By Topic
By Industry
By Type
By Product Category
Education and Professional Services
Displaying 1 - 30 of 111
Book
SASE for Dummies 2nd Special Edition
This Dummies book dives into the core capabilities and benefits of a secure access service edge (SASE) solution.
Book
Optimizing your business for a SASE transformation
Since it’s introduction as a concept in 2019, SASE has become a popular means of securely connecting hybrid workforces with the services they need.
Book
Accelerating Digital Transformation with SASE
In recent years, organizations have embraced new infrastructure and services to meet their rapidly changing needs. This has caused a dramatic increase in network complexity, limiting visibility, increasing security risks and making the network harder to manage.
Video
SASE-Native Digital Experience Monitoring
Watch this video to find out why SASE-native digital experience monitoring can help you deliver an exceptional user experience within the hybrid workplace.
Article
Protecting Data with a SASE Solution
Companies collect and process massive amounts of information, ranging from confidential business data to sensitive intellectual property
Article
SD-WAN and SASE: How Do They Relate?
Many companies use SD-WAN to securely connect branch offices to their corporate networks instead of relying on traditional MPLS connections
Article
Secure Access Service Edge (SASE) Key Requirements
A secure access service edge (SASE) brings together networking and network security services in a single cloud-based platform
Article
How Zero Trust and SASE Can Work Together
By combining SASE and Zero Trust principles, companies can achieve ZTNA with a single solution to apply security policies across their network.
Article
What Is SASE?
Secure access service edge, or SASE (pronounced “sassy”), is an emerging cybersecurity concept. It is the convergence of wide area networking.
Video
ZK Research interview with Palo Alto Networks: WFH Network Security
Kumar Ramachandran, Palo Alto SVP of Products for SASE, sits down with Zeus Kerravala of ZK Research to discuss the emerging need for enterprise security for the home office.
Guide
5 Misconceptions About Home Network Security
This guide helps identify and correct the five biggest misconceptions about home network security. Being aware of security gaps can be critical to reducing the attack surface and mitigating risk.
Datasheet
Okyo Garde Enterprise Edition
This datasheet provides an overview of Okyo Garde Enterprise Edition, market drivers, high-level architecture, and hardware and software specifications.
Article
What Is Web Application and API Protection?
Web application and API (Application Program Interfaces) protection is a set of development, integration, and deployment practices that reduces the exposure to known vulnerabilities and denial-of-service attacks.
Article
What Is Least Privilege Access?
A basic best practice when configuring roles and permissions for any software environment is to apply least privilege access.
Article
What Is a Container?
Starting with the advent of Docker in 2013, containers have become a fundamental building-block of modern IT infrastructure.
Article
What Is SD-Branch | Centralized Security for Branch Office Networks
SD-Branch provides software-defined solutions to branch offices, proving centralized
security for branch office networks.
Article
Cloud Access Security Brokers: A Key Capability of a Secure Access Service Edge Solution
Cloud access security brokers deliver security policy controls for SaaS applications, providing a means to enforce data protection policies
Article
What is AIOps
AIOps is short for artificial intelligence to IT operations, that aims to simplify and accelerate IT operations management.
Article
What Is the CI/CD Pipeline and CI/CD Security?
The CI/CD pipeline is a foundational part of DevOps.
Article
What Is Policy-as-Code?
Policy-as-code is an approach to policy management in which policies are defined, updated, shared, and enforced using code.
Services
High-Level Design Service for Prisma SD-WAN
This service description document (“Service Description”) outlines the Palo Alto Networks High-Level Design service offering for Prisma SD-WAN.
Services
Targeted Design Service for Prisma SD-WAN
This service description ocument (“Service Description”) outlines the Palo Alto Networks Targeted Design service offering for Prisma SD-WAN.
Services
Consulting Services for Prisma Access
This service description document (“Service Description”) outlines the Consulting Service for Prisma Access.
Services
Consulting Services for Prisma SD-WAN
This service description document (“Service Description”) outlines the Consulting Service for Prisma SD-WAN.
Article
Branch Network Security | Securing Branch Networks with SD-WAN
Branch network security safeguards branch offices using SD-WAN to ensure they are protected from cyberthreats. Learn how SD-WANs protect branch networks.
Article
What is Attack Surface Management ?
Attack Surface Management (ASM) is based on the understanding that you cannot secure what you don’t know about
Book
SASE CIO eBook: Driving the future of work through enterprise-wide SASE
In Driving the future of work through enterprise-wide SASE, IT leaders will gain knowledge and insights to help them successfully navigate their organizations through the transition to SASE, including diving into the architecture of SASE and the benefits it provides, exploring how organizations are achieving their most important IT goals through three SASE use cases, preparing to adopt SASE by exploring the implications and potential pitfalls, and more.
Book
Work from Home: Security Risks to the Enterprise
This ebook covers four key considerations every organization needs to take into account as they transition to a hybrid work-from-home workforce.
Services
Targeted Design Service for Prisma Access
This service description ocument (“Service Description”) outlines the Palo Alto Networks Targeted Design service offering for Prisma Access.
Displaying 1 - 30 of 111