TECH DIGITAL RESOURCE LIBRARY

Palo Alto Networks

Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With their deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, customers can confidently pursue a digital-first strategy and embark on new technology initiatives, such as cloud and mobility. This kind of thinking and know-how helps customer organizations grow their business and empower employees all while maintaining complete visibility and the control needed to protect their critical control systems and most valued data assets.

Our Website: https://paloaltonetworks.com


Latest Content From Palo Alto Networks

Whitepaper: Disrupting The Attack Lifecycle

by Palo Alto NetworksOct 03, 2016

When attackers strategize their way to infiltrate an organization, they follow the series of stages that comprise the attack lifecycle. To successfully execute an attack, they must progress through each stage.


Whitepaper: Preventing Business Blocks To Cybersecurity

by Palo Alto NetworksOct 03, 2016

Is cybersecurity a priority in your business? We surveyed 700 decision-makers to understand how they prioritize evolving security needs with other business considerations.


Whitepaper: Scarlet Mimic

by Palo Alto NetworksOct 03, 2016

Attacks associated with Scarlet Mimic have used a wide range of tools and tactics, using continuous innovation. To identify the attacks, Unit 42 used WildFire as their primary data source, which provides insight into unknown malware.


Whitepaper: 6 Requirements For Antivirus Replacement

by Palo Alto NetworksOct 03, 2016

Exploit kits obfuscate payloads when passing through the network, meaning you need protection on the endpoint. But antivirus isn't enough to prevent exploits. What should you look for in an antivirus replacement?


Research Report: Ransomware Report

by Palo Alto NetworksOct 03, 2016

This year alone, businesses have paid $1 billion in ransom. See why ransomware is an effective criminal business and learn how attackers get a high ROI.


Webcast: How Evolved "419 Scammers" Are Targeting the Enterprise

by Palo Alto NetworksAug 15, 2014

Unit 42, the Palo Alto Networks threat intelligence team, recently released a new research paper titled "419 Evolution" on an attack campaign codenamed "Silver Spaniel." The paper describes a series of attacks against businesses emanating from Nigeria. Individuals formerly associated with 419 scams, which have commonly targeted unsuspecting individuals, are responsible for these attacks. These attackers are now using many of the same tools that cyber crime and espionage groups have deployed in the past, making them an emerging threat to the enterprise. In this live webcast with Q&A, researchers from Unit 42 will share key research takeaways from the report.

Join Unit 42 researchers for a live webcast and Q&A that will focus on these key takeaways:

  • Nigerian criminals are now using easily obtained Remote Administration Tools (RATs) such as NetWire, that provide complete control over infected systems
  • Silver Spaniel attacks are specifically designed to evade traditional antivirus programs
  • Indicators of compromise were observed for the NetWire RAT, and Unit 42 recommends protections you can employ against tools used in these attacks

Attend the webinar to find out what you need to know to protect against these advanced threats.


Whitepaper: Still Using Proxies for URL Filtering? There's a Better Way

by Palo Alto NetworksJul 01, 2014

Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated packet filtering and stateful inspection firewall devices that offered deeper levels of access controls. Unfortunately, these traditional firewalls shared a common shortcoming - an inability to see all of the applications traversing the network across all ports and protocols. The use of proxy-based devices began providing more granular visibility into a small set of applications and protocols where traditional firewalls were blind.


Research Report: Application, Usage and Threat Report

by Palo Alto NetworksJul 01, 2014

The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.


Whitepaper: Cybersecurity for Dummies eBook

by Palo Alto NetworksJul 01, 2014

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before.

Controlling these threats requires multiple security disciplines working together in context. While no single solution will solve the problem of advanced threats on its own, next-generation security provides the unique visibility and control of, and the true integration of, threat-prevention disciplines needed to find and stop these threats - both known and unknown.


Whitepaper: 10 Things Your Next Firewall Must Do

by Palo Alto NetworksJun 15, 2014

For enterprises looking at Next-Generation Firewall's, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.

In this booklet, you'll find practical advice on:

• The how and why of next-generation security

• How to turn security into a business enabler

• 10 critical functions your network security and your firewall must do