Palo Alto Networks Whitepapers


Sort by: Date | Company | Title


Advanced endpoint protection for dummies
By Palo Alto Networks | 26/10/2015

Cyberattacks have evolved to become much more complex, however the core techniques employed by malware are usually recycled and largely unchanged.

Find out how these targeted attacks affect companies in real world cases and why legacy solutions that focus on detection are insufficient to protect secure enterprise data. Included are also 10 preventative measures you can take to prevent a corporate security breach.

Download this now


The definitive guide for evaluating cybersecurity solutions
By Palo Alto Networks | 26/10/2015

Cyber criminals today are deploying sophisticated attacks on enterprises making the role of security professionals much more complex than ever before. Find out the 10 requirements your cybersecurity solution must meet to ensure secure application enablement at every location and how you should widen your RFP selection criteria when choosing a security provider.

Download this now


Modern Prevention to Disrupt the Cyber Attack Chain
By Palo Alto Networks | 13/4/2015

This paper explains problems with existing cyber security culture and approaches. Introduces modern approaches that create transformational pivots to make prevention, action and control organic and fundamental to an enterprise security strategy.

Download this now


Application Usage and Threat Report
By Palo Alto Networks | 5/1/2015

The Application Usage and Threat Report (June 2014) provides a global view into enterprise application usage and the associated cyber threat landscape. Accomplished by summarizing network traffic assessments conducted across more than 5,500 organizations worldwide between March 2013 and March 2014.

This version of the report will analyse the relationship between threats and their application vectors. The most surprising data points being both the diversity of applications displaying threat activity and the high concentration of activity surrounding only a few key techniques.

Download this now


A Spotlight on Malware Attack Vectors in Key Industries
By Palo Alto Networks | 5/1/2015

This edition of the recurring Threat Landscape Review examines data from WildFire™, a key component of the Palo Alto Networks threat intelligence cloud, to identify how organizations in different industries are targeted and affected by malware.

Download the latest research from Unit 42 to see current trends and malware distribution patterns across 10 industries, and find out what you need to know about the Kuluoz malware family, and how to defend against it.

Download this now


Getting Started With a Zero Trust Approach to Network Security
By Palo Alto Networks | 16/7/2014

Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. With Zero Trust there is no default trust for any entity—including users, devices, applications, and packets—regardless of what it is and its location on or relative to the corporate network. This paper discusses the need for a Zero Trust approach to network security, how the Palo Alto Networks® next-generation security platform delivers on these requirements, and provides guidance on how to progressively migrate to a Zero Trust architecture.

Download this now


The 2014 Firewall Buyers Guide
By Palo Alto Networks | 16/7/2014

Make an informed decision on the right firewall for your business with The Firewall Buyers Guide.

This guide gives you:

• The fundamentals of modern firewall technology • The ten critical business requirements your next firewall needs to address • Information on how to create a vendor request for proposal (RFP) • A functional test plan to assist in your firewall selection process

Download this now


Cybersecurity Imperatives: Reinvent your Network Security
By Palo Alto Networks | 16/7/2014

Cybersecurity has become a leading topic both within and beyond the corporate boardroom. What enterprises need to stop the escalation of cyberattacks is a network security approach that is designed from the outset to enable the safe use of the applications and technologies required to support a thriving business.

Download this now


Cybersecurity for Dummies eBook
By Palo Alto Networks | 16/7/2014

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before.

Controlling these threats requires multiple security disciplines working together in context. While no single solution will solve the problem of advanced threats on its own, next-generation security provides the unique visibility and control of, and the true integration of, threat-prevention disciplines needed to find and stop these threats — both known and unknown.

Download this now


Application, Usage and Threat Report
By Palo Alto Networks | 16/7/2014

The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.

Download this now