How to Pick a Winner in EDR

The endpoint security marketplace is crowded with vendors claiming to have superior capabilities. Cutting through all the marketing and sales pitches to understand how these products perform isn’t easy. Luckily, The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading endpoint detection and response (EDR) products against real-world attack sequences. We’ll break down MITRE’s methodology, the results, and what it all means for your organization as you assess your current and future endpoint security toolkit.

Executive summary: A more secure everywhere

The journey to the cloud is not a linear one, and organizations choose to migrate to the cloud in a multitude of ways and approaches. The resulting complexity is the enemy of security. In fact, according to ESG, “36% of organizations use between 24 to 49 different security products while 19% use more than 50 different products from an assortment of vendors.” All this noise only makes way for more security concerns such as integration issues, misconfigurations, and access control. To overcome this complexity and succeed in the cloud, organizations must demand security solutions that can quickly and effectively scale with changing business needs. Prisma by Palo Alto Networks is the industry’s most complete cloud security offering for today and tomorrow, providing unprecedented visibility into data, assets, and risks across the cloud and delivered with radical simplicity.

Date

By Type

By Industry

By Features

By Technology

By Services

By Audience

By Language

Displaying 21 to 30 of 94

Blogs

Let It Ride: The Sofacy Group’s DealersChoice Attacks Continue

Recently, Palo Alto Networks Unit 42 reported on a new exploitation platform that we called “DealersChoice” in use by the Sofacy group (AKA APT28, Fancy Bear, STRONTIUM, Pawn Storm, Sednit). As outlined in our original posting, the DealersChoice exploitation platform generates malicious RTF documents which in turn use embedded OLE Word documents. These embedded OLE Word documents then contain embedded Adobe Flash (.SWF) files that are designed to exploit Abode Flash vulnerabilities.

108
Datasheet

PA-220 Specsheet

Palo Alto Networks PA-220 brings next-generation firewall capabilities to distributed enterprise branch offices, retail locations and midsized businesses.

3720
Article

3 Ways to Get the Most Value out of Your Security Investments

This list details the three ways in which your efforts are becoming undone and how to get the most value out of your security investments.

111
Datasheet

VM-Series for VMware

Key features, performance capacities and specifications of VM-Series for VMware.

3121
Article

Expanding Data Centers: 3 Benefits of a Hybrid Cloud Approach

This brief discusses the three key benefits of using a hybrid cloud approach

132
White Paper

Security Framework Guide for Business Leaders

This white paper gives corporate leaders a practical framework for addressing the people, process and technology elements of the cybersecurity challenge.

899
Article

Preventing Ransomware: What Your Security Architecture Must Do

This checklist provides a step-by-step guide to implementing a true prevention-based platform that may help prevent you from falling victim to a ransomware attack.

111
Datasheet

Integrated URL Filtering Datasheet

URL Filtering with PAN-DB enables safe web access, protecting users from dangerous websites, malware sites, credential-phishing pages and attacks.

6513
Article

Ransomware: Common Attack Methods

This brief discusses the common attack methods for delivering ransomware to enable you to focus your security controls on the areas most likely to be leveraged and reduce the risk of infection.

121
Article

Minimizing Risk at the Board Level

This brief contains some key ideas that management need to do to minimize risk and approach security with a prevention mindset.

119

Displaying 21 to 30 of 94