ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Palo Alto Networks

  • Top Security Orchestration Use Cases

    In this e-book, take a look at some use cases where security orchestration’s capabilities can help simplify, automate, and improve efficiencies of incident response and security operations.

  • Why Seconds Matter

    Todays' hackers are enjoying threats such as polymorphic malware that can avoid detection by constantly changing its identifiable features. How do security teams get around malleable threats? With inline machine learning, organizations may be able to stop threats while keeping business going. To learn more, read this comprehensive white paper.

  • 5 Critical Mistakes When Evaluating a Next-Generation Firewall

    If you are in the market for a firewall, then you have probably discovered that a next-gen firewall (NGFW) is the way to go. But how can you be sure you’re choosing the NGFW to meet your organization’s specific networking, performance and security needs? Check out this white paper to learn 5 mistakes to avoid when evaluating a NGFW.

  • Measuring the ROI of an Incident Response Platform

    A Forrester survey found that 80% of businesses had been attacked last year, and only 50% felt they had the right resources to proactively hunt for threats. Organizations tend to place incident response on the backburner, but it’s clear they wish they’d been better prepared for ‘what ifs’. In this guide, learn how to stay ahead of threats.

  • Securing Branch Offices and Retail Stores in the Digital Age

    The advancement of the branch office is matched only by the evolution of network threats. With networking solutions such as SD-WAN now on the market, organizations must rethink their branch office security. Read this white paper outline the challenges of branch security and view typical use cases.

  • Software-Defined Networks are Creating New Challenges for Enterprise Security

    A panel of 300 North American respondents was asked about how they use SD-WAN and what drives their security concerns in those deployments. What were the main drivers for adopting SD-WAN? What benefits have been recognized? How do they plan to consolidate functions with respect to SD-WAN? Read this report to get these answers and more.

  • 5 Must-Haves to Look for in a Best-in-Class IoT Security Solution

    Based on Gartner’s predictions, adoption of IoT endpoint is estimated to reach 5.81 billion this year. However, in order to integrate IoT responsibly, security considerations need to be made. In this buyer’s guide, discover what to look for in an IoT security solution.

  • Security Orchestration For Dummies

    Security orchestration is a new term to the market, but it could simplify the lives of security professionals. It refers to the integration of security tools, unifying intelligence and automating tasks, resulting is a more effective security operations center that better detects and responds to threats. Dive into this e-book for a detailed guide.

  • Next-Generation Firewall Buyer’s Guide

    Cloud adoption, big data analytics, machine learning and automation are all accelerating the delivery of applications, which in and of themselves are becoming increasingly accessible. However, this also means that apps are more vulnerable than ever. Browse this guide to learn how Next-Gen Firewalls can minimize risk without slowing you down.

  • The State of Cloud Native Security

    As more and more applications are migrated into the cloud, and organizations focus less on their own on-premises hardware, countless cloud and app security questions have arisen. This State of Cloud Native Security Report delves into the current market landscape for cloud and cloud-native security.

  • An Ideal Match with Analyst's SOAR Recommendations

    According to Gartner, the ‘ideal’ SOAR solution is defined by the convergence of security orchestration and automation, incident response, and threat intelligence. These capabilities are native to the Cortex XSOAR platform – but does that make it ideal? Read this data sheet to see how Cortex XSOAR stacks up to Gartner’s recommendations.

  • Cortex XSOAR

    Security teams are often overburdened with a growing volume of threats and security alerts that require manual attention. Download this data sheet for an in-depth look at Cortex XSOAR, a security platform designed to streamline security operation center (SOC) efficiency by empowering teams with enhanced automation and collaboration capabilities.

  • Transforming Detection and Response: A SANS Review of Cortex XDR

    Cortex XDR is a platform designed to help organizations detect and respond to threats. It brings multiple data sources together to assist analysts in performing enterprise investigations. This SANS report found that organizations looking for a holistic view of their environment would benefit from the correlation/response capabilities of Cortex XDR.

  • Cortex XDR Endpoint Protection Solution Guide

    To protect your endpoints against the threats used by today’s cyberattackers, prevention tactics and AI-based analysis tools are needed to simplify operations and outpace hackers. Download this solution guide for a closer look at Cortex EDR, a cloud-delivered agent designed to help with endpoint detection, protection and response.

  • Top Security Orchestration Use Cases

    In this e-book, take a look at some use cases where security orchestration’s capabilities can help simplify, automate, and improve efficiencies of incident response and security operations.

  • Cortex XDR Managed Threat Hunting

    Get peace of mind knowing your organization is safe with a Managed Threat Hunting Service. Read on to learn all about the benefits of Cortex XDR Managed Threat Hunting.

  • The Continuum of Cloud Native Topologies

    This guide breaks down the cloud native continuum, evaluating the different technologies that the continuum is composed of (such as VMs, containers, and serverless) while providing guidance on how to choose between them.

  • Spring 2020 Cloud Threat Report: Putting the Sec in DevOps

    For the Palo Alto Networks Spring 2020 edition of the Unit 42 Cloud Threat Report, cloud threat researchers focused their attention on the practices of DevOps. The research aimed to uncover where cloud vulnerabilities are surfacing. Read on to uncover the results.

  • The Business Case for Cloud Threat Defense

    In order to protect the growing security and compliance requirements needed to protect cloud data and applications, organizations are implementing cloud threat defenses. Download this white paper to get a better understanding of the benefits, costs, issues and risks associated with implementing cloud threat defenses.

  • Container Security 101: Understanding the Basics of Securing Containers

    Container environments bring a range of cybersecurity issues involving images, containers, hosts, runtimes, registries, and orchestration platforms, which all need to be secured. Not sure where to begin? Download Container Security 101: Understanding the Basics of Securing Containers for everything you need to know.

  • The 10 Tenets of an Effective SASE Solution

    As networks become increasingly dispersed, organizations struggle to keep pace and ensure security, privacy, and integrity. Recently, organizations have begun incorporating secure access service edge (SASE) frameworks. This e-book goes in-depth into what SASE is, and 10 principles required to make them effective.

  • How SOAR Is Transforming Threat Intelligence

    Today’s cyberthreats are more complex and frequent than ever before. Lack of control and visibility, as well as siloed workflows, prevent organizations from responding to these threats. In this white paper, learn more about SOAR and how it’s transforming threat intelligence.

  • Cortex XDR: Breaking the Security Silos for Detection and Response

    Although dealing with threats and vulnerabilities is stressful, managing the repetitive tasks associated with incident detection and response is arguably an equally frustrating responsibility. This white paper highlights the key capabilities of Cortex XDR, designed to alleviate this process by automating certain tasks. Read on to learn more.

  • Secure the Cloud-Enabled Mobile Workforce

    As organizations continue to migrate their workloads and applications to the cloud, it becomes clear that traditional remote access tools like VPNs are unable to keep pace with both threats and operational requirements. Read on to uncover a modern architecture for the mobile workforce designed to support key cloud initiatives.

  • Securely Connect Remote Workforces During the COVID-19 Outbreak

    The recent surge in remote work trends has underlined the importance of adequate security preparations when it comes to protecting endpoints and users. This white paper overviews a few offerings from Palo Alto, and highlights the key features that position them to be helpful in supporting remote workers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.