As the next-generation security company, we are committed to maintaining trust in our digital age. We do this by safely enabling all applications and preventing successful cyber breaches for tens of thousands of organizations worldwide.


Datasheet

Palo Alto Networks Logging Service

Palo Alto Networks® Logging Service introduces a simpler approach, managing valuable security logs while enabling innovative security applications in concert with Palo Alto Networks Application Framework.

  • 174

Datasheet

PA-5200 Series Specsheet

Palo Alto Networks® PA-5200 Series of next-generation firewall appliances comprises the PA-5260, the PA-5250 and the PA-5220, which target high-speed data center, internet gateway and service provider deployments. The PA-5200 Series delivers up to 72 Gbps of throughput using dedicated processing and memory for the key functional areas of networking, security, threat prevention and management.

  • 4375

Datasheet

Firewall Feature Overview Datasheet

This datasheet provides a comprehensive overview of the critical PAN-OS features that power all next-generation firewalls from Palo Alto Networks.

  • 6505

Datasheet

PA-800 Series Specsheet

Palo Alto Networks PA-800 Series next-generation firewall appliances, comprising the PA-820 and PA-850, are designed to secure enterprise branch offices and midsized businesses.

  • 4374

Datasheet

PA-3200 Series

Palo Alto Networks® PA-3200 Series of next-generation firewalls comprises the PA-3260, PA-3250 and PA-3220, all of which are targeted at high-speed internet gateway deployments.

  • 3153

White Paper

Prisma Cloud Threat Protection

The dynamic nature of public cloud environments requires security operations teams to adapt and embrace a new approach to securing the cloud. Threat assessment and mitigation are significantly impacted due to ephemeral cloud environments, decentralized management models, and distributed data across multi-cloud deployments. Threat prevention for the cloud needs to be built around the principles of attack surface reduction through segmentation and prevention controls, advanced threat detection measures built around user, network and host activity monitoring and behavioral baselines, and rapid response through automated remediation.

  • 38