Protect Against Russia-Ukraine Cyber Activity
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Network Security
  • Secure Access Service Edge
  • Cloud-Native Security
  • Security Operations
  • Threat Intel & Consulting
  • More
  • SG
    Language
  • Contact Us
  • Resources
  • Get support
  • Get Started

Corporate Backgrounder

  • Download
Jun 06, 2018 at 12:00 AM

As the next-generation security company, we are committed to maintaining trust in our digital age. We do this by safely enabling all applications and preventing successful cyber breaches for tens of thousands of organizations worldwide.


White Paper

Guide to Securing Microsoft Office 365 for the Enterprise

This paper describes how the Palo Alto Networks Security Operating platform secures your data in Microsoft Office 365 and other cloud applications.

August 16, 2018
  • 988

White Paper

The State of Cybersecurity in ASEAN, 2020

Where ASEAN Organizations Are Winning—and Not Winning—in the Cybersecurity War.

July 9, 2020
  • 906

Datasheet

Traps: Advanced Endpoint Protection

Palo Alto Networks Advanced Endpoint Protection provides comprehensive exploit and malware prevention that can prevent attacks before malware can be successful.

February 1, 2017
  • 15634

Blog

Palo Alto Networks Expands Cortex, Prisma Cloud Hosting to Singapore

Only nine days after introducing a cloud hosting location in the UK for Cortex and WildFire, we are proud to announce a new cloud hosting location in Singapore for Cortex XDR, Cortex Data Lake and Prisma Cloud.

July 16, 2020
  • 61643

Blog

ASEAN Community for Cybersecurity Professionals to Stay Energized

ASEAN Sport Community is an invitation-only group enabling participants to sync, collaborate and be motivated through physical activities – virtual run or ride.

March 24, 2021
  • 402

Datasheet

Firewall Feature Overview Datasheet

This datasheet provides a comprehensive overview of the critical PAN-OS features that power all next-generation firewalls from Palo Alto Networks.

June 9, 2014
  • 6744

Be the first to know.

As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube

Copyright © 2022 Palo Alto Networks. All rights reserved