As the next-generation security company, we are committed to maintaining trust in our digital age. We do this by safely enabling all applications and preventing successful cyber breaches for tens of thousands of organizations worldwide.


White Paper

How to Pick a Winner in EDR

The endpoint security marketplace is crowded with vendors claiming to have superior capabilities. Cutting through all the marketing and sales pitches to understand how these products perform isn’t easy. Luckily, The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading endpoint detection and response (EDR) products against real-world attack sequences. We’ll break down MITRE’s methodology, the results, and what it all means for your organization as you assess your current and future endpoint security toolkit.

  • 95

White Paper

Security for Cloud-Native Architectures

Read our new e-book to take a deep dive into various cloud-native architectures and CI/CD workflows, how they affect your security posture, and how the latest cloud security tools – including containers – can dramatically boost your protection.

  • 58

White Paper

Cloudy with a Chance of Entropy

This Unit 42 report highlights key learnings from public cloud security incidents and presents original research from the cloud-focused division of the Unit 42 threat research team.

  • 53

White Paper

Three Use Cases for Securing a Hybrid Data Center

Securing the modern, hybrid data center requires a uniform approach across physical, virtualized, and cloud environments. The key is to gain granular visibility, control, and consistent threat protection in your hybrid data center without added complexity.

  • 50

Datasheet

Traps Technical Overview

Palo Alto Networks® Traps™ advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks. Traps minimizes endpoint infections by blocking malware, exploits and ransomware. Integration with your security platform delivers additional threat analysis, shared intelligence and automated containment.

  • 153

White Paper

Stop Attackers from Using DNS Against You

Any modern organization requires the Domain Name System (DNS) to run its business, regardless of industry, location, size, or products. DNS is fundamental to every single modern organization, all over the world. It’s also a pervasive but easily overlooked attack surface, and bad actors are using this to their advantage.

  • 54