Protect Against Russia-Ukraine Cyber Activity
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Network Security
  • Secure Access Service Edge
  • Cloud-Native Security
  • Security Operations
  • Threat Intel & Consulting
  • More
  • GB
    Language
  • Contact Us
  • Resources
  • Get support
  • Get Started
Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.

See more
PA-5200 Series Specsheet

Palo Alto Networks® PA-5200 Series of next-generation firewall appliances comprises the PA-5260, the PA-5250 and the PA-5220, which target high-speed data center, internet gateway and service provider deployments. The PA-5200 Series delivers up to 72 Gbps of throughput using dedicated processing and memory for the key functional areas of networking, security, threat prevention and management.

See more

Date

  • Last week
  • Last 30 days
  • Last 6 months
  • Last year
By Topic

By Topic

  • Cloud Security (22)
  • Threat Detection and Prevention (17)
  • Network Security (10)
  • Security Operations (9)
  • Public Cloud Security (9)
  • Amazon Web Services (7)
  • Network Security Management (5)
  • Saas Security (5)
  • Virtual Data Center (4)
  • Security Operating Platform (4)
  • Google Cloud (3)
  • Private Cloud Security (3)
  • Microsoft Azure (2)
  • Zero Trust (2)
  • Mobile Security (1)
  • + Show More
By Industry

By Industry

  • Healthcare (3)
  • Federal Government (2)
  • Financial Services (1)
  • Manufacturing (1)
By Type

By Type

  • In The News (40)
  • White Paper (39)
  • Datasheet (36)
  • Blog (10)
  • Article (7)
  • Book (6)
  • Webinar (5)
  • Guide (4)
  • Video (4)
  • Press Release (2)
  • Research Reports (1)
  • + Show More
By Product Category

By Product Category

  • NGFW (20)
  • Prisma Cloud (11)
  • Cortex XDR (10)
  • SaaS Security (9)
  • VM-Series (6)
  • Prisma Access (5)
  • Cortex (4)
  • WildFire (4)
  • GlobalProtect (3)
  • Threat Intel Management (2)
  • Cortex XSOAR (2)
  • DNS Security service (2)
  • Panorama (2)
  • Threat Prevention (2)
  • PAN-OS 10.0 (1)
  • Prisma SD-WAN (1)
  • URL Filtering (1)
  • + Show More
Education and Professional Services

Education and Professional Services

Displaying 131 to 140 of 162

  • 1
  • 2
  • …
  • 13
  • 14(current)
  • 15
  • 16
  • 17
Datasheet

PA-3000 Series Specsheet

Key features, performance capacities and specifications of the Palo Alto Networks PA-3000 Series.

Datasheet

Traps: Advanced Endpoint Protection

Palo Alto Networks Advanced Endpoint Protection provides comprehensive exploit and malware prevention that can prevent attacks before malware can be successful.

Datasheet

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.

Datasheet

VM-Series for VMware

Key features, performance capacities and specifications of VM-Series for VMware.

Datasheet

Integrated URL Filtering Datasheet

URL Filtering with PAN-DB enables safe web access, protecting users from dangerous websites, malware sites, credential-phishing pages and attacks.

Article

Minimizing Risk at the Board Level

This brief contains some key ideas that management need to do to minimize risk and approach security with a prevention mindset.

Datasheet

PA-800 Series Specsheet

Palo Alto Networks PA-800 Series next-generation firewall appliances, comprising the PA-820 and PA-850, are designed to secure enterprise branch offices and midsized businesses.

Datasheet

PA-5200 Series Specsheet

Palo Alto Networks® PA-5200 Series of next-generation firewall appliances comprises the PA-5260, the PA-5250 and the PA-5220, which target high-speed data center, internet gateway and service provider deployments. The PA-5200 Series delivers up to 72 Gbps of throughput using dedicated processing and memory for the key functional areas of networking, security, threat prevention and management.

Article

3 Ways to Get the Most Value out of Your Security Investments

This list details the three ways in which your efforts are becoming undone and how to get the most value out of your security investments.

Article

Ransomware: Common Attack Methods

This brief discusses the common attack methods for delivering ransomware to enable you to focus your security controls on the areas most likely to be leveraged and reduce the risk of infection.

Displaying 131 to 140 of 162

  • 1
  • 2
  • …
  • 13
  • 14(current)
  • 15
  • 16
  • 17

Be the first to know.

As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube

Copyright © 2022 Palo Alto Networks. All rights reserved