業界における大規模なデジタル化の実現により、モビリティに変革をもたらします。
Datasheet
High-Tech Cloud Security: Safeguard Your Sensitive Data
Secure your high tech org’s customer data with DSPM. Explore key benefits, ensure compliance, and protect cloud data from breaches in our comprehensive datasheet.
References and Case Studies
NetApp CSO chooses Palo Alto Networks for Enterprise Browser
NetApp CSO chooses Prisma Access Browser
References and Case Studies
AI-Driven SOC Transformation with Cortex XSIAM
Explore how six organizations across various industries enhanced their security posture and transformed their security operations centers (SOC) with the AI technology in Cortex XSIAM®. Each case study delves into unique challenges and solutions showcasing the diverse application of Cortex XSIAM.
Whitepaper
Stop Attackers from Using DNS Against You
Any modern organization requires the Domain Name System (DNS) to run its business, regardless of industry, location, size, or products. DNS is a protocol that translates user-friendly domain names, such as www.paloaltonetworks.com, into machine usable IP addresses—in this case, 199.167.52.137. Without DNS, we’d have to memorize random strings of numbers, which our brains aren’t well equipped to do. DNS is fundamental to every single modern organization, all over the world. Network operators cannot block DNS traffic, and firewalls have to let it through. Networks need DNS to function properly.
Other
APP-IDs for ICS and SCADA
This document is a listing of application identifiers or App-IDs, supported by App-ID™ technology on Palo Alto Networks ML-Powered Next-Generation Firewalls for applications and protocols used to support operational technology (OT) industrial control systems (ICS).
Book
Madurez de la seguridad nativa en la nube: Cómo usar la seguridad para impulsar la eficiencia en el desarrollo de software
Conozca los medios con que los altos cargos protegen sus aplicaciones y plataformas subyacentes, qué herramientas utilizan, cómo afinan los sistemas y procesos a nivel organizativo y de qué formas aprovechan los controles.
Book
Maturité de la sécurité cloud-native : levier d’efficacité du développement logiciel
Sécurisation des applications et des plateformes sous-jacentes, choix des outils, perfectionnement des systèmes et processus à des fins d’alignement organisationnel, utilisation des contrôles... des décideurs vous révèlent leurs méthodes.
Book
클라우드 네이티브 보안 완성도: 보안을 적용하여 소프트웨어 개발 효율성 향상
Learn how senior decision makers secure their applications and underlying platforms, what tools they use, how they finesse systems and processes into organizational alignment and ways they leverage controls.
Book
云原生安全成熟度:以安全方式提高软件开发效率
Learn how senior decision makers secure their applications and underlying platforms, what tools they use, how they finesse systems and processes into organizational alignment and ways they leverage controls.
Book
クラウドネイティブ セキュリティ成熟度: セキュリティを通じたソフトウェア開発の効率化
Learn how senior decision makers secure their applications and underlying platforms, what tools they use, how they finesse systems and processes into organizational alignment and ways they leverage controls.
Book
Reifegrad der cloudnativen Sicherheit: Turbo für eine effizientere Softwareentwicklung
Erfahren Sie, wie führende EntscheidungsträgerInnen ihre Anwendungen und deren Plattformen schützen, welche Tools sie nutzen, wie sie Systeme und Prozesse optimieren und auf ihren Betrieb abstimmen und wie sie Sicherheitskontrollen effektiv einsetzen.
Book
雲端原生安全成熟度:透過安全方式提升軟體開發效率
Learn how senior decision makers secure their applications and underlying platforms, what tools they use, how they finesse systems and processes into organizational alignment and ways they leverage controls.
Book
Cloud Native Security Maturity: Using Security to Drive Software
Learn how senior decision makers secure their applications and underlying platforms, what tools they use, how they finesse systems and processes into organizational alignment and ways they leverage controls.
Find out why security program maturity correlates to operational excellence and enables more functionality and on-time product delivery.
Leverage the insights of a thousand seasoned security professionals. Access key benchmarks of the development processes toward a mature security program in this actionable e-book.
Datasheet
5G-Native Security At a Glance
Learn how 5G-Native Security protects all facets of the 5G infrastructure, including the user communications, applications, and data of business-critical enterprises, governments, as well as consumers.
Whitepaper
Revolutionize NGFWs and CASB App-ID with Machine Learning
In this white paper we bring to you Palo Alto Networks’ point of view on why revolutionizing the Next-generation Firewall and CASB App-ID with machine learning is vital for SaaS Security.
Whitepaper
Building a Remote-Access Solution
With the VM-Series and GlobalProtect™ now available on AWS®, you can protect your mobile workforce and your network from Internet-borne threats while dramatically reducing administrative effort and associated costs with an appliance-based, mobile-security and remote-access solution.
Whitepaper
Global and Regional WildFire Clouds
Regional WildFire clouds enable customers to fully utilize the industry’s most advanced cloud-based threat analysis and prevention engine while ensuring that files submitted for analysis stay in the defined region to address data privacy and sovereignty concerns.
Whitepaper
ICS/SCADA INDUSTRY Solutions Brief
Get an overview of how Palo Alto Networks security platform can help protect your critical assets and enable a least privilege access control model in your control networks.
Whitepaper
Security Reference Blueprint for Mining Industrial Control Systems
How to build security into your ICS and SCADA networks
Whitepaper
Remote Access for ICS and SCADA PDF
White paper discussing how remote access can be supplied to both greenfield or brownfield deployments into an automation network.
Article
Security Reference Blueprint for Industrial Control Systems White Paper
The Security Reference Blueprint for Industrial Control and SCADA Systems provides an IT-OT security framework in which owners and operators can protect these critical systems from compromise, rationalize the scope of compliance and more, using the core capabilities of Palo Alto Networks® Security Operating Platform.
Whitepaper
Applying VLAN Insertion in ICS/SCADA
Network segmentation is a critical, fundamental building block in today’s modern process controls networks (PCN). Once thought to be an optional practice, the recent increase in attacks on ICS/SCADA systems shows it is vital to network design and security implementation. Case studies on both the Target® and the more recent Ukraine electrical grid attacks indicate that these attacks were containable – even preventable – had the proper network segmentation been in place.
Whitepaper
Palo Alto Networks Prisma Access and Cradlepoint NetCloud Solution Brief
To learn more about the key benefits of implementing this integration and sample use cases, download the Palo Alto Networks Prisma Access and Cradlepoint NetCloud Solution Brief
Displaying 1 - 30 of 59