Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Palo Alto Networks, Inc.

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across cloud, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.

Our Website: https://paloaltonetworks.com


Latest Content From Palo Alto Networks, Inc.

Webcast: Understanding XDR

by Palo Alto Networks, Inc.Apr 08, 2021

Over the past few years, many enterprises have discovered the benefits of endpoint detection and response (EDR) tools, which help to identify potential threats and warn security teams to take action. But today, many enterprises are also realizing that other threat surfaces, such as networks and clouds, also provide critical telemetry that can help security teams to quickly identify and respond to threats. In this webinar, experts discuss the benefits and limitations of EDR, and offer recommendations on how to extend these capabilities to other parts of the IT infrastructure in order to improve overall security. 


Webcast: Regulatory Compliance in a Cloud Environment

by Palo Alto Networks, Inc.Apr 07, 2021

One thing for certain is that you can’t rely on your cloud provider to assure that your assets are safe in the cloud with respect to compliance.  Further, compliance laws are changing, as are retention rules for even simple information.  Throw in some multi-cloud applications, a bit of remote work, and some shadow IT and the tasks for compliance become daunting.  In this webinar, we discuss compliance, how the requirements vary from your own environment to the cloud, and ways the cloud can impact your industry.  We will discuss HIPAA, PCI, and other compliance requirements, as well as data sovereignty and movement of data within the cloud.


Webcast: People Are The Most Important Part of Autonomous SOC

by Palo Alto Networks, Inc.Mar 16, 2021

The vision of Autonomous SOC is not one intended to be fully realized, but to provide a framework for solving security operations challenges by prioritizing your most valuable asset, people. As security teams make meaningful improvements in their use of automation, as well as technologies that monitor and adapt, they are prioritizing the most important asset in the people, processes, and technology triumvirate.

In this webinar, we will explore specific challenges to identify, validate, and remediate to advance your own maturity toward an autonomous SOC.


Webcast: Hybrid Cloud: The Great Balancing Act

by Palo Alto Networks, Inc.Mar 10, 2021

Hybrid cloud is becoming even more important allowing companies to have local presence for their most critical compute providing low latency applications and data access.   The ability to have a hybrid compute model also assures that information that can be processed locally may or may not have a need to ever hit a cloud.   Smart cities, smart communities, and a myriad of business needs are driving the increasing use for hybrid cloud.  


Webcast: ROI and Beyond for the Cloud

by Palo Alto Networks, Inc.Feb 10, 2021

Moving to the cloud isn't just about pulling expensive equipment out of a data center. Going with a cloud provider involves its own set of costs. However, a cloud strategy offers other business benefits, some that can be calculated on a dollar basis and others that are on the softer side. Learn how to evaluate the payback from a cloud move in savings and business benefits.


Webcast: A Radical Approach to Threat Intel Management

by Palo Alto Networks, Inc.Jan 20, 2021

For years, cyber threat intelligence has been focused on collecting tactical Indicators of Compromise (IOCs) such as domains, IP addresses, & hashes. But what's the point of collecting tactical information that your team can't act on or map to what's happening in your environment?

As a security leader, you need more from your cyber threat intelligence program.