
Product Summary Specsheet
Key features, performance capacities and specifications for all Palo Alto Networks firewalls.
PA-5200 Series Specsheet
Palo Alto Networks® PA-5200 Series of next-generation firewall appliances comprises the PA-5260, the PA-5250 and the PA-5220, which target high-speed data center, internet gateway and service provider deployments. The PA-5200 Series delivers up to 72 Gbps of throughput using dedicated processing and memory for the key functional areas of networking, security, threat prevention and management.
By Topic
By Product Category
Education and Professional Services
Datasheet
PA-3000 Series Specsheet
Key features, performance capacities and specifications of the Palo Alto Networks PA-3000 Series.
Datasheet
Traps: Advanced Endpoint Protection
Palo Alto Networks Advanced Endpoint Protection provides comprehensive exploit and malware prevention that can prevent attacks before malware can be successful.
Datasheet
Product Summary Specsheet
Key features, performance capacities and specifications for all Palo Alto Networks firewalls.
Datasheet
VM-Series for VMware
Key features, performance capacities and specifications of VM-Series for VMware.
Datasheet
Integrated URL Filtering Datasheet
URL Filtering with PAN-DB enables safe web access, protecting users from dangerous websites, malware sites, credential-phishing pages and attacks.
Article
Minimizing Risk at the Board Level
This brief contains some key ideas that management need to do to minimize risk and approach security with a prevention mindset.
Datasheet
PA-800 Series Specsheet
Palo Alto Networks PA-800 Series next-generation firewall appliances, comprising the PA-820 and PA-850, are designed to secure enterprise branch offices and midsized businesses.
Datasheet
PA-5200 Series Specsheet
Palo Alto Networks® PA-5200 Series of next-generation firewall appliances comprises the PA-5260, the PA-5250 and the PA-5220, which target high-speed data center, internet gateway and service provider deployments. The PA-5200 Series delivers up to 72 Gbps of throughput using dedicated processing and memory for the key functional areas of networking, security, threat prevention and management.
Article
3 Ways to Get the Most Value out of Your Security Investments
This list details the three ways in which your efforts are becoming undone and how to get the most value out of your security investments.
Article
Ransomware: Common Attack Methods
This brief discusses the common attack methods for delivering ransomware to enable you to focus your security controls on the areas most likely to be leveraged and reduce the risk of infection.