How to Pick a Winner in EDR

The endpoint security marketplace is crowded with vendors claiming to have superior capabilities. Cutting through all the marketing and sales pitches to understand how these products perform isn’t easy. Luckily, The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading endpoint detection and response (EDR) products against real-world attack sequences. We’ll break down MITRE’s methodology, the results, and what it all means for your organization as you assess your current and future endpoint security toolkit.

Stop Attackers from Using DNS Against You

Any modern organization requires the Domain Name System (DNS) to run its business, regardless of industry, location, size, or products. DNS is fundamental to every single modern organization, all over the world. It’s also a pervasive but easily overlooked attack surface, and bad actors are using this to their advantage.

Date

Displaying 41 to 50 of 95

In The News

2019 Cloud Security Predictions

Enterprises have been enjoying the flexibility and torrent of innovation that public cloud platforms have provided over the years. However, adopting public cloud services can also magnify security risks and compliance challenges if not carefully planned for in advance. Here are some cloud security trends I’ve observed over the last year and predictions I have for 2019.

0
In The News

Palo Alto Networks gets to the ‘root’ of cloud security problems in new report

Moving to the cloud has pretty much become an imperative for organizations of all sizes, yet the elephant in the room is cloud security. While in many ways the cloud is more secure than on-premises environments, recent headlines about cloud data exposure underline the fact that companies still don’t entirely understand the differences between securing a legacy environment and protecting a cloud.

0
In The News

Palo Alto Networks expands Google partnership to leverage Google Cloud AI capabilities

As part of the enhanced relationship with Google, Palo Alto Networks will now run their Application Framework and GlobalProtect cloud service in the Google Cloud, as they believe its analytics capabilities are the best fit for these applications.

0
White Paper

5 Critical Mistakes When Evaluating A Next-Gen Firewall

Avoid critical mistakes when implementing you Next Generation Firewall. Robust cybersecurity plans must account for sizing, performance, context, and scalability.

10
White Paper

3 Requirements for Secure Digital Transformation

As data breaches continue to disrupt business in the increasingly cloud-driven world, it’s clear the traditional approach to cybersecurity doesn’t cut it. Securing digital transformation without slowing down the business requires a new school of cybersecurity thought. An integrated approach – harnessing the agility of the cloud along with the power of automation and analytics – will simplify operations and bring about better security outcomes with less effort. This paper discusses the cybersecurity model of the future and the three key elements it provides to effectively secure your business.

95
White Paper

Decryption: Why, Where and How

Learn where, when and how to decrypt – everything from people, processes and tools to best practices – to prevent threats and secure your business.

121
Datasheet

Traps Technical Overview

Palo Alto Networks® Traps™ advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks. Traps minimizes endpoint infections by blocking malware, exploits and ransomware. Integration with your security platform delivers additional threat analysis, shared intelligence and automated containment.

134
Datasheet

Traps: Advanced Endpoint Protection

Palo Alto Networks Advanced Endpoint Protection represents a complete paradigm shift from identification to pure prevention. Providing comprehensive exploit and malware prevention that is not designed to identify; instead, it prevents an attack before the malware can be successful.

15279
Article

12 Best Practices to Make Your AWS Configuration More Secure

Amazon® Web Services has been an advocate for strong cloud security since it launched in 2006. AWS® and its customers employ a shared responsibility model that distributes security roles between the provider and customer. As a public cloud vendor, AWS owns the infrastructure, physical network and hypervisor. The enterprise owns the workload operating system, apps, virtual network, access to their tenant environment/account and the data.

124
White Paper

10 Things to Test In Your Future NGFW

This paper discusses ten points to consider and actively test in your current security i nfrastructure and your future NGFW. Using these as guidelines for cross-functional conversations, you will expand the lens through which you can view your NGFW in order to determine if your potential security investments are easy to implement, alleviate workloads, and offer your organization the best protection and value, today and in the future.

102

Displaying 41 to 50 of 95