Palo Alto Networks Expands Cortex, Prisma Cloud Hosting to Singapore

Only nine days after introducing a cloud hosting location in the UK for Cortex and WildFire, we are proud to announce a new cloud hosting location in Singapore for Cortex XDR, Cortex Data Lake and Prisma Cloud.

The State of Cybersecurity in ASEAN, 2020

Where ASEAN Organizations Are Winning—and Not Winning—in the Cybersecurity War.

Date

By Industry

By Features

By Technology

By Services

By Audience

By Language

Displaying 51 to 60 of 107

Article

Evident at Work: Continuous Security & Compliance in the Cloud

Evident from Palo Alto Networks® works with InfoSec and DevOps professionals of all levels, across every industry, to make cloud infrastructure security and compliance easier. Every organization struggles with the challenges of cloud security, such as threat detection, misconfiguration management, risk remediation and compliance with industry standards. Read this report to hear how 13 organizations are managing their cloud security.

113
Article

12 Best Practices to Make Your AWS Configuration More Secure

Amazon® Web Services has been an advocate for strong cloud security since it launched in 2006. AWS® and its customers employ a shared responsibility model that distributes security roles between the provider and customer. As a public cloud vendor, AWS owns the infrastructure, physical network and hypervisor. The enterprise owns the workload operating system, apps, virtual network, access to their tenant environment/account and the data.

141
Article

How to Secure Your Business in a Multi-Cloud World

For many organizations, the cloud has become the sole route to market for new application deployment. It affords greater agility and scalability, higher performance, and faster access to innovative technologies, all of which help businesses maintain a competitive edge. As a result, data and applications now reside in a multitude of cloud environments, including private and public clouds, spanning infrastructure, platform and software as a service – IaaS, PaaS and SaaS, respectively. Confidently accelerating the move to the cloud requires consistent, automated protections across multi-cloud deployments that prevent data loss and business disruption. This paper highlights an innovative security approach that eliminates the wide range of cloud risks that can cause breaches, while enabling organizations to achieve consistent and frictionless cloud protections for multi-cloud environments.

121
Datasheet

Evident for Public Cloud Infrastructure

Addressing security and compliance in the cloud requires a rigorous and continuous approach that ensures risks are identified and controlled with speed. Palo Alto Networks® Evident provides continuous security of public cloud infrastructure services, enabling you to deploy applications confidently, knowing the cloud is configured according to your organization’s security requirements.

15287
White Paper

10 Things to Test In Your Future NGFW

This paper discusses ten points to consider and actively test in your current security i nfrastructure and your future NGFW. Using these as guidelines for cross-functional conversations, you will expand the lens through which you can view your NGFW in order to determine if your potential security investments are easy to implement, alleviate workloads, and offer your organization the best protection and value, today and in the future.

156
Datasheet

Traps Technical Overview

Palo Alto Networks® Traps™ advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks. Traps minimizes endpoint infections by blocking malware, exploits and ransomware. Integration with your security platform delivers additional threat analysis, shared intelligence and automated containment.

175
White Paper

Decryption: Why, Where and How

Learn where, when and how to decrypt – everything from people, processes and tools to best practices – to prevent threats and secure your business.

148
White Paper

3 Requirements for Secure Digital Transformation

As data breaches continue to disrupt business in the increasingly cloud-driven world, it’s clear the traditional approach to cybersecurity doesn’t cut it. Securing digital transformation without slowing down the business requires a new school of cybersecurity thought. An integrated approach – harnessing the agility of the cloud along with the power of automation and analytics – will simplify operations and bring about better security outcomes with less effort. This paper discusses the cybersecurity model of the future and the three key elements it provides to effectively secure your business.

119
White Paper

5 Critical Mistakes When Evaluating A Next-Gen Firewall

Avoid critical mistakes when implementing you Next Generation Firewall. Robust cybersecurity plans must account for sizing, performance, context, and scalability.

30
Datasheet

URL Filtering At-A-Glance

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. This document provides the customers of Palo Alto Networks with information needed to assess the impact of WildFire on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within WildFire and its associated components.

3511

Displaying 51 to 60 of 107