Palo Alto Networks Logging Service
Palo Alto Networks® Logging Service introduces a simpler approach, managing valuable security logs while enabling innovative security applications in concert with Palo Alto Networks Application Framework.
- Cloud Security (15)
- Threat Detection and Prevention (11)
- Security Operations (7)
- Public Cloud Security (7)
- Saas Security (5)
- Amazon Web Services (4)
- Network Security (4)
- Virtual Data Center (3)
- Network Security Management (3)
- Google Cloud (2)
- Zero Trust (2)
- Microsoft Azure (1)
- Mobile Security (1)
- Private Cloud Security (1)
- + Show More
By Product Category
With Prisma Public Cloud by Palo Alto Networks®, organizations can maintain compliance, govern security, and enable security operations across public cloud computing environments.
GlobalProtect extends the protection of the Palo Alto Networks Next-Generation Security Platform to your mobile workforce, no matter where they may go.
Zingbox IoT Guardian is an internet of things (IoT) security offering that automates the orchestration of the IoT lifecycle to provide security, management, and optimization of all assets. Zingbox IoT Guardian uses a unique, IoT personality-based approach to secure and manage IoT devices throughout their entire lifecycles, from discovery through retirement. It allows customers to automate threat detection and response for their IT and IoT infrastructures from a single system.
The Cortex XSOAR gives you an overview of Cortex XSOAR automation, case management, collaboration and threat intel management features, as well as support and deployment options.
Cortex™ XSOAR is a comprehensive security orchestration, automation and response (SOAR) platform that unifies case management, automation, real-time collaboration and threat intel management to serve security teams across the incident lifecycle.
How Medical Wearables, Kitchen Appliances and Fitness Equipment are Challenging Security Teams in India
Mumbai, India – September 16, 2020 – Medical wearables, kitchen appliances and fitness equipment and other connected devices are regularly connecting to corporate networks, prompting technology leaders to warn that significant action should be taken to protect them from being used to hack into businesses.