Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across cloud, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.

Our Website: https://paloaltonetworks.com


Latest Content From Palo Alto Networks

E-Book: XDR: Enterprise-Scale Detection and Response

by Palo Alto NetworksDec 13, 2019

What is XDR? Get the answers in this E-book

XDR replaces legacy siloed tools to provide visibility and analytics across your entire infrastructure. See how XDR supercharges detection, investigation and response capabilities to solve security operations challenges.

Download XDR: Enterprise-Scale Detection and Response to understand the:

• Challenges with the current state of detection and response
• Definition and key requirements of XDR
• Tactical use cases for improving security operations with XDR
• Criteria for evaluating XDR solutions


E-Book: Elements of Security Operations

by Palo Alto NetworksDec 13, 2019

Get Best Practices on How to Build a Better SOC

Elements of Security Operations dives into best practices on how to build a better SOC. Learn step by step how to make your security operations more effective, consistent and poised to tackle future threats.

Learn how to:

• Simplify operations with tool integration and consolidation
• Better use analyst talent by automating tasks
• Build consistent policy enforcement across networks, cloud and endpoints
• Respond to threats with greater visibility and insight

Get your eBook now.


Research Report: 451 Report: A SecOps Blueprint for Modern Network Security

by Palo Alto NetworksDec 13, 2019

451 Research: Network Visibility to Fuel Security Ops

In this 451 Research report, get both an operational and a technical lens into the network visibility and analytics capabilities required to protect your enterprise.

Download this 451 analyst report, A Blueprint for Modern Network Security to better understand:

• An overview of the emerging NVDR category
• Modern requirements for a more holistic approach to security
• Key tenets of NVDR, including the building blocks for an effective machine learning strategy
• How Palo Alto Networks delivers the key capabilities of NVDR

Read now.


Research Report: IDC Report: Key Requirements for EDR

by Palo Alto NetworksDec 13, 2019

Effective cybersecurity is critical to the success of digital transformation efforts. Unfortunately, many companies have vulnerable endpoints, leaving easy entry and exit points for attackers. Get insight into how to secure the endpoint and beyond.

Read this IDC report, Key Requirements for EDR to learn about the:

• Four central control points for securing a digital enterprise
• Strengths and weaknesses of current EPP and EDR vendor offerings
• Key EDR and EPP buying criteria to ensure visibility, efficacy and efficiency

Download now.


Research Report: Forresters MITRE ATT&CK Evaluation Guide

by Palo Alto NetworksDec 13, 2019

Get Forrester's Guide on the MITRE ATT&CK™ to Choose the Right EDR for Your Organization

This report by Josh Zelonis, principal analyst at Forrester Research, helps readers understand the MITRE ATT&CK™ results and provides an objective analysis of the leading offerings in today's endpoint security marketplace.

Download the Forrester MITRE ATT&CK™ Evaluation Guide to understand:

• The techniques used in the MITRE ATT&CK APT3 Evaluation
• The test results, their implications and how they inform evaluation considerations
• How you can objectively choose the right EDR for your organization

Download your copy today.