By Topic
By Industry
By Type
By Product Category
Education and Professional Services
Displaying 1 - 30 of 251
Book
SASE for Dummies 2nd Special Edition
This Dummies book dives into the core capabilities and benefits of a secure access service edge (SASE) solution.
Book
Optimizing your business for a SASE transformation
Since it’s introduction as a concept in 2019, SASE has become a popular means of securely connecting hybrid workforces with the services they need.
Book
Accelerating Digital Transformation with SASE
In recent years, organizations have embraced new infrastructure and services to meet their rapidly changing needs. This has caused a dramatic increase in network complexity, limiting visibility, increasing security risks and making the network harder to manage.
Video
SASE-Native Digital Experience Monitoring
Watch this video to find out why SASE-native digital experience monitoring can help you deliver an exceptional user experience within the hybrid workplace.
Article
Protecting Data with a SASE Solution
Companies collect and process massive amounts of information, ranging from confidential business data to sensitive intellectual property
Article
SD-WAN and SASE: How Do They Relate?
Many companies use SD-WAN to securely connect branch offices to their corporate networks instead of relying on traditional MPLS connections
Article
Secure Access Service Edge (SASE) Key Requirements
A secure access service edge (SASE) brings together networking and network security services in a single cloud-based platform
Article
How Zero Trust and SASE Can Work Together
By combining SASE and Zero Trust principles, companies can achieve ZTNA with a single solution to apply security policies across their network.
Article
What Is SASE?
Secure access service edge, or SASE (pronounced “sassy”), is an emerging cybersecurity concept. It is the convergence of wide area networking.
Video
ZK Research interview with Palo Alto Networks: WFH Network Security
Kumar Ramachandran, Palo Alto SVP of Products for SASE, sits down with Zeus Kerravala of ZK Research to discuss the emerging need for enterprise security for the home office.
Guide
5 Misconceptions About Home Network Security
This guide helps identify and correct the five biggest misconceptions about home network security. Being aware of security gaps can be critical to reducing the attack surface and mitigating risk.
Datasheet
CloudBlades At a Glance
The Prisma SD-WAN CloudBlades platform enables customers to reimagine their IT infrastructure by allowing them providing business agility to deliver branch services at speed and scale.
Datasheet
Top Differentiators between Next-Generation and Legacy SD-WANs
For those organizations feeling “stuck” with legacy SD-WAN solutions that were not architectured for today’s complex environment, a next-generation SD-WAN offers an easy path of migration
Datasheet
Prisma SD-WAN Instant-On Network Device Specifications
The Prisma SD-WAN Instant-On Network (ION) models of hardware and software devices enable integration of a diverse set of WAN connection types, the cloud-delivered branch, improved application performance and visibility, and reduces overall cost and complexity of your WAN.
Datasheet
Palo Alto Networks Prisma SD-WAN At-a-Glance
Enable the secure cloud-delivered branch with the industry’s first next-generation SD-WAN.
Datasheet
Okyo Garde Enterprise Edition
This datasheet provides an overview of Okyo Garde Enterprise Edition, market drivers, high-level architecture, and hardware and software specifications.
Article
What Is Web Application and API Protection?
Web application and API (Application Program Interfaces) protection is a set of development, integration, and deployment practices that reduces the exposure to known vulnerabilities and denial-of-service attacks.
Article
What Is Least Privilege Access?
A basic best practice when configuring roles and permissions for any software environment is to apply least privilege access.
Article
What Is a Container?
Starting with the advent of Docker in 2013, containers have become a fundamental building-block of modern IT infrastructure.
Article
What Is SD-Branch | Centralized Security for Branch Office Networks
SD-Branch provides software-defined solutions to branch offices, proving centralized
security for branch office networks.
Article
Top 5 Requirements for Securing Your Branch Offices
Securing your branch office is crucial to protect your organization’s data and employees as well as ensure your organization does not suffer a breach.
Article
How Does SD-WAN Automation Simplify Network Operations?
Integrating your SD-WAN with powerful DevOps frameworks delivers agility, repeatability, accuracy and automation, thereby simplifying operations.
Article
What is the cloud-delivered branch?
Simplify the connectivity and protection of branch offices with a cloud solution.
Article
Cloud Access Security Brokers: A Key Capability of a Secure Access Service Edge Solution
Cloud access security brokers deliver security policy controls for SaaS applications, providing a means to enforce data protection policies
Article
What Is Next-Generation SD-WAN?
As the industry moves from MPLS to SD-WAN and beyond, learn the risks of legacy SD-WAN and the need for next-generation SD-WAN.
Resource
Secure Remote Access | Protect Remote Employees from Cyberthreats
Secure remote access allows remote employees to access internal networks from offsite locations. Learn about what it is and its role in securing remote workers.
Article
What is AIOps
AIOps is short for artificial intelligence to IT operations, that aims to simplify and accelerate IT operations management.
Article
Why Machine Learning (ML) and Artificial Intelligence (AI) Are Key Technologies for SD-WAN
SD-WAN that includes machine learning and artificial intelligence amplifies network visibility and simplifies both network troubleshooting and operations.
Article
What Is the CI/CD Pipeline and CI/CD Security?
The CI/CD pipeline is a foundational part of DevOps.
Displaying 1 - 30 of 251