Search
Close search modal
Home
CA
Location
Products
Resources
Partners
Company
MENU
CA
Location
Sitemap
Content Library
Threat Research
Event Center
Threat Base
Applipedia
Security Advisories
Blog Posts
/content/pan/en_CA/products
Resources
Info & Insights
Ransomware: Common Attack Methods
3 Ways to Get the Most Value out of Your Security Investments
Minimizing Risk at the Board Level
Datasheets
Citrix NetScaler SDX
Traps: Advanced Endpoint Protection
Firewall Feature Overview Datasheet
GlobalProtect Datasheet
Integrated URL Filtering Datasheet
PA-200 Specsheet
PA-3000 Series Specsheet
PA-7000 Series Specsheet
Panorama Datasheet
Product Summary Specsheet
AutoFocus Data Sheet
VM-Series for Amazon Web Services
VM-Series for VMware
VM-Series Specsheet
PA-500 Specsheet
PA-800 Series Specsheet
PA-5200 Series Specsheet
PA-220 Specsheet
Prisma Access (GlobalProtect Cloud Service) Datasheet
Palo Alto Networks Logging Service
Security Operating Platform At A Glance
PA-3200 Series
PA-220R
Magnifier Behavioral Analytics
Evident for Public Cloud Infrastructure
Traps Technical Overview
URL Filtering At-A-Glance
Traps Enterprise ELA
Prisma SaaS: At a Glance
Cortex XDR
Cortex Data Lake
Cortex Data Lake Privacy Data Sheet
Prisma Access At a Glance
Prisma Public Cloud at a Glance
Executive summary: A more secure everywhere
Prisma Access for Clean Pipe
Managed Detection and Response
At a Glance: Prisma Cloud Compute Edition
Zingbox datasheet
Cortex XSOAR
Cortex XSOAR Overview
White Papers
Top Recommendations to Prevent Ransomware
Security Framework Guide for Business Leaders
Best Practices - Data Center Security
Best Practices - SaaS Security
Palo Alto Networks Application Framework
EU WildFire Cloud
Smart manufacturing needs smart security
12 Best Practices to Make Your AWS Configuration More Secure
How to Secure Your Business in a Multi-Cloud World
Evident at Work: Continuous Security & Compliance in the Cloud
Guide to Securing Microsoft Office 365 for the Enterprise
10 Things to Test In Your Future NGFW
Combine Network and Endpoint Security for Better Visibility, Protection, and Enforcement
Decryption: Why, Where and How
3 Requirements for Secure Digital Transformation
5 Critical Mistakes When Evaluating A Next-Gen Firewall
Stop Attackers from Using DNS Against You
Cyber Threat Report: Reconnaissance 2.0
Prisma Cloud Threat Protection
Prisma: Secure DevOps
Securing SD-WAN with the Palo Alto Networks Next-Generation Security Platform
Simplify Zero Trust Implementation Using A Five-Step Methodology
Three Use Cases for Securing a Hybrid Data Center
Applying Zero Trust to Cloud Environments
Technology & Solution Briefs
The Value of the Next-Generation Security Platform
SECURING SD-WAN WITH THE SECURITY OPERATING PLATFORM
Secure Transformation: Replacing Remote Access VPN with Prisma Access
Corporate Backgrounder
Blog
Events
infographics
webcasts
Federal Government Summit 2018 - Canada
DNS Security Service
Case Studies
BC Ministry of Education
St. Lawrence College
ebook
Security for Cloud-Native Architectures
11 Things to Focus on to be PCI Compliant in AWS
Research
Cloudy with a Chance of Entropy
2021 Palo Alto Networks Canada Ransomware Barometer
/content/pan/en_CA/contact
/content/pan/en_CA/campaigns