How to Pick a Winner in EDR

The endpoint security marketplace is crowded with vendors claiming to have superior capabilities. Cutting through all the marketing and sales pitches to understand how these products perform isn’t easy. Luckily, The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading endpoint detection and response (EDR) products against real-world attack sequences. We’ll break down MITRE’s methodology, the results, and what it all means for your organization as you assess your current and future endpoint security toolkit.

Expanding Data Centers: 3 Benefits of a Hybrid Cloud Approach

This brief discusses the three key benefits of using a hybrid cloud approach

Date

By Type

By Industry

By Features

By Technology

By Services

By Audience

By Language

Displaying 61 to 70 of 87

White Paper

5 Critical Mistakes When Evaluating A Next-Gen Firewall

Avoid critical mistakes when implementing you Next Generation Firewall. Robust cybersecurity plans must account for sizing, performance, context, and scalability.

3
Article

Corporate Backgrounder

As the next-generation security company, we are committed to maintaining trust in our digital age.

135
Datasheet

URL Filtering At-A-Glance

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. This document provides the customers of Palo Alto Networks with information needed to assess the impact of WildFire on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within WildFire and its associated components.

3494
Datasheet

Traps Enterprise ELA

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. This document provides the customers of Palo Alto Networks with information needed to assess the impact of WildFire on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within WildFire and its associated components.

3489
White Paper

Safely Enable Your SaaS Applications

See how the Next-Generation Security Platform has helped customers improve their security posture and reduce their total cost of ownership.

54
Datasheet

DNS Security Service

Apply predictive analytics to disrupt attacks that use DNS for command and control or data theft

3440
White Paper

Redefine Security Operations with XDR

Introducing a breakthrough approach to SOC visibility, investigation and speedy resolution: XDR, detection and response across the network, endpoint or cloud.

15
White Paper

SECURING SD-WAN WITH THE SECURITY OPERATING PLATFORM

Palo Alto Networks delivers security to protect SD-WAN environments. GlobalProtect™ cloud service provides a unique, cloud-based environment that adapts to the dynamics of SD- WAN to stop threats and enable access to internal and cloud-based applications.

15
White Paper

Stop Attackers from Using DNS Against You

Any modern organization requires the Domain Name System (DNS) to run its business, regardless of industry, location, size, or products. DNS is fundamental to every single modern organization, all over the world. It’s also a pervasive but easily overlooked attack surface, and bad actors are using this to their advantage.

18
Datasheet

Cortex Data Lake

Enable AI-based innovations for cybersecurity

9

Displaying 61 to 70 of 87