Search
  • Get support

  • Secure the Enterprise

  • Secure the Cloud

  • Secure the Future
  • More
  • Get support

Top 3 Security Considerations for the Cloud

  • Download

Feb 01, 2017 at 12:00 AM

Data centers are evolving to include a mix of static hardware and cloud computing technologies. However, cloud security is unlike data center security. While the threats remain the same, there are differences between how cloud-based computing technologies should be protected and securing traditional hardware-based data centers. This brief discusses the top three considerations for securing traditional and cloud-based data centers, as well as key requirements for cloud security.


White Paper

Simplify Zero Trust Implementation Using A Five-Step Methodology

Building Zero Trust networks is actually simpler than building legacy networks. This 5-step methodology makes deploying Zero Trust networks manageable, cost effective and non-disruptive.

September 23, 2019
  • 369

Be the first to know.

As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Company

  • Company
  • Tech Docs
  • Careers
  • Report a Vulnerability

Legal Notices

  • Privacy
  • Terms of Use
  • Documents
  • GDPR Readiness

Account

  • Manage a Subscription
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube

© 2020 Palo Alto Networks, Inc. All rights reserved.