PA-5200 Series Specsheet

Palo Alto Networks® PA-5200 Series of next-generation firewall appliances comprises the PA-5260, the PA-5250 and the PA-5220, which target high-speed data center, internet gateway and service provider deployments. The PA-5200 Series delivers up to 72 Gbps of throughput using dedicated processing and memory for the key functional areas of networking, security, threat prevention and management.

Palo Alto Networks Logging Service

Palo Alto Networks® Logging Service introduces a simpler approach, managing valuable security logs while enabling innovative security applications in concert with Palo Alto Networks Application Framework.

Date

By Type

By Industry

By Features

By Technology

By Services

By Audience

By Language

Displaying 61 to 70 of 96

Datasheet

Traps Enterprise ELA

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. This document provides the customers of Palo Alto Networks with information needed to assess the impact of WildFire on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within WildFire and its associated components.

3495
White Paper

Safely Enable Your SaaS Applications

See how the Next-Generation Security Platform has helped customers improve their security posture and reduce their total cost of ownership.

55
Datasheet

DNS Security Service

Apply predictive analytics to disrupt attacks that use DNS for command and control or data theft

3471
White Paper

SECURING SD-WAN WITH THE SECURITY OPERATING PLATFORM

Palo Alto Networks delivers security to protect SD-WAN environments. GlobalProtect™ cloud service provides a unique, cloud-based environment that adapts to the dynamics of SD- WAN to stop threats and enable access to internal and cloud-based applications.

15
White Paper

Stop Attackers from Using DNS Against You

Any modern organization requires the Domain Name System (DNS) to run its business, regardless of industry, location, size, or products. DNS is fundamental to every single modern organization, all over the world. It’s also a pervasive but easily overlooked attack surface, and bad actors are using this to their advantage.

24
Datasheet

Cortex Data Lake

Enable AI-based innovations for cybersecurity

10
White Paper

Cyber Threat Report: Reconnaissance 2.0

Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.

23
Datasheet

Prisma SaaS: At a Glance

The use of SaaS (software as a service) applications is creating new risks and gaps in security visibility for malware propagation, data leakage and regulatory non-compliance. Aperture delivers complete visibility and granular enforcement across all user, folder and file activity within sanctioned SaaS applications, providing detailed analysis and analytics on usage without requiring any additional hardware, software or network changes.

3435
Datasheet

Prisma Public Cloud for Amazon Web Services

More information and context lead to better security decision-making. Prisma™ Public Cloud (formerly RedLock) for AWS® dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources, including user activity, resource configurations, network traffic, threat intelligence and vulnerability feeds, to provide a complete view of public cloud risk. Through a new machine learning-driven approach, Prisma enables organizations to fulfill their obligations in the Shared Responsibility Model.

0
Datasheet

Prisma Public Cloud for GCP

Prisma Public Cloud for Google Cloud dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.

0

Displaying 61 to 70 of 96