Palo Alto Networks® PA-5200 Series of next-generation firewall appliances comprises the PA-5260, the PA-5250 and the PA-5220, which target high-speed data center, internet gateway and service provider deployments. The PA-5200 Series delivers up to 72 Gbps of throughput using dedicated processing and memory for the key functional areas of networking, security, threat prevention and management.
This datasheet provides a comprehensive overview of the critical PAN-OS features that power all next-generation firewalls from Palo Alto Networks.
This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.
Recently, Palo Alto Networks Unit 42 reported on a new exploitation platform that we called “DealersChoice” in use by the Sofacy group (AKA APT28, Fancy Bear, STRONTIUM, Pawn Storm, Sednit). As outlined in our original posting, the DealersChoice exploitation platform generates malicious RTF documents which in turn use embedded OLE Word documents. These embedded OLE Word documents then contain embedded Adobe Flash (.SWF) files that are designed to exploit Abode Flash vulnerabilities.
Palo Alto Networks PA-220 brings next-generation firewall capabilities to distributed enterprise branch offices, retail locations and midsized businesses.
Key features, performance capacities and specifications of the Palo Alto Networks PA-3000 Series.
Key features, performance capacities and specifications for our PA-7000 Series.
This brief discusses the common attack methods for delivering ransomware to enable you to focus your security controls on the areas most likely to be leveraged and reduce the risk of infection.
This white paper gives corporate leaders a practical framework for addressing the people, process and technology elements of the cybersecurity challenge.
Key features, performance capacities and specifications for all Palo Alto Networks firewalls.
Palo Alto Networks Advanced Endpoint Protection provides comprehensive exploit and malware prevention that can prevent attacks before malware can be successful.
This brief contains some key ideas that management need to do to minimize risk and approach security with a prevention mindset.