Palo Alto Networks Logging Service
Palo Alto Networks® Logging Service introduces a simpler approach, managing valuable security logs while enabling innovative security applications in concert with Palo Alto Networks Application Framework.
- Cloud Security (15)
- Threat Detection and Prevention (11)
- Security Operations (7)
- Public Cloud Security (7)
- Saas Security (5)
- Amazon Web Services (4)
- Network Security (4)
- Virtual Data Center (3)
- Network Security Management (3)
- Google Cloud (2)
- Zero Trust (2)
- Microsoft Azure (1)
- Mobile Security (1)
- Private Cloud Security (1)
- + Show More
By Product Category
Recently, Palo Alto Networks Unit 42 reported on a new exploitation platform that we called “DealersChoice” in use by the Sofacy group (AKA APT28, Fancy Bear, STRONTIUM, Pawn Storm, Sednit). As outlined in our original posting, the DealersChoice exploitation platform generates malicious RTF documents which in turn use embedded OLE Word documents. These embedded OLE Word documents then contain embedded Adobe Flash (.SWF) files that are designed to exploit Abode Flash vulnerabilities.
This checklist provides a step-by-step guide to implementing a true prevention-based platform that may help prevent you from falling victim to a ransomware attack.
Palo Alto Networks® PA-5200 Series of next-generation firewall appliances comprises the PA-5260, the PA-5250 and the PA-5220, which target high-speed data center, internet gateway and service provider deployments. The PA-5200 Series delivers up to 72 Gbps of throughput using dedicated processing and memory for the key functional areas of networking, security, threat prevention and management.
This white paper gives corporate leaders a practical framework for addressing the people, process and technology elements of the cybersecurity challenge.
This brief discusses the common attack methods for delivering ransomware to enable you to focus your security controls on the areas most likely to be leveraged and reduce the risk of infection.
This list details the three ways in which your efforts are becoming undone and how to get the most value out of your security investments.