ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Palo Alto Networks

  • DevSecOps: Opening the Fast Lane for Secure Deployments

    DevSecOps is often marketed but rarely implemented effectively due to conflicts between development and security teams. This webinar shows how to integrate security into DevOps pipelines without losing speed. Learn to prioritize code issues, implement non-disruptive security, and shift from "shift left" to "start left." Discover strategies.

  • The State of Cloud Native Security

    The 2024 State of Cloud-Native Security Report highlights rising security issues in cloud environments, with 64% of organizations facing more data breaches. Key findings include 16 security tools on average, DevOps-SecOps conflicts causing delays, and concerns about AI-generated code. Read the report for strategies to tackle these challenges.

  • Securing the Cloud-Native Future: Insights from the GigaOm Radar Report

    Understanding cloud-native application protection platforms (CNAPPs) is crucial as cloud security evolves. This webinar covers CNAPP solutions, cloud detection and response, and differentiating providers. Discover why AI and automation are vital for cloud security. Watch this report to make informed decisions about securing your cloud future.

  • ASPM: The Future of AppSec - Boom or Bust?

    Application Security Posture Management (ASPM) unifies AppSec tools, providing context from code and runtime to tackle threats. This webinar examines if ASPM is transformative or a trend, highlighting its role in closing security gaps and enabling proactive protection. Discover how ASPM could reshape your security strategy in this webinar.

  • The State of Cybersecurity Incident Response

    Join a fireside chat with Forrester analyst Jess Burn and Unit 42 VP Sam Rubin on cybersecurity incident response. Gain insights into IR challenges, business continuity integration, and emerging technologies. Learn about Palo Alto Networks' threat-informed approach to preventing breaches. Watch the webcast to enhance your IR skills.

  • Breaking Through the Ransomware Fog

    Join Unit 42 experts in exploring a real-world ransomware attack on a large manufacturer. This webcast reveals how threat actors adapt tactics to increase speed, damage, and pressure. Discover the attack anatomy, investigation process, and defense strategies against evolving threats. Register for actionable insights.

  • From Reactive to Proactive: SecOps of the Future

    ph

  • Fight Tech with Tech: Success at the Frontlines of the AI-Powered SOC

    ph

  • How Home Depot and Concentrix Have Transformed Their SOC

    ph

  • Your SecOps. Unified.

    ph

  • The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024

    The Forrester Wave evaluates enterprise firewall solutions, identifying leaders, strong performers, and more. Key requirements include unified policy management, microsegmentation support, and AI-powered threat defense. Download the full report to assess the top vendors and find the right firewall for your organization.

  • Network Threat Trends Research Report

    Understanding threat actors’ preferred methods and malware families can give you insights into how to set up your defenses and best protect your organization. In this report, explore current trends in malware and the evolving threat landscape with exhaustive research from the Palo Alto Networks Unit 42 research team.

  • The Forrester Wave™: Cybersecurity Incident Response Services, Q2 2024

    From preparation to disaster recovery and everything in between, it can be overwhelming for security teams to cover all their bases. This report from Forrester provides insights on how the top 14 incident response services providers stack up as we turn to the new year. Download the full report to learn more.

  • Cloud Native Application Protection Platforms

    This e-book explores cloud native application protection platforms (CNAPPs) and how they enable collaborative security across development, DevOps, and security teams. Learn how CNAPPs provide a holistic approach to securing cloud native applications from code to cloud. Discover the foundations of comprehensive cloud security.

  • 57 Tips to Proactively Prepare

    Explore 57 actionable tips to proactively prepare your organization for cybersecurity threats. This comprehensive checklist covers identity and access management, risk management, data security, and more. Read the full white paper to strengthen your security posture.

  • Market Guide for Digital Forensics and Incident Response Retainer Services

    Digital forensics and incident response (DFIR) retainer services help organizations assess and manage security incidents. Learn how to evaluate DFIR providers, understand market trends, and prepare for effective incident response. Read the full Gartner report.

  • Incident Response Strategies in the Spotlight

    Incident response (IR) is critical as attacks increasingly evade defenses. Discover how organizations are strengthening IR readiness through assessments, planning, and testing. Learn how IR service providers can help identify weaknesses and improve your security posture. Read the full Enterprise Strategy Group report to learn more.

  • Definitive Guide to Enterprise Browsers

    In this 52-page e-book, "The Definitive Guide to Enterprise Browsers," learn how enterprise browsers can secure remote access and protect data on your managed and unmanaged devices.

  • A New Regulatory Era for Cybersecurity

    As the cybersecurity landscape evolves, organizations must stay ahead of new regulatory changes, including requirements from the U.S. Securities and Exchange Commission (SEC). Read this 12-page e-book to learn about the SEC cybersecurity reporting rule, what it covers, how to comply with it, and much more.

  • Unit 42 Attack Surface Threat Report

    Explore the latest cybersecurity threats and vulnerabilities in the Unit 42 Attack Surface Threat Report. Uncover critical insights to strengthen your security posture. Read the full report for comprehensive analysis.

  • 10 Essential Use Cases for Attack Surface Management

    Discover 10 essential use cases for attack surface management to secure your complex, evolving attack surface. Learn how Cortex Xpanse can help you prevent ransomware, eliminate shadow IT, respond to zero-days, and more. Read the full e-book to take a proactive approach to attack surface management.

  • 5 Essential Steps to SOC Transformation

    This guide explores five essential steps to transform your security operations center (SOC) for the modern threat landscape. Learn how to elevate your SOC with automation and AI to better detect, investigate, and respond to threats. Read the full SOC Transformation Guide to optimize your security operations.

  • Optimizing Security Operations with Palo Alto Networks’ Cortex XSOAR

    Cortex XSOAR is a powerful SOAR platform that empowers security teams to automate incident response, manage cases, and leverage threat intelligence. This in-depth review examines XSOAR's capabilities, including dashboards, reporting, incident management, and playbooks. Discover how XSOAR can optimize your security operations. Read the full review.

  • The Forrester Wave™: Attack Surface Management Solutions, Q3 2024

    Forrester Wave evaluates 11 leading attack surface management (ASM) providers, highlighting their strengths and weaknesses. Discover how vendors like CrowdStrike, Palo Alto Networks, and Trend Micro stack up in this comprehensive report.

  • Magic Quadrant for Single-Vendor SASE

    This Gartner Research Report evaluates 9 leading single-vendor SASE offerings, examining vendor strengths, cautions, and market trends. Download this Gartner Magic Quadrant for Single-Vendor SASE to make an informed SASE selection for your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.