How to Pick a Winner in EDR

The endpoint security marketplace is crowded with vendors claiming to have superior capabilities. Cutting through all the marketing and sales pitches to understand how these products perform isn’t easy. Luckily, The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading endpoint detection and response (EDR) products against real-world attack sequences. We’ll break down MITRE’s methodology, the results, and what it all means for your organization as you assess your current and future endpoint security toolkit.

Stop Attackers from Using DNS Against You

Any modern organization requires the Domain Name System (DNS) to run its business, regardless of industry, location, size, or products. DNS is fundamental to every single modern organization, all over the world. It’s also a pervasive but easily overlooked attack surface, and bad actors are using this to their advantage.

Date

Displaying 11 to 20 of 95

Datasheet

Prisma Access At a Glance

Prisma Access delivers consistent protection from the cloud. Read the At a Glance to find out how.

0
In The News

Cyber Security Today: Security survey of Canadians, can Facebook hear you, Zoom video conferencing app warning

Security survey of Canadians, can Facebook hear you, Zoom video conferencing app warning

0
In The News

Canadians are confident with data protection but hope for better cybersecurity education: survey

Canadians are doing just fine with protecting their data and online privacy. However, many feel that a solid education for cybersecurity is needed, according to a recent survey.

0
Press Release

Survey: Canadians Confident in Protecting Their Data, But Feel Cybersecurity Education Is Lacking

A new online survey from Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, and YouGov reveals that two-thirds of Canadians (66%) apply the same management of security across all of their personal devices (e.g., PCs, laptops, smartphones, tablets), and more than half of respondents (56%) feel they’re doing all they can to prevent the loss of their information.

0
In The News

Cloud: Shared Responsibility Model, an interview with Coleman Mehta, Palo Alto Networks

Governments around the world are increasingly relying on cloud-based IT services to fulfill their technology needs, so it is therefore vital to ensure that policymakers account for the “shared responsibility” in the cloud.

0
In The News

Palo Alto Networks rebrands and upgrades cloud products within new Prisma suite

Prisma is basically a ‘Branding Plus’ exercise, where the big news is the rebranding of existing products into a new suite, but the products receive some enhancements – with more to come – to make them work more smoothly together.

0
White Paper

Cyber Threat Report: Reconnaissance 2.0

Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.

13
Datasheet

Cortex Data Lake

Enable AI-based innovations for cybersecurity

2
Datasheet

Cortex XDR

Hunt down and stop stealthy attacks by unifying network, endpoint, and cloud data

15160
Datasheet

Cortex Data Lake Privacy Data Sheet

The Palo Alto Networks® Cortex platform unleashes a consumption model based in software as a service, or SaaS, that allows customers to dynamically engage apps to solve a nearly boundless number of the most challenging security use cases with the best technology available.

0

Displaying 11 to 20 of 95