Network security log analysis is an important cybersecurity practice organizations perform to correlate potential threats and prevent successful cyber breaches. Managing logs from various security services, such as next-generation firewalls and cloud services, takes effort and resources. Palo Alto Networks® Logging Service introduces a simpler approach, managing valuable security logs while enabling innovative security applications in concert with Palo Alto Networks Application Framework.


How to Pick a Winner in EDR

The endpoint security marketplace is crowded with vendors claiming to have superior capabilities. Cutting through all the marketing and sales pitches to understand how these products perform isn’t easy. Luckily, The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading endpoint detection and response (EDR) products against real-world attack sequences. We’ll break down MITRE’s methodology, the results, and what it all means for your organization as you assess your current and future endpoint security toolkit.

  • 12

Expanding Data Centers: 3 Benefits of a Hybrid Cloud Approach

This brief discusses the three key benefits of using a hybrid cloud approach

  • 122

Security Operating Platform At A Glance

The Palo Alto Networks Security Operating Platform prevents successful cyberattacks through automation. Accurate analytics allow you to streamline routine tasks and focus on business priorities. Tight integration across the platform and with ecosystem partners delivers consistent security across cloud, network, mobile devices. Customers love our security, because it just works, consistently awarding us the highest loyalty rating in the industry. Download this At-a-Glance document to learn more.

  • 131

2016

  • 126

Decryption: Why, Where and How

Learn where, when and how to decrypt – everything from people, processes and tools to best practices – to prevent threats and secure your business.

  • 112

Stop Attackers from Using DNS Against You

Any modern organization requires the Domain Name System (DNS) to run its business, regardless of industry, location, size, or products. DNS is fundamental to every single modern organization, all over the world. It’s also a pervasive but easily overlooked attack surface, and bad actors are using this to their advantage.

  • 20