• Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Intelligence

Palo Alto Networks Introduces the Autonomous Security Platform, Cortex XSIAM, to reimagine SIEM and SOC Analytics

A major challenge in cybersecurity today is our inability to leverage massive scales of data for our defense. To meet this challenge, Palo Alto Networks (NASDAQ: PANW) today announced Cortex®...
See more

Palo Alto Networks Introduces PAN-OS 10.2 Nebula: The Industry's First Inline Deep Learning Protection for Network Security to Help Stop Sophisticated Attacks as They Happen

Palo Alto Networks (NASDAQ: PANW), a 10-time leader in network firewalls, today announced Nebula, the latest upgrade of its industry-leading PAN-OS software, to help find the evasive, zero-day...
See more

Date

  • Last week
  • Last 30 days
  • Last 6 months
  • Last year
By Topic

By Topic

  • Network Security (484)
  • Cloud Security (383)
  • Security Operations (283)
  • Threat Detection and Prevention (257)
  • Security Operating Platform (186)
  • Secure Access Service Edge (SASE)  (162)
  • Public Cloud Security (152)
  • Network Security Management (118)
  • Zero Trust (108)
  • Security Ecosystem (89)
  • Private Cloud Security (88)
  • Saas Security (67)
  • Amazon Web Services (59)
  • Mobile Security (57)
  • Google Cloud (54)
  • Microsoft Azure (51)
  • Secure Remote Workforce (32)
  • Data Center (29)
  • Attack Surface Management (20)
  • Remote Workforce (10)
  • VMWare NSX (10)
  • Professional Services (8)
  • Cybersecurity Fundamentals (7)
  • Microsoft Hyper-V (6)
  • KVM (1)
  • + Show More
By Industry

By Industry

  • Federal Government (90)
  • Financial Services (67)
  • Healthcare (65)
  • Higher Education (56)
  • High Technology (52)
  • State & Local Government (48)
  • Manufacturing (41)
  • Other Industries (40)
  • K-12 Education (33)
  • ICS SCADA (31)
  • IoT (31)
  • Utilities & Energy (27)
  • Retail (24)
  • Energy (15)
  • Education (13)
  • Automotive (12)
  • Service Provider & Telecommunications (12)
  • Transportation (12)
  • Technology (12)
  • Media & Entertainment (10)
  • Airlines (7)
  • Pharma & Life Sciences (6)
  • Professional & Legal Services (6)
  • Software Geographic Information Systems (2)
  • Nonclassifiable Establishments (1)
  • Aerospace & Defense (1)
  • + Show More
By Type

By Type

  • In The News (1757)
  • Press Release (653)
  • Video (337)
  • Datasheet (321)
  • White Paper (308)
  • Webinar (285)
  • Customer Story (245)
  • Article (210)
  • Research Reports (126)
  • Guide (95)
  • Book (76)
  • Infographic (73)
  • Use Case (61)
  • Other (56)
  • Solution Brief (15)
  • Presentations (11)
  • Tool (7)
  • Podcast (5)
  • Playbook (3)
  • FAQ (2)
  • Interactive Content (1)
  • + Show More
By Product Category

By Product Category

  • NGFW (378)
  • Cortex XDR (317)
  • Prisma Cloud (285)
  • VM-Series (194)
  • Prisma Access (169)
  • Cortex XSOAR (165)
  • Cortex (156)
  • WildFire (145)
  • Unit 42 (131)
  • Threat Prevention (121)
  • URL Filtering (107)
  • Prisma SD-WAN (105)
  • Panorama (103)
  • Cortex Xpanse (96)
  • GlobalProtect (78)
  • Prisma SASE (73)
  • PA-Series (67)
  • SaaS Security (66)
  • IoT Security (52)
  • DNS Security service (43)
  • Threat Intel Management (43)
  • Zero Trust (22)
  • PAN-OS 10.0 (21)
  • Cortex XSIAM (17)
  • Advanced Threat Prevention (10)
  • CN Series (10)
  • Enterprise DLP (10)
  • Cloud NGFW (9)
  • Cortex Data Lake (5)
  • VM-Series for VMWare NSX (2)
  • VM-Series for Microsoft Azure (1)
  • + Show More
Education and Professional Services

Education and Professional Services

  • Professional Services (56)
  • Transformation Services (13)
  • Support (11)
  • Customer Success (8)
  • Training (5)
  • Cybersecurity Academy (5)
  • Firewall Migration (2)
  • Certified Partners (2)
Displaying 1 - 30 of 6448
Pagination
  • 1
  • 2
  • …
  • 214
  • 215

References and Case Studies

Village Roadshow transforms the business with Prisma SASE, realizes savings of thousands of hours per month

Integrated cloud-delivered security and SD-WAN enhances user experience and reduces operational complexity
February 21, 2023

Press Release

Palo Alto Networks Reports Fiscal Second Quarter 2023 Financial Results

Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, announced today financial results for its fiscal second quarter 2023, ended January 31, 2023. Total revenue for the fiscal...
Santa Clara, CA February 21, 2023

Article

What is a Botnet?

A bot is a piece of malware that infects a computer to carry out commands under the remote control of the attacker.
February 20, 2023

Article

Expanding Targets for New SunOrcal Malware Variant

Reaver malware family has shared command-and-control (C2) infrastructure overlap SunOrcal malware that has been used concurrently since late 2016.
February 20, 2023

Article

What Is a Site-to-Site VPN?

A site-to-site virtual private network (VPN) is a connection between two or more networks, such as a corporate network and a branch office network.
February 19, 2023

Article

What is an Endpoint?

An endpoint is a remote computing device that communicates back and forth with a network to which it is connected.
February 19, 2023

Article

What is a Zero Trust Architecture

Zero Trust has become one of cybersecurity’s most used buzzwords. It’s imperative to understand what Zero Trust is, as well as what Zero Trust isn’t.
February 19, 2023

Article

What is Smishing?

SMS phishing, or smishing, is growing in popularity. Learn how to identify a smishing attempt and other ways to protect your organization.
February 19, 2023

Article

What is an Intrusion Detection System?

An Intrusion Detection System (IDS) is a network security technology built for detecting vulnerability exploits against a target application
February 19, 2023

White Paper

Analyzing the Economic Benefits of Palo Alto Networks Industrial OT Security

This report includes findings from ESG experts based on interviews with Palo Alto Networks Industrial OT Security customers.
February 19, 2023

Guide

Symphony 2023 Advanced Track Hands-On Workshop

Download this helpful checklist of actions to take and apply your learnings from the workshop to improve your security operations and posture.
February 19, 2023

Guide

Symphony 2023 Beginner Track Hands-On Workshop

Thank you for joining us for the live three-hour virtual workshops “Start Your Journey to the Modern SOC - An introduction to the Cortex Platform” at Symphony 2023.
February 19, 2023

Article

What Is Software Composition Analysis (SCA)?

Software composition analysis (SCA) enables developers to leverage open source packages without exposure to vulnerabilities, legal and compliance issues
February 17, 2023

Article

What Is SIEM?

Explore how SIEM solutions intertwine with SOC teams to easily aggregate data and identify potential issues.
February 16, 2023

Press Release

Palo Alto Networks Goes "All-In" With New Cloud Infrastructure Investment in Switzerland

Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, today announced the launch of its cloud infrastructure in Switzerland allowing Swiss customers to access the full breadth of Palo Alto Networks security capabilities while meeting data residency needs.
Santa Clara, CA February 16, 2023

Video

Introduction to Cortex Xpanse

Discover how to generate a complete and accurate inventory of your global internet-facing assets and potential misconfigurations, and automatically resolve common exposures with Cortex Xpanse.
February 16, 2023

Video

Introduction to Cortex XDR

Discover the power of the industry’s first extended detection and response platform with full visibility and analytics to stop even the most sophisticated threat actors.
February 16, 2023

Video

A Day In the Life Of A Security Analyst With Cortex XDR

See how “John, the Security Analyst” investigates and resolves a breach using Cortex XDR.
February 16, 2023

References and Case Studies

MediaMarktSaturn secures ‘the store of the future’ with Palo Alto Networks portfolio

Europe’s leading consumer electronics retailer is selling safely with Palo Alto Networks. A standardised, connected Palo Alto Networks portfolio enables MediaMarktSaturn Retail Group to see everything across its large, complex environment – and proactively prevent any threat.
February 15, 2023

Services

QuickStart Service for SaaS Security API

This service description document (“Service Description”) outlines the Palo Alto Networks service to implement a Cloud Network Security environment with a limited span which may or may not encompass the entire Customer environment (“Services”).
February 15, 2023

Article

What Is CSPM?

Cloud security posture management (CSPM) automates discovery and mitigation of threats across cloud infrastructures.
February 15, 2023

Webinar

Keeping the Government and Education Workforce Productive and Secure — A SASE Zero Trust Approach

February 15, 2023

Article

What is a Credential-Based Attack?

Credential based attacks occur when attackers steal credentials to gain access, bypass an organizations security measures, and steal critical data.
February 13, 2023

Article

What Is SASE?

Secure access service edge, or SASE (pronounced “sassy”), is an emerging cybersecurity concept. It is the convergence of wide area networking.
February 12, 2023

Book

The Complete Guide to Kubernetes Security

This e-book identifies Kubernetes® security challenges, offering scalable, automated solutions to address vulnerabilities.
February 9, 2023

Webinar

Automating Ransomware Response: Investigating Ransomware Attacks using Cortex XSOAR's automated playbooks

Today’s cyberattacks are outpacing many organizations' defensive capabilities. With threats growing in volume and sophistication, organizations everywhere are routinely compromised and held hostage by ransomware because they’re not equipped to combat the adversary.
February 9, 2023

Video

Simplifying Security Through Consolidation

All around us, digital transformation continues to accelerate. As we look back, the past few years have shown us how quickly changes happen — from industry dynamics to macroeconomics, all in the midst of an increasingly fraught geopolitical environment.
February 9, 2023

Video

Security Consolidation Q&A with Nir Zuk

Is security consolidation right for your organization? Why should you consider it? Listen as Palo Alto Networks Founder and CTO, Nir Zuk, answers key questions on this topic.
February 9, 2023

Services

Ransomware Readiness Assessment

This service description document (“Service Description”) outlines the terms and descriptions for the use of a Unit 42 cybersecurity risk assessment designed to mitigate the ransomware threat (“RRA Services”), you (“Customer”) have purchased from Palo Alto Networks, Inc. (“Palo Alto Networks”).
February 9, 2023

Article

What is the cloud-delivered branch?

Simplify the connectivity and protection of branch offices with a cloud solution.
February 8, 2023
Displaying 1 - 30 of 6448
Pagination Bottom
  • 1
  • 2
  • …
  • 214
  • 215

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement .

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved