Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Palo Alto Networks, Inc.

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across cloud, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.

Our Website: https://paloaltonetworks.com


Latest Content From Palo Alto Networks, Inc.

Webcast: The Threat Hunter's Toolkit: Traits, Techniques, and Favorite Tools of the Trade

by Palo Alto Networks, Inc.Jul 14, 2021

For years, most IT security organizations have waited to detect new threats and then moved swiftly to defend against them. Today, however, there is a new wave of “threat hunting,” in which the security team takes a more proactive approach --seeking out potential threats using analytical tools. How do these enterprises build threat hunting programs? How do they staff them, and what tools do they need? In this Dark Reading webinar, a top expert discusses the process for building a threat hunting program, and for optimizing the efforts of designated threat hunters in the organization.


Webcast: Smarter Security Automation for Streamlined SecOps

by Palo Alto Networks, Inc.Jun 23, 2021

A shortage of skilled IT security professionals has given rise to a whole new class of technology and practices designed to automate repetitive and time-consuming tasks in security operations. But which tasks can enterprises safely automate? How does emerging automation technology work, and how can security teams implement it in a way that is both effective and secure? In this webinar, top experts offer insights on how to make automation work for your security team.


Webcast: What We All Got Wrong About The Internet

by Palo Alto Networks, Inc.May 26, 2021

Throughout the history of the Web, there have been a lot of incorrect assumptions about the internet – and those myths impact how we view cybersecurity today.

Join guest speakers from Palo Alto Networks for a webinar on what we all got wrong about the internet—a talk about the many pervasive (and wrong) assumptions related to the structure of the Internet, and how these bad assumptions continue to influence cybersecurity strategy today.

With a new understanding that what we think we know isn’t always true, we will dive into attack surface management technology and how it can help lead security efforts in the future. Join us for the conversation!


E-Book: The Essential Guide to XDR

by Palo Alto Networks, Inc.May 18, 2021

Need to get up to speed on the XDR category and what it means for your company? As a modern approach to threat detection and response, Extended Detection and Response (XDR) progresses beyond traditional EDR with a scalable cloud architecture that natively integrates endpoint, network, and cloud data to stop sophisticated attacks.

Investing in XDR today can protect you against tomorrow's threats. Download our eBook to learn:
• What XDR is and is not
• Advantages over legacy detection and response tools
• What capabilities to look for when evaluating XDR solutions
• How XDR can help simplify and improve your security operations


Research Report: Gartner's Top 9 Security Trends in 2020

by Palo Alto Networks, Inc.May 18, 2021

Security and Risk Management leaders in organizations of any size are challenged with staying ahead of the proverbial "security curve". By considering trends that point out ongoing strategic shifts, teams can better prepare for longer term market impacts.

Get the new report to learn why Gartner thinks:
• XDR is one of the top nine cybersecurity trends
• Security process automation is the key to eliminating repetitive tasks
• AI will create new security responsibilities for protecting digital business initiatives
• New approaches are key to protect cloud native applications and business initiatives


Research Report: Cortex XDR Rides The Forrester Wave™ as a Leader

by Palo Alto Networks, Inc.May 18, 2021

With the right technology — a solution that combines comprehensive data with analytics to block endpoint attacks. See how Cortex XDR empowers you to detect and respond to stealthy threats across your organization.

Dive into the full report to learn how to evaluate endpoint security solutions that best suit your enterprise needs. This report covers:
• Forrester's evaluation criteria for endpoint security vendors
• Strengths and factors to consider when choosing an endpoint security partner
• How Forrester ranks particular vendors as leaders

You'll also learn why it's crucial for organizations to consider and XDR-based solution when evaluating endpoint security and discover what makes Cortex XDR a Forrester Wave Leader.


Webcast: Understanding XDR

by Palo Alto Networks, Inc.Apr 08, 2021

Over the past few years, many enterprises have discovered the benefits of endpoint detection and response (EDR) tools, which help to identify potential threats and warn security teams to take action. But today, many enterprises are also realizing that other threat surfaces, such as networks and clouds, also provide critical telemetry that can help security teams to quickly identify and respond to threats. In this webinar, experts discuss the benefits and limitations of EDR, and offer recommendations on how to extend these capabilities to other parts of the IT infrastructure in order to improve overall security. 


Webcast: Regulatory Compliance in a Cloud Environment

by Palo Alto Networks, Inc.Apr 07, 2021

One thing for certain is that you can’t rely on your cloud provider to assure that your assets are safe in the cloud with respect to compliance.  Further, compliance laws are changing, as are retention rules for even simple information.  Throw in some multi-cloud applications, a bit of remote work, and some shadow IT and the tasks for compliance become daunting.  In this webinar, we discuss compliance, how the requirements vary from your own environment to the cloud, and ways the cloud can impact your industry.  We will discuss HIPAA, PCI, and other compliance requirements, as well as data sovereignty and movement of data within the cloud.


Webcast: People Are The Most Important Part of Autonomous SOC

by Palo Alto Networks, Inc.Mar 16, 2021

The vision of Autonomous SOC is not one intended to be fully realized, but to provide a framework for solving security operations challenges by prioritizing your most valuable asset, people. As security teams make meaningful improvements in their use of automation, as well as technologies that monitor and adapt, they are prioritizing the most important asset in the people, processes, and technology triumvirate.

In this webinar, we will explore specific challenges to identify, validate, and remediate to advance your own maturity toward an autonomous SOC.


Webcast: Hybrid Cloud: The Great Balancing Act

by Palo Alto Networks, Inc.Mar 10, 2021

Hybrid cloud is becoming even more important allowing companies to have local presence for their most critical compute providing low latency applications and data access.   The ability to have a hybrid compute model also assures that information that can be processed locally may or may not have a need to ever hit a cloud.   Smart cities, smart communities, and a myriad of business needs are driving the increasing use for hybrid cloud.