PA-220 Specsheet

Palo Alto Networks PA-220 brings next-generation firewall capabilities to distributed enterprise branch offices, retail locations and midsized businesses.

PA-5200 Series Specsheet

Palo Alto Networks® PA-5200 Series of next-generation firewall appliances comprises the PA-5260, the PA-5250 and the PA-5220, which target high-speed data center, internet gateway and service provider deployments. The PA-5200 Series delivers up to 72 Gbps of throughput using dedicated processing and memory for the key functional areas of networking, security, threat prevention and management.

Date

Displaying 1 to 10 of 81

Datasheet

GlobalProtect Cloud Service

Global expansion, mobile workforces and cloud computing are shifting the locations of your applications, data and users. These changes introduce new opportunities for business efficiencies, but they also create a set of unique cybersecurity challenges.

172
Datasheet

Aperture At A Glance

The use of SaaS (software as a service) applications is creating new risks and gaps in security visibility for malware propagation, data leakage and regulatory non-compliance. Aperture delivers complete visibility and granular enforcement across all user, folder and file activity within sanctioned SaaS applications, providing detailed analysis and analytics on usage without requiring any additional hardware, software or network changes.

3442
White Paper

Safely Enable Your SaaS Applications

See how the Next-Generation Security Platform has helped customers improve their security posture and reduce their total cost of ownership.

10
Datasheet

Traps Enterprise ELA

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. This document provides the customers of Palo Alto Networks with information needed to assess the impact of WildFire on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within WildFire and its associated components.

3455
Datasheet

URL Filtering At-A-Glance

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. This document provides the customers of Palo Alto Networks with information needed to assess the impact of WildFire on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within WildFire and its associated components.

3453
Datasheet

WildFire Privacy Datasheet

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. This document provides the customers of Palo Alto Networks with information needed to assess the impact of WildFire on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within WildFire and its associated components.

3462
White Paper

Global and Regional WildFire Clouds

WildFire® cloud-based threat analysis and AutoFocus™ contextual threat intelligence services are two of the powerful core components fueling Palo Alto Networks Next-Generation Security Platform to deliver better protection. Together, these cloud-delivered security services provide the industry’s most advanced analysis and prevention engine for highly evasive zero-day exploits and malware.

29
Article

Corporate Backgrounder

As the next-generation security company, we are committed to maintaining trust in our digital age.

178
White Paper

5 Critical Mistakes When Evaluating A Next-Gen Firewall

Avoid critical mistakes when implementing you Next Generation Firewall. Robust cybersecurity plans must account for sizing, performance, context, and scalability.

0
White Paper

3 Requirements for Secure Digital Transformation

As data breaches continue to disrupt business in the increasingly cloud-driven world, it’s clear the traditional approach to cybersecurity doesn’t cut it. Securing digital transformation without slowing down the business requires a new school of cybersecurity thought. An integrated approach – harnessing the agility of the cloud along with the power of automation and analytics – will simplify operations and bring about better security outcomes with less effort. This paper discusses the cybersecurity model of the future and the three key elements it provides to effectively secure your business.

70

Displaying 1 to 10 of 81