- Cloud Security (17)
- Public Cloud Security (9)
- Threat Detection and Prevention (7)
- Amazon Web Services (6)
- Security Operations (4)
- Saas Security (4)
- Google Cloud (3)
- Network Security (3)
- Virtual Data Center (2)
- Microsoft Azure (2)
- Network Security Management (2)
- Private Cloud Security (2)
- Zero Trust (2)
- Mobile Security (1)
- Security Operating Platform (1)
- + Show More
By Product Category
Education and Professional Services
Amazon® Web Services has been an advocate for strong cloud security since it launched in 2006. AWS® and its customers employ a shared responsibility model that distributes security roles between the provider and customer. As a public cloud vendor, AWS owns the infrastructure, physical network and hypervisor. The enterprise owns the workload operating system, apps, virtual network, access to their tenant environment/account and the data.
Securing the modern, hybrid data center requires a uniform approach across physical, virtualized, and cloud environments. The key is to gain granular visibility, control, and consistent threat protection in your hybrid data center without added complexity.
In The News
As business-driven digital transformation, including the move to cloud, continues apace, companies need to rethink their approach to how they deploy and consume security, or risk being left behind
As data breaches continue to disrupt business in the increasingly cloud-driven world, it’s clear the traditional approach to cybersecurity doesn’t cut it. Securing digital transformation without slowing down the business requires a new school of cybersecurity thought. An integrated approach – harnessing the agility of the cloud along with the power of automation and analytics – will simplify operations and bring about better security outcomes with less effort. This paper discusses the cybersecurity model of the future and the three key elements it provides to effectively secure your business.
In The News
In the face of increasing cyber breach risk as organisations move to hybrid multi-cloud IT environments, just over half of large firms in Europe are planning a zero-trust approach to security
Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. This document provides the customers of Palo Alto Networks with information needed to assess the impact of WildFire on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within WildFire and its associated components.
Accelerate your security operations’ maturity with our industry-leading MDR partners, powered by Cortex XDR™. Their expertise and resources relieve your day-to-day burden with 24/7 proactive alert management, threat hunting and incident response that spans network, endpoint and cloud. Our partners will get you up and running in weeks, not years, with SLAs that guarantee immediate reduction of MTTD and MTTR to under 60 minutes.
Palo Alto Networks Advanced Endpoint Protection represents a complete paradigm shift from identification to pure prevention. Providing comprehensive exploit and malware prevention that is not designed to identify; instead, it prevents an attack before the malware can be successful.