By Topic
By Industry
By Type
By Product Category
Education and Professional Services
Displaying 1 - 30 of 415
Video
Palo Alto Networks Advanced URL Filtering
With the mass adoption of hybrid work and business applications moving to the cloud, it is more important than ever to secure your web access.
Datasheet
PA-5400 Series
Palo Alto Networks PA-5400 Series ML-Powered NGFWs—comprising the PA-5430, PA-5420 and PA-5410—are ideal for high-speed data center,
internet gateway, and service provider deployments. The PA-5400 Series appliances secure all traffic, including encrypted traffic, using dedicated processing and memory for networking, security, threat prevention, and management.
Article
What Is DNS?
DNS is as ubiquitous online as flooring is in your home – so what exactly is it, and why should you care?
Video
Meet Okyo Garde Enterprise Edition
With work-from-home considered the new norm, home networks can be a critical weak link in enterprise security. As the lines between personal and corporate lives blur, sensitive information is at risk. It’s time to proactively secure your employees as a part of your Zero Trust security strategy.
Video
ZK Research interview with Palo Alto Networks: WFH Network Security
Kumar Ramachandran, Palo Alto SVP of Products for SASE, sits down with Zeus Kerravala of ZK Research to discuss the emerging need for enterprise security for the home office.
Guide
5 Misconceptions About Home Network Security
This guide helps identify and correct the five biggest misconceptions about home network security. Being aware of security gaps can be critical to reducing the attack surface and mitigating risk.
Datasheet
Palo Alto Networks Prisma SD-WAN At-a-Glance
Enable the secure cloud-delivered branch with the industry’s first next-generation SD-WAN.
Datasheet
Okyo Garde Enterprise Edition
This datasheet provides an overview of Okyo Garde Enterprise Edition, market drivers, high-level architecture, and hardware and software specifications.
Article
How to Safely Enable Microsoft Apps on the Network
A natively integrated next-generation security platform can help secure Microsoft applications through safe enablement and prevention of threats.
Article
10 Things to Know About Machine Learning
Machine learning dynamically improves the accuracy and efficiency of threat prevention in cybersecurity. These are 10 valuable points to remember about machine learning.
Article
The Evolution of Firewalls: From Packet Filtering to Machine Learning-Powered NGFWs
Firewalls have evolved from reactive devices that control access to internal resources to proactive tools that use machine learning to enforce security policies.
Datasheet
Prisma Access, a FedRAMP Authorized Service
Rapidly connect remote users and branches with Prisma Access, a FedRAMP Authorized service
Article
Data Loss Prevention – Protecting Your Sensitive Enterprise Data
Data loss prevention (DLP) is the practice of detecting and preventing data breaches or destruction of sensitive data. Explore Palo Alto Networks DLP Solution Offerings.
Article
10 Things to Test in Your Future NGFW: Prevent Credential Abuse
Attackers can obtain stolen credentials in many ways: phishing, malware, social engineering, brute force or black-market purchase.
Article
Why Does Machine Learning Matter in Cybersecurity?
Machine learning can help network professionals stay ahead of new cyberattacks, secure the entire network, and reduce human error.
Article
What Is Network Security Management?
Network security management is the practice of managing firewalls and policies to protect the network and is best done through a centralized solution.
Article
Why a Comprehensive Approach to Data Security is Better than a Partial One?
A comprehensive approach to data security is simple, lowers TCO, and provides consistent data loss prevention.
Article
What is an NXNSAttack?
An NXNSAttack exploits a vulnerability in the DNS system and can paralyze your website, web mail, ecommerce, and other online resources.
Article
How Does SD-WAN Automation Simplify Network Operations?
Integrating your SD-WAN with powerful DevOps frameworks delivers agility, repeatability, accuracy and automation, thereby simplifying operations.
Article
What Is DNS Rebinding?
DNS rebinding exploits a DNS defense mechanism to establish communication between an attacker’s website and a company’s private network.
Resource
Secure Remote Access | Protect Remote Employees from Cyberthreats
Secure remote access allows remote employees to access internal networks from offsite locations. Learn about what it is and its role in securing remote workers.
Article
Why Machine Learning (ML) and Artificial Intelligence (AI) Are Key Technologies for SD-WAN
SD-WAN that includes machine learning and artificial intelligence amplifies network visibility and simplifies both network troubleshooting and operations.
Resource
What is IoMT Security?
Any medical device that connects to a healthcare provider’s network is subclassified as the Internet of Medical Things or IoMT.
Services
Targeted Design Service for PA-Series
This service description document (“Service Description”) outlines the Palo Alto Networks Targeted Design service offering for PA-Series.
Services
High-Level Design Service for PA-Series
This service description document (“Service Description”) outlines the Palo Alto Networks High-Level Design service offering for PA-Series.
Services
Consulting Services for PA-Series
This service description document (“Service Description”) outlines the Consulting Service for PA-Series.
Services
Consulting Services for VM-Series
This service description document (“Service Description”) outlines the Consulting Service for This service description document (“Service Description”) outlines the Consulting Service for VM-Series.
Article
What is Remote Access?
Remote access provides end users with the ability to access resources on the corporate network from a distant location.
Article
What Are Malicious Newly Registered Domains?
Malicious newly registered domains are used in cybercrimes such as phishing and malware distribution, often elements of credential and data theft attacks.
Article
What Is a Hybrid Data Center?
The hybrid data center enables greater IT efficiency, and automation, supporting the delivery of new application workloads across network fabric
Displaying 1 - 30 of 415