How to Pick a Winner in EDR

The endpoint security marketplace is crowded with vendors claiming to have superior capabilities. Cutting through all the marketing and sales pitches to understand how these products perform isn’t easy. Luckily, The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading endpoint detection and response (EDR) products against real-world attack sequences. We’ll break down MITRE’s methodology, the results, and what it all means for your organization as you assess your current and future endpoint security toolkit.

Security for Cloud-Native Architectures

Read our new e-book to take a deep dive into various cloud-native architectures and CI/CD workflows, how they affect your security posture, and how the latest cloud security tools – including containers – can dramatically boost your protection.

Date

Displaying 1 to 10 of 114

In The News

Palo Alto Networks’ XSOAR redo more than a rebrand

Demisto is now Cortex XSOAR, but the big news around the evolution of the platform is the addition of threat intelligence capabilities.

0
In The News

Cyber Security Today – Security conference offers advice, healthcare industry warning and macro phishing alert

Every year around this time a security company called RSA holds a huge week-long conference in San Francisco where over a hundred presenters tell terrible stories of hacks and what companies and governments should have done to prevent them. This week’s conference is no different.

0
In The News

Palo Alto Networks gears up for next stage of partner services expansion

After having started a major revamp of its partner program a year ago, Palo Alto Networks is now in the final stages of development of a comprehensive model for expanding partner services capabilities further.

0
In The News

Cyber Security Today – Three email password scams to watch out for

According to security vendor Malwarebytes, Playstation subscribers are getting fake messages on the platform from the developers of the game Elder Scrolls threatening to kick them off the game.

0
Datasheet

Zingbox datasheet

Zingbox IoT Guardian is an internet of things (IoT) security offering that automates the orchestration of the IoT lifecycle to provide security, management, and optimization of all assets. Zingbox IoT Guardian uses a unique, IoT personality-based approach to secure and manage IoT devices throughout their entire lifecycles, from discovery through retirement. It allows customers to automate threat detection and response for their IT and IoT infrastructures from a single system.

0
Datasheet

GlobalProtect Datasheet

GlobalProtect extends the protection of the Palo Alto Networks Next-Generation Security Platform to your mobile workforce, no matter where they may go.

14787
References and Case Studies

St. Lawrence College

St. Lawrence College Uses Threat Intelligence and Automation to Secure Resources Across Network, Endpoint, and Cloud Environments

0
Datasheet

Cortex XDR

Hunt down and stop stealthy attacks by unifying network, endpoint, and cloud data

15161
Datasheet

Prisma Public Cloud at a Glance

With Prisma Public Cloud by Palo Alto Networks®, organizations can maintain compliance, govern security, and enable security operations across public cloud computing environments.

0
Datasheet

At a Glance: Prisma Cloud Compute Edition

Read the at a glance document to find out how.

0

Displaying 1 to 10 of 114