Search
  1. Home
Location
Products Resources Partners Company
Location

Ransomware: Common Attack Methods

  • Download

Feb 01, 2017 at 12:00 AM

In order to better prevent ransomware, it is critical to understand the tactics attackers use to deliver this threat. This brief discusses the common attack methods for delivering ransomware to enable you to focus your security controls on the areas most likely to be leveraged and reduce the risk of infection.


Datasheet

Prisma Public Cloud at a Glance

With Prisma Public Cloud by Palo Alto Networks®, organizations can maintain compliance, govern security, and enable security operations across public cloud computing environments.

January 9, 2020
  • 13

White Paper

Cyber Threat Report: Reconnaissance 2.0

Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.

May 17, 2019
  • 26

Datasheet

Managed Detection and Response

Accelerate your security operations’ maturity with our industry-leading MDR partners, powered by Cortex XDR™. Their expertise and resources relieve your day-to-day burden with 24/7 proactive alert management, threat hunting and incident response that spans network, endpoint and cloud. Our partners will get you up and running in weeks, not years, with SLAs that guarantee immediate reduction of MTTD and MTTR to under 60 minutes.

January 3, 2020
  • 1250

Datasheet

URL Filtering At-A-Glance

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. This document provides the customers of Palo Alto Networks with information needed to assess the impact of WildFire on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within WildFire and its associated components.

January 31, 2019
  • 3484

Datasheet

Traps Enterprise ELA

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. This document provides the customers of Palo Alto Networks with information needed to assess the impact of WildFire on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within WildFire and its associated components.

February 1, 2019
  • 3496

Article

3 Ways to Get the Most Value out of Your Security Investments

This list details the three ways in which your efforts are becoming undone and how to get the most value out of your security investments.

February 1, 2017
  • 112

Want to be first to know?

Subscribe to Palo Alto Networks

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Company

  • Company
  • Tech Docs
  • Careers
  • Report a Vulnerability

Legal Notices

  • Privacy
  • Terms of Use
  • Documents
  • GDPR Readiness

Account

  • Manage a Subscription

© 2020 Palo Alto Networks, Inc. All rights reserved.