PA-800 Series Specsheet

Palo Alto Networks PA-800 Series next-generation firewall appliances, comprising the PA-820 and PA-850, are designed to secure enterprise branch offices and midsized businesses.

Palo Alto Networks Application Framework

Palo Alto Networks® is ushering in the future of security innovation, reinventing how customers rapidly access, evaluate and adopt the most compelling new security technologies as an extension of the Next-Generation Security Platform they already own and operate. The all-new application framework is a culmination of over a decade of security disruption, providing customers with superior security through compelling cloud-based apps developed by Palo Alto Networks and today’s most innovative security providers, large and small.

Date

By Type

By Industry

By Features

By Technology

By Services

By Audience

By Language

Displaying 61 to 70 of 78

White Paper

3 Requirements for Secure Digital Transformation

As data breaches continue to disrupt business in the increasingly cloud-driven world, it’s clear the traditional approach to cybersecurity doesn’t cut it. Securing digital transformation without slowing down the business requires a new school of cybersecurity thought. An integrated approach – harnessing the agility of the cloud along with the power of automation and analytics – will simplify operations and bring about better security outcomes with less effort. This paper discusses the cybersecurity model of the future and the three key elements it provides to effectively secure your business.

96
White Paper

5 Critical Mistakes When Evaluating A Next-Gen Firewall

Avoid critical mistakes when implementing you Next Generation Firewall. Robust cybersecurity plans must account for sizing, performance, context, and scalability.

0
Article

Corporate Backgrounder

As the next-generation security company, we are committed to maintaining trust in our digital age.

130
Datasheet

URL Filtering At-A-Glance

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. This document provides the customers of Palo Alto Networks with information needed to assess the impact of WildFire on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within WildFire and its associated components.

3489
Datasheet

Traps Enterprise ELA

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. This document provides the customers of Palo Alto Networks with information needed to assess the impact of WildFire on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within WildFire and its associated components.

3486
White Paper

Safely Enable Your SaaS Applications

See how the Next-Generation Security Platform has helped customers improve their security posture and reduce their total cost of ownership.

49
Datasheet

Aperture At A Glance

The use of SaaS (software as a service) applications is creating new risks and gaps in security visibility for malware propagation, data leakage and regulatory non-compliance. Aperture delivers complete visibility and granular enforcement across all user, folder and file activity within sanctioned SaaS applications, providing detailed analysis and analytics on usage without requiring any additional hardware, software or network changes.

3480
Datasheet

DNS Security Service

Apply predictive analytics to disrupt attacks that use DNS for command and control or data theft

3437
Datasheet

RedLock At a Glance

With RedLock® by Palo Alto Networks, organizations can harness the power of machine learning to maintain compliance and govern security, even across the most fragmented multi-cloud environments.

30
Datasheet

RedLock On Amazon Web Services

RedLock for AWS dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.

42

Displaying 61 to 70 of 78