UBM: TECH DIGITAL RESOURCE LIBRARY

Palo Alto Networks

Founded by security visionary Nir Zuk, Palo Alto Networks offers real innovation in the firewall by enabling unprecedented visibility and control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation. Based on patent-pending App-ID™ technology, our next generation firewalls accurately identify applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation.

Our Website: https://paloaltonetworks.com


Latest Content From Palo Alto Networks

Webcast: How Evolved “419 Scammers” Are Targeting the Enterprise

by Palo Alto NetworksAug 15, 2014

Unit 42, the Palo Alto Networks threat intelligence team, recently released a new research paper titled “419 Evolution" on an attack campaign codenamed "Silver Spaniel." The paper describes a series of attacks against businesses emanating from Nigeria. Individuals formerly associated with 419 scams, which have commonly targeted unsuspecting individuals, are responsible for these attacks. These attackers are now using many of the same tools that cyber crime and espionage groups have


Whitepaper: Still Using Proxies for URL Filtering? There's a Better Way

by Palo Alto NetworksJul 01, 2014

Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated packet filtering and stateful inspection firewall devices that offered deeper levels of access controls. Unfortunately, these traditional firewalls shared a common shortcoming - an


Research Report: Application, Usage and Threat Report

by Palo Alto NetworksJul 01, 2014

The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.


Whitepaper: Cybersecurity for Dummies eBook

by Palo Alto NetworksJul 01, 2014

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before.

Controlling these threats requires multiple security disciplines working together in context. While no single solution will solve the problem of advanced


Whitepaper: 10 Things Your Next Firewall Must Do

by Palo Alto NetworksJun 15, 2014

For enterprises looking at Next-Generation Firewall's, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.

In this booklet, you'll find practical advice on:

• The how and why of next-generation security

• How to turn security into a business enabler

• 10 critical functions


Whitepaper: Reducing Costs with Next-generation Network Security

by Palo Alto NetworksJun 01, 2014

This paper details real cases from three businesses, the legacy infrastructure they replaced, the Palo Alto Networks next-generation security platform they deployed, and the substantial savings they realized - cutting capital and operations costs by 50% on average.


Whitepaper: Ten Things Your Next Firewall Must Do

by Palo Alto NetworksMar 14, 2014

Without question, your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored.The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges. Read this whitepaper to learn about the 10 things that your next


Whitepaper: Getting Started With a Zero Trust Approach to Network Security

by Palo Alto NetworksMar 01, 2014

The continued, high frequency of successful cyberattacks against today's enterprises has made it abundantly clear that traditional, perimeter-centric security strategies are no longer effective. The failure of resulting architectures is a product not only of the outdated assumption that everything on the inside of an organization's network can be trusted, but also the inability of legacy countermeasures to provide adequate visibility, control, and protection of application traffic transiting


Whitepaper: Cybersecurity Imperatives: Reinvent Your Network Security

by Palo Alto NetworksDec 20, 2013

Cybersecurity has become a leading topic both within and beyond the corporate boardroom. What enterprises need to stop the escalation of cyberattacks is a network security approach that is designed from the outset to enable the safe use of the applications and technologies required to support a thriving business.


Whitepaper: Establishing a Logical Perimeter

by Palo Alto NetworksDec 20, 2013

The boundaries of the modern enterprise have undergone massive changes, and these shifts are causing IT, security and networking teams to fundamentally reevaluate the way they think about and manage the network. It is no secret that near-universal Internet connectivity has changed society and user behavior along with it. Users simply assume that they will be able to connect and work (or not) from anywhere, whether using their corporate laptop or increasingly popular platforms such as Android and