• GB
  • magnifying glass search icon to open search field
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • GB
    Language
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Intelligence
Prisma: Cloud Data Protection

Prisma enables automated discovery, classification, monitoring, and protection of data across cloud storage and SaaS applications, with automated remediations before leaks can occur.

See more
Best Practices - SaaS Security

Learn how Palo Alto Networks can help to secure SaaS applications so they don’t become a breeding ground for data leakage and malware.

See more

Date

  • Last week
  • Last 30 days
  • Last 6 months
  • Last year
By Type

By Type

  • White Paper (28)
By Topic

By Topic

  • Network Security (4)
  • Saas Security (3)
  • Threat Detection and Prevention (3)
  • Cloud Security (2)
  • Network Security Management (2)
  • Zero Trust (2)
  • Virtual Data Center (1)
  • Security Operations (1)
  • Private Cloud Security (1)
  • Security Operating Platform (1)
  • + Show More
By Industry

By Industry

  • Federal Government (1)
  • Healthcare (1)
  • Manufacturing (1)
By Product Category

By Product Category

By Features

By Features

By Technology

By Technology

By Services

By Services

By Audience

By Audience

By Language

By Language

  • English (27)

Displaying 1 to 28 of 28

  • 1(current)
White Paper

Applying Zero Trust to Cloud Environments

This whitepaper details how establishing a Zero Trust strategy will better protect your growing organization for the long-term.

White Paper

Three Use Cases for Securing a Hybrid Data Center

Securing the modern, hybrid data center requires a uniform approach across physical, virtualized, and cloud environments. The key is to gain granular visibility, control, and consistent threat protection in your hybrid data center without added complexity.

White Paper

Maximize the ROI of Detection and Response

Download this white paper to learn how to maximize the ROI and cut the cost of detection and response.

White Paper

Simplify Zero Trust Implementation Using A Five-Step Methodology

Building Zero Trust networks is actually simpler than building legacy networks. This 5-step methodology makes deploying Zero Trust networks manageable, cost effective and non-disruptive.

White Paper

Prisma Cloud Threat Protection

The dynamic nature of public cloud environments requires security operations teams to adapt and embrace a new approach to securing the cloud. Threat assessment and mitigation are significantly impacted due to ephemeral cloud environments, decentralized management models, and distributed data across multi-cloud deployments. Threat prevention for the cloud needs to be built around the principles of attack surface reduction through segmentation and prevention controls, advanced threat detection measures built around user, network and host activity monitoring and behavioral baselines, and rapid response through automated remediation.

White Paper

Prisma: Secure DevOps

DevOps driven software development approaches are pervasive among organizations embracing cloud. Unlike traditional software development approaches, DevOps helps organizations shorten the time to build and ship cloud applications. Introducing security early into the software development lifecycle along with continuous monitoring in production environments improves the overall security posture of cloud applications reduces business risk.

Datasheet

Prisma: Cloud Data Protection

Prisma enables automated discovery, classification, monitoring, and protection of data across cloud storage and SaaS applications, with automated remediations before leaks can occur.

White Paper

5 Critical Mistakes When Evaluating A Next-Generation Firewall

NGFW Mistakes, Buying Myths, NGFW Evaluation, How to choose NGFW, 5 Mistakes to Avoid

White Paper

13 Things Your Next Firewall Must Do

This paper outlines the 10 key things your next firewall must do to secure your network and your business.

White Paper

Prisma: Cloud Governance & Compliance

Prisma continuously monitors your distributed multi-cloud environments and SaaS applications, proactively alerting you of any misconfigurations or compliance violations and even automates remediation so you can embrace the cloud with confidence.

White Paper

Stop Attackers from Using DNS Against You

Any modern organization requires the Domain Name System (DNS) to run its business, regardless of industry, location, size, or products. DNS is fundamental to every single modern organization, all over the world. It’s also a pervasive but easily overlooked attack surface, and bad actors are using this to their advantage.

White Paper

SECURING SD-WAN WITH THE SECURITY OPERATING PLATFORM

Palo Alto Networks delivers security to protect SD-WAN environments. GlobalProtect™ cloud service provides a unique, cloud-based environment that adapts to the dynamics of SD- WAN to stop threats and enable access to internal and cloud-based applications.

White Paper

Executive Overview: The Next Evolution in Cloud Security

The current landscape of networking and security overlay products are creating administrative problems with cost and complexity, and falling short on the protections that organizations need. Learn about how Palo Alto Networks is changing the game with GlobalProtect Cloud Service and Aperture.

White Paper

3 Requirements for Secure Digital Transformation

As data breaches continue to disrupt business in the increasingly cloud-driven world, it’s clear the traditional approach to cybersecurity doesn’t cut it. Securing digital transformation without slowing down the business requires a new school of cybersecurity thought. An integrated approach – harnessing the agility of the cloud along with the power of automation and analytics – will simplify operations and bring about better security outcomes with less effort. This paper discusses the cybersecurity model of the future and the three key elements it provides to effectively secure your business.

White Paper

Decryption: Why, Where and How

Learn where, when and how to decrypt – everything from people, processes and tools to best practices – to prevent threats and secure your business.

White Paper

Cyber Threat Report: Reconnaissance 2.0

Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.

White Paper

Combine Network and Endpoint Security for Better Visibility, Protection, and Enforcement

This paper examines the changing threat landscape and highlights the importance of best-in-class endpoint protection working in lockstep with other security products to create coordinated and comprehensive enterprise security. Palo Alto Networks Traps advanced endpoint protection provides superior endpoint threat prevention as well as bridges the gap between endpoint security and network security, augmenting next-generation firewalls to provide stronger defense with fewer resources.

Article

Evident at Work: Continuous Security & Compliance in the Cloud

Evident from Palo Alto Networks® works with InfoSec and DevOps professionals of all levels, across every industry, to make cloud infrastructure security and compliance easier. Every organization struggles with the challenges of cloud security, such as threat detection, misconfiguration management, risk remediation and compliance with industry standards. Read this report to hear how 13 organizations are managing their cloud security.

White Paper

10 Things to Test In Your Future NGFW

This paper discusses ten points to consider and actively test in your current security i nfrastructure and your future NGFW. Using these as guidelines for cross-functional conversations, you will expand the lens through which you can view your NGFW in order to determine if your potential security investments are easy to implement, alleviate workloads, and offer your organization the best protection and value, today and in the future.

Article

12 Best Practices to Make Your AWS Configuration More Secure

Amazon® Web Services has been an advocate for strong cloud security since it launched in 2006. AWS® and its customers employ a shared responsibility model that distributes security roles between the provider and customer. As a public cloud vendor, AWS owns the infrastructure, physical network and hypervisor. The enterprise owns the workload operating system, apps, virtual network, access to their tenant environment/account and the data.

White Paper

Guide to Securing Microsoft Office 365 for the Enterprise

This paper describes how the Palo Alto Networks Security Operating platform secures your data in Microsoft Office 365 and other cloud applications.

Article

Smart manufacturing needs smart security

Protect against Industry 4.0 attacks with integration and automation. From cookies to cars, the manufacturing industry employs innovative technology to produce quality goods efficiently and get them to customers quickly. With the explosion of internet-connected devices and people who access them, cybersecurity is a higher priority than ever.

Article

EU WildFire Cloud

Palo Alto Networks® is ushering in the future of security innovation, reinventing how customers rapidly access, evaluate and adopt the most compelling new security technologies as an extension of the Next-Generation Security Platform they already own and operate. The all-new application framework is a culmination of over a decade of security disruption, providing customers with superior security through compelling cloud-based apps developed by Palo Alto Networks and today’s most innovative security providers, large and small.

Article

Palo Alto Networks Application Framework

Palo Alto Networks® is ushering in the future of security innovation, reinventing how customers rapidly access, evaluate and adopt the most compelling new security technologies as an extension of the Next-Generation Security Platform they already own and operate. The all-new application framework is a culmination of over a decade of security disruption, providing customers with superior security through compelling cloud-based apps developed by Palo Alto Networks and today’s most innovative security providers, large and small.

White Paper

The Value of the Next-Generation Security Platform

See how the Next-Generation Security Platform has helped customers improve their security posture and reduce their total cost of ownership.

White Paper

Top Recommendations to Prevent Ransomware

Read this whitepaper for specific recommendations to prevent ransomware in large organizations.

White Paper

Best Practices - SaaS Security

Learn how Palo Alto Networks can help to secure SaaS applications so they don’t become a breeding ground for data leakage and malware.

White Paper

Best Practices - Data Center Security

The volume and sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. Palo Alto Networks® Next-Generation Security Platform – including hardware-based appliances and virtual appliances – enables you to implement an effective Zero Trust security model, protecting your data center assets.

Displaying 1 to 28 of 28

  • 1(current)

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Access Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language