Resource Center

Our library of online content is here to help you learn more—no matter what format you prefer or which topic interests you most.

Explore resources

CLEAR

Filters

    Results
    Displaying 151–168 of 7218 Results
    Customer Case Study

    An agricultural business gains insight into its attack surface risk with a Unit 42 Attack Surface Assessment

    Read the customer story
    Customer Case Study

    Defense contractor contains APT with Unit 42 Incident Response expertise

    Read the customer story
    Customer Case Study

    Multinational organization enhances defenses by stress testing its cybersecurity program

    Read the customer story
    Customer Case Study

    An international retailer relies on Unit 42 to identify its Log4j exposure and risk

    Read the customer story
    Customer Case Study

    Restoring a software and services provider’s cloud environment after a breach

    Read the customer story
    Customer Case Study

    Gaming company centralizes security management, gains real-time visibility into multicloud infrastructure

    Read the customer story
    Customer Case Study

    Protecting patients during the pandemic by securing the Internet of Medical Things

    Read the customer story
    Customer Case Study

    Rebuilding a healthcare provider’s environment after a ransomware attack

    Read the customer story
    Customer Case Study

    Helping a healthcare leader recover from a malware attack

    Read the customer story
    Customer Case Study

    Accelerating security in a fast-paced industry

    Read the customer story
    Customer Case Study

    With Prisma Cloud, a leading finance and insurance company in Asia sees 99.52% compliance

    Read the customer story
    Customer Case Study

    Enabling a global workforce with cloud-driven security

    Read the customer story
    Podcast

    Threat Vector | The Role of Threat-Hunting in Cybersecurity

    Listen to the podcast
    Podcast

    Threat Vector | Beyond the Breach: Strategies Against Ivanti Vulnerabilities

    Listen to the podcast
    asset pdf thumbnail
    rc.type.referenceArchitecture

    Securing Applications with Cloud NGFW for Azure—Virtual Network Design: Deployment Guide

    Read the story
    asset pdf thumbnail
    rc.type.referenceArchitecture

    Securing Applications with Cloud NGFW for Azure—Virtual WAN Design: Deployment Guide

    Read the story
    Event

    Protecting Data and AI in 2024: What CISOs Need to Know

    Protecting Data and AI in 2024: What CISOs Need to Know