It's hard, but imperative, to keep up on the frequently changing world of network security. The wealth of information available to you in our Network Security Resources section makes your task a little easier. Here you'll find white papers, media stories, informative thought leadership pieces from our in-house experts, media and industry analyst articles, and more on network security.
Filter Results By
Viewing All Results
This technical document provides details of the VMware NSX and Palo Alto Networks integration, including descriptions of the components of the solution, and key use cases.
Security Information & Event Management
With the rapid rise and evolution of cyber threats, the traditional network perimeter is eroding and endpoint compromise is inevitable. Security and networking teams must collaborate to quickly identify and contain compromised endpoint devices.
Palo Alto Networks and Bradford Networks™ have partnered to automate the complex threat triage and response process and empower organizations to contain advanced threats in seconds.
This brief provides details on how Palo Alto Networks eliminates some of the complexities involved with point products — firewall, IPS, IDS, URL filtering — by providing visibility at all layers, and into every step of an advanced attack, with a single inline security appliance augmented with cloud intelligence.
Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, and Westcon Group, the value-added distributor of security, unified communications, network infrastructure, and data center solutions, today announced that the companies have expanded their global distribution agreement.
Palo Alto Networks Advanced Endpoint Protection represents a complete paradigm shift from identification to pure prevention.
Defense in Depth does not mean more security tools. The key to thwarting advanced attacks in today’s government networks is to reduce the attack surface to increase visibility to what matters: the anomalies in your network, across the kill chain.
Once creation of application whitelisting, policies and file types allowed on each segment of the government network is complete, it is necessary to identify any anomalous applications and files. The Palo Alto Networks® enterprise security platform prevents all known file types from traversing government networks in-line while unknown files are dynamically analyzed by the WildfireTM Threat Intelligence Cloud or your own private instance of the WildFire Threat Intelligence Cloud, the WF-500. Unknown threats are identified, and protections are created and shared with all customers within as little as 30 minutes.
Exeter Finance works with thousands of franchised dealers nationwide to make car ownership possible for more people. The company works with its customers to become a trusted partner in car ownership – a partner who guides them along the way, provides tools to keep them informed, and helps them establish a payment history that can impact their credit score.
Spyders Inc. delivers business relevant IT security and networking expertise and solutions to over 500 mid and large size organizations across North America. Spyders delivers value to clients by supplying, designing, integrating and managing a portfolio of best-in-class solutions and services our clients want and need.
Brigham-Young University – Hawaii (BYU–Hawaii) is a small campus of intercultural leadership development, where a diverse population of over 2,500 students representing over 70 countries live, study and work together.
This white paper describes a structured approach toward the formation of a government security operations center (SOC) that enables organizations to integrate this capability into their overall Information Security Management System (ISMS) and align with many of the requirements introduced by ISO/IEC 27001:2013.
The U.S. Government Continuous Diagnostics and Mitigation (CDM) program provides a three-phased approach to securing the government’s networks and systems. Palo Alto Networks unique platform approach provides solutions to meet Phase 2’s five Least Privilege and Infrastructure Integrity capabilities in a singular platform, reducing the costs and complexity of implementing these important capabilities.
Palo Alto Networks® enterprise security platform is well suited for healthcare providers. Our ability to provide full visibility into all network traffic based on application (App-ID™), users (User-ID™) and content (Content-ID™) enables your security staff to rapidly assess the current state of your information and network security without any disruption to daily operations. You can discover where the organization is most at risk and make informed decisions about where to implement tighter controls.
A two-page technology brief on how the Palo Alto Networks next-generation security platform protects DNS traffic from malware and related malicious activity.
Establishing, maintaining, and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for everyone in payment card processing—including merchants, processors, acquirers, issuers, and service providers, as well as companies that store, process or transmit cardholder data (CHD) and/or sensitive authentication data. With approximately three hundred individual requirements to address, organizations subject to the standard have their work cut out for them.
Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated packet filtering and stateful inspection firewall devices that offered deeper levels of access controls. Unfortunately, these traditional firewalls shared a common shortcoming—an inability to see all of the applications traversing the network across all ports and protocols. The use of proxy-based devices began providing more granular visibility into a small set of applications and protocols where traditional firewalls were blind.
因为最近的攻击、总统行政命令以及最大规模盛事 2013 年 RSA 会议的召开使几乎所有人都在考虑互联网安全问题。我们询问合作伙伴他们最关心的问题是什么。嘉宾博主、Palo Alto Networks 行业解决方案总监 Isabel Dumont 讨论了下一代防火墙是如何在新环境中成为众人瞩目的焦点的。
网络安全是指保护信息和系统免遭主要的网络威胁，在最具破坏性的形式下，网络威胁的目的可以是获取一个国家或民族的机密、政治、军事或基础设施资产。因此，网络安全是任何一国政府安全战略的关键组成部分。例如，自 2010 年底以来，美国联邦政府每年都拨款超过 130 亿美元用于保障网络安全。
在 11 月的 Ignite 大会上，我很荣幸地主持了一场企业网络安全思想领袖的小组讨论会，包括来自摩托罗拉解决方案的 Paul Carugati、来自 Capital Region Health Care 的 Mark Starry，以及来自一家领先金融机构的 Mike（尚不知能否公开提及）。这些都是网络安全专家，都在我们的产品上拥有丰富的经验，而且肯定并且重要的一点是，他们都是他们所在公司组织的领导人物。因此，我将把讨论的重点放在他们在转变自身的网络安全基础架构、政策和运作方面获得的教训上。
拒绝服务攻击（DoS）和分布式拒绝服务攻击（DDoS）已经成为各种规模企业所面临的一大日益普遍问题。 DDoS 活动是黑客活动分子经常使用的一种方式，用来让目标公司或政府机构难堪或中断他们的服务。
上周在旧金山举办的年度 RSA 安全会议非常令人振奋。展厅内人声鼎沸，而且充满了乐观情绪。
医疗保健服务提供商在网络安全方面面临的情况令人很感兴趣。与很多产业一样，他们也需要应对快速的技术变化，同时还面临众多的监管要求——美国的医疗保健业需要满足 HIPAA 和 HITECH 的要求，以及 PCI 规范的要求——这些规范分别侧重便携性、安全和 PHI 隐私，以及患者信用卡数据的安全。
LinkedIn、Twitter、博客和 Wikis 之间有哪些共同点？根据这篇文章，这些应用正在企业内部被越来越多地使用，有四分之一的公司组织在所有部门推行此类工具，而之前调查的此项数据为 12%。
有没有人和我一样觉得网络安全创新已经非常少了？我是说，看一下网络安全的核心所谓万能的防火墙已经有近 15 年没有发生变化了。防火墙还使用同样古老的状态检测方式来检测和控制流量（这意味着防火墙仅能控制特定端口的应用，而如今多数应用都不使用特定分配的端口号）。防火墙的功能也没有发生太大改变。现在想想，最近的网络安全功能创新也都以失败告终——几乎所有的 NAC 公司都在艰难度日，ILP 或 DLP 抑或如今其他名称的泄漏防护技术都没能形成气候，IM 控制、蠕虫病毒防范和消除僵尸网络等端点技术也没有什么作为。