By Topic
By Industry
By Type
By Product Category
Education and Professional Services
Displaying 1 - 30 of 235
Datasheet
Prisma Cloud Privacy Data Sheet
Describes how Prisma Cloud processes personal information
Article
Container Security | Securing Containers from Potential Cyberthreats
Container Security protects your container infrastructure, apps, and other container components through the process of implementing security tools and policies.
Research Reports
Executive Summary: Unit 42 Cloud Threat Report Volume 6
Palo Alto Networks Unit 42 cloud threat researchers wanted to understand who targets cloud infrastructure, how they carry out those attacks, and what they target.
Research Reports
Unit 42 Cloud Threat Report Volume 6
In this edition of the Unit 42 Cloud Threat Report, Palo Alto Networks cloud threat researchers explore how overly permissive Identity and Access Management (IAM) policies open the door for Cloud Threat Actors to target an organization’s cloud infrastructure. Download the report for the latest insights concerning.
Article
What Is a Cloud VPN?
A cloud VPN (aka a virtual private network as a service or hosted VPN) is a new type of VPN technology that’s specifically designed for the cloud.
Article
What Is CIEM or Cloud Infrastructure and Entitlement Management?
Cloud Infrastructure and Entitlement Management (CIEM) is a relatively recent term that was introduced by Gartner in 2020 as part of the Hype Cycle for Cloud Security, 2020 research collection
Article
What Is Cloud Native Security?
Cloud native technologies have rendered traditional models of software development obsolete, doing away with monolithic application architecture
Article
What is IaC Security?
Infrastructure as code (IaC) presents an incredible opportunity to embed consistent and scalable cloud security coverage.
Article
What Is Web Application and API Protection?
Web application and API (Application Program Interfaces) protection is a set of development, integration, and deployment practices that reduces the exposure to known vulnerabilities and denial-of-service attacks.
Article
What's the Difference Between Agent-Based and Agentless Security?
In cybersecurity, agents represent specialized software components that are installed on devices for performing security-related "actions."
Article
Simplified Healthcare Compliance and Risk Management with Prisma Cloud
Reduce compliance costs, empower scale, and gain assurance you are protecting sensitive workloads by using the comprehensive HIPAA/HITRUST compliance controls offered by Prisma Cloud.
Article
What Is Least Privilege Access?
A basic best practice when configuring roles and permissions for any software environment is to apply least privilege access.
Article
Defining Organizational Cloud Security Responsibilities
To be effective, security and compliance teams must align with business goals and objectives, and they must not be a bottleneck to productivity.
Article
Why You Need Cloud Security
As organizations shift their data to the cloud, security can become an afterthought as many assume vendors are responsible for providing security.
Article
Four Ways to Improve Cloud Security and Compliance
The cloud requires a new way of approaching security. Take a look at the four ways you can improve cloud security and compliance.
Article
What Is a Container?
Starting with the advent of Docker in 2013, containers have become a fundamental building-block of modern IT infrastructure.
Article
Top 4 Cloud Security Concerns and How to Resolve Them
In cloud security, there are many issues that organizations are trying to sort through. Here are a few of the most prominent and how to address them.
Article
How to Assess Risk in the Cloud
Attackers always look for quick ways to steal data. Using advanced techniques, they can leave your traditional network defenses ineffective.
Article
Core Tenets of a Cloud Native Security Platform (CNSP)
CNSPs share context about infrastructure, PaaS services, users, data and application workloads across platform components to enhance protection
Article
How to Maintain AWS Compliance
Amazon Web Services (AWS) is certified in compliance such as ISO, and SOC 2. However, the way you store your data in AWS isn't always compliant.
Article
What Is Identity and Access Management (IAM)?
Identity and access management, or IAM, is a foundational component of virtually any modern application environment.
Article
What Is Infrastructure as a Service?
Infrastructure as a Service (IaaS), is the most impactful computing paradigm to emerge since the boom of the Internet.
Article
What is IaC?
Infrastructure as code (IaC) refers to the technology and processes used to manage and provision infrastructure with machine-readable languages (code) instead of manual operations.
Article
Cloud Native Security vs 3rd Party Security
Customers often ask if they should adopt the tools developed by the cloud platforms themselves, or if it’s better to invest in third-party offerings.
Article
17 Ways to Stay Secure When Deploying Cloud Environments
For enterprises that use the cloud, the key to being protected starts with understanding the layers that make up the components of their cloud stack
Article
3 Requirements to Safely Enable Microsoft Office 365
Safely enabling Microsoft Office 365 requires visibility, network control, and data risk inspection capabilities.
Article
What is SCA?
Software composition analysis (SCA) creates a bill of materials of open source packages in apps, including license compliance and securing vulnerabilities.
Article
What Is Cloud Native?
Cloud native describes an approach to designing, implementing and operating applications while taking advantage of the products offered by CSPs
Article
What is Cloud Security?
Cloud Security is composed of various technologies and tools designed to protect each aspect of the shared responsibility model.
Article
What Is Platform as a Service?
Platform as a service (PaaS) is a cloud computing service model that allows users to rent hardware and software tools over the internet to create software and applications.
Displaying 1 - 30 of 235