Displaying 31 - 59 of 59
Whitepaper
Platform Brief for Manufacturing
Manufacturers are employing the industrial internet of things and other innovative technologies to produce quality goods efficiently. Read this platform brief for a summary of how Palo Alto Networks helps manufacturers compete in the global marketplace while streamlining security operations, protecting valuable data, and preventing new and known threats from impacting operations or uptime of corporate and ICS/SCADA networks.
Whitepaper
21st Century SCADA Security with Mario Chiock (WP)
SCADA and Industrial Control Systems experience unprecedented levels of agility, speed, and cost savings with the adoption of information technology and increased connectivity to supporting networks.
However, with this modernization have also come undesired IT vulnerabilities and other threat vectors which are increasingly being exploited by malicious actors.
The need for improved security in ICS has never been higher and has become a board-level issue for many organizations.
In this paper Mario Chiock, Cybersecurity & Disruptive Technology Executive Adviser and Del Rodillas Senior Manager, SCADA and Industrial Controls Cybersecurity go through the nine core capabilities that define this 21st century security platform for industrial control systems.
Book
MNO’s Guide to Buying a 5G-Ready Next Generation Firewall
With industries moving toward automation and hyperscale, a wide range of use cases such as massive IoT, mission-critical IoT, smart cities, smart grids, and smart factories—to name a few—are on their way to coming into reality with 5G—the single most powerful enabler of ubiquitous connectivity between users, devices, machines, and systems. In the new era of 5G, mobile network operators have the opportunity to move up the value chain and capitalize on net-new opportunities of revenue generation. The market opportunity with 5G-enabled industry 4.0 innovation is massive. However, to live up to its potential, your mobile network requires a wide variety of advanced security safeguards to safely deliver 5G-powered applications and services. As you prepare for your network transition to 5G, look for six essential capabilities in your 5G-ready next-generation firewall.
Book
MNO's Guide to Buying a 5G-Ready Next Generation Firewall
Evolving network architectural changes vastly impact 5G security postures that mobile operators are required to adopt in their journey to 5G. As you prepare for your network transition to 5G, look for six essential capabilities in your 5G-ready next-generation firewall.
Infographic
Service Provider Threat Considerations
Five security considerations mobile network operators need to keep on top of mind for a holistic and transformative approach to security across their mobile network.
Whitepaper
Cyber Threat Report: Reconnaissance 2.0
Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
Whitepaper
Cyber Threat Report: Reconnaissance 2.0
Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
Whitepaper
Cyber Threat Report: Reconnaissance 2.0
Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
Video
Lightboard Series: DNS Security Service - Protecting against malware using DNS
Protecting against malware using DNS
Webinar
Are your point of sale environments protected?
An often-forgotten area in the enterprise network which poses a significant risk to your organization if compromised are Building Management/Automation Systems (BMS/BAS).
Use Case
Use Case: Simplify Cybersecurity and Maintain Resilience in the Water Sector
Read this use case for real-world examples of how water districts and authorities reduce cybersecurity risk while securing new digital innovations.
Whitepaper
Cybersecurity for Oil and Gas Platform Brief
Overview of how oil and gas companies can secure network, endpoint, and cloud environments with the Security Operating Platform
Whitepaper
Cable MSO and Telco Use Case Handbook
Download now to learn more
Whitepaper
VM-Series On Google Cloud Deployment Guidelines
Organizations are adopting Google® Cloud Platform to take advantage of the same technologies that drive common Google services. Many business initiatives, such as big data, analytics and machine learning, deployed on GCP allow you to leverage contextual data collected from billions of search engine data points. The power behind GCP, combined with agility and a global footprint, help you quickly deploy enterprise-class applications and services.
Video
Remove IaaS and PaaS Cloud Risks
Infrastructure-as-a-service and platform-as-a-service offerings – IaaS and PaaS, respectively – are gaining traction for application development, analytics, business intelligence and more, but they also create new risks. Fragmented security, manual operations and human error can cause breaches as well as slow down application deployments.
Palo Alto Networks provides advanced protection for consistent security across all major clouds – Amazon® Web Services, Microsoft® Azure® and Google® Cloud Platform – and our automation features minimize the friction of app development and security. You can protect and segment applications, deliver continuous security and compliance, and achieve zero-day prevention.
Research Reports
Credential-Based Attacks Research
Credential-Based Attacks: Exposing the Ecosystem and Motives Behind Credential Phishing, Theft and Abuse
In this white paper, Unit 42 details the ecosystem behind how adversaries steal and leverage legitimate credentials to break in and move laterally within the organization, often bypassing security controls. Learn the key attack methods currently in use, how this technique fits into attacker playbooks, and real-world guidance on preventing successful attacks.
Santa Clara
Research Reports
SILVERTERRIER: The Next Evolution in Nigerian Cybercrime
Unit 42 tracks Nigerian Threat Actors and finds they've evolved into capable and formidable adversaries successfully attacking major companies and governments.
Video
Safely Enable SaaS
Prisma SaaS delivers a unique approach to securing sanctioned SaaS applications. Prisma SaaS provides complete visibly across all user, folder and file activity within the SaaS application providing detailed analysis and analytics on usage to prevent data risk and compliance violations. Even more importantly, it allows granular context-aware policy control within these SaaS applications to drive enforcement and quarantine of users and data as soon as a violation occurs.
Whitepaper
Security Considerations for Private vs. Public Clouds
The cloud movement presents a rare and momentous opportunity to revisit not only how we think about computing, but also how we think about information security. This whitepaper, written by the Cloud Security Alliance, provides an in-depth discussion of the security considerations for public and private clouds. Topics include business agreements, physical and virtual attack surfaces and most importantly, where do the security responsibilities lie.
Research Reports
419 Evolution
In the past three months Palo Alto Networks has identified a series of attacks emanating from Nigerian actors against our customers in Taiwan and South Korea. Our team is tracking this activity under the code name Silver Spaniel. These attacks have deployed commodity tools that can be purchased for small fees on underground forums and deployed by any individual with a laptop and an e-mail address. Read the report by Palo Alto Networks Unit 42.
Resource
¿Qué es la seguridad 5G?
Las redes y servicios 5G prometen una movilidad transformadora gracias a que ofrecen una experiencia de banda ancha móvil mejorada y permiten la digitalización masiva de empresas y sectores.
Tiempo de lectura:3 minutos
Resource
Qu'est-ce que la sécurité 5G ?
La 5G apporte avec elle la promesse d'une toute nouvelle expérience mobile haut-débit et d'une numérisation accélérée de tous les pans de l'économie.
3minutes de lecture
Resource
5G 보안이란?
5G promises transformative mobility by offering a refined mobile broadband experience and enabling the mass digitization of businesses and industries.
3분 읽기
Resource
¿Qué es la seguridad 5G?
5G promises transformative mobility by offering a refined mobile broadband experience and enabling the mass digitization of businesses and industries.
Lectura de 3 minutos
Resource
5G 安全是什么?
5G promises transformative mobility by offering a refined mobile broadband experience and enabling the mass digitization of businesses and industries.
3 分钟阅读
Resource
O que é segurança 5G?
5G promises transformative mobility by offering a refined mobile broadband experience and enabling the mass digitization of businesses and industries.
3min. de leitura
Resource
Was ist 5G-Sicherheit?
5G verspricht revolutionäre Neuerungen für die Mobilität, indem es das mobile Breitband verbessert und die massive Digitalisierung von Unternehmen und Branchen ermöglicht.
Lesedauer:3 Minuten
Resource
什麼是 5G 安全性?
5G promises transformative mobility by offering a refined mobile broadband experience and enabling the mass digitization of businesses and industries.
3 分鐘閱讀
Video
Application Visibility and Control
How Palo Alto Networks delivers application visibility and control more effectively than other port-based offerings.
Displaying 31 - 59 of 59