Traps: Advanced Endpoint Protection

Palo Alto Networks Advanced Endpoint Protection provides comprehensive exploit and malware prevention that can prevent attacks before malware can be successful.

Three Use Cases for Securing a Hybrid Data Center

Securing the modern, hybrid data center requires a uniform approach across physical, virtualized, and cloud environments. The key is to gain granular visibility, control, and consistent threat protection in your hybrid data center without added complexity.

Date

By Type

By Industry

By Features

By Technology

By Services

By Audience

By Language

Displaying 71 to 80 of 100

Press Release

Palo Alto Networks Luncurkan Prisma: Langkah Aman Menuju Cloud

JAKARTA, Indonesia, 3 Juli 2019 -- Palo Alto Networks (NYSE: PANW) hari ini meluncurkan Prisma,™ cloud security suite yang dirancang khusus untuk mewujudkan kehidupan digital yang makin aman bagi pelanggan di tengah tingginya tuntutan akan sistem keamanan cloud yang lebih sederhana, lebih aman, dan lebih komprehensif dari sistem-sistem yang pernah ada sebelumnya.

9
Datasheet

Prisma SaaS: At a Glance

The use of SaaS (software as a service) applications is creating new risks and gaps in security visibility for malware propagation, data leakage and regulatory non-compliance. Aperture delivers complete visibility and granular enforcement across all user, folder and file activity within sanctioned SaaS applications, providing detailed analysis and analytics on usage without requiring any additional hardware, software or network changes.

3438
Datasheet

Prisma Public Cloud for Amazon Web Services

More information and context lead to better security decision-making. Prisma™ Public Cloud (formerly RedLock) for AWS® dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources, including user activity, resource configurations, network traffic, threat intelligence and vulnerability feeds, to provide a complete view of public cloud risk. Through a new machine learning-driven approach, Prisma enables organizations to fulfill their obligations in the Shared Responsibility Model.

1
Datasheet

Prisma Public Cloud for GCP

Prisma Public Cloud for Google Cloud dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.

2
Datasheet

Prisma Public Cloud for Microsoft Azure

Prisma Public Cloud for Microsoft Azure dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.

2
Datasheet

Prisma: Cloud Data Protection

Prisma enables automated discovery, classification, monitoring, and protection of data across cloud storage and SaaS applications, with automated remediations before leaks can occur.

6
White Paper

Prisma: Secure DevOps

DevOps driven software development approaches are pervasive among organizations embracing cloud. Unlike traditional software development approaches, DevOps helps organizations shorten the time to build and ship cloud applications. Introducing security early into the software development lifecycle along with continuous monitoring in production environments improves the overall security posture of cloud applications reduces business risk.

0
White Paper

Prisma Cloud Threat Protection

The dynamic nature of public cloud environments requires security operations teams to adapt and embrace a new approach to securing the cloud. Threat assessment and mitigation are significantly impacted due to ephemeral cloud environments, decentralized management models, and distributed data across multi-cloud deployments. Threat prevention for the cloud needs to be built around the principles of attack surface reduction through segmentation and prevention controls, advanced threat detection measures built around user, network and host activity monitoring and behavioral baselines, and rapid response through automated remediation.

6
White Paper

How to Pick a Winner in EDR

The endpoint security marketplace is crowded with vendors claiming to have superior capabilities. Cutting through all the marketing and sales pitches to understand how these products perform isn’t easy. Luckily, The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading endpoint detection and response (EDR) products against real-world attack sequences. We’ll break down MITRE’s methodology, the results, and what it all means for your organization as you assess your current and future endpoint security toolkit.

56
White Paper

11 Things to Focus on to be PCI Compliant in AWS

This ebook will explore some practical tips and guidance that we’ve collected from our security and compliance experts who have built and managed PCI-compliant environments in AWS.

8

Displaying 71 to 80 of 100