ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Palo Alto Networks

  • Simplify Zero Trust Implementation with A Five-Step Methodology

    Companies are often reluctant to begin a zero-trust journey because they believe it to be difficult, costly and disruptive. What they don’t realize is that zero-trust isalready interconnected within their existing network. So, how do they convert? Read this Palo Alto Networks white paper to learn 5-steps to a frictionless zero-trust deployment.

  • Palo Alto Networks Ml-Powered Next-Generation Firewall Feature Overview

    Download this white paper to explore a machine-learning (ML) powered next-gen firewall (NGFW) by Palo Alto Networks, which strives to help you identify new threats, devices and more without relying on fingerprinting or signatures.

  • Decryption: Why, Where, And How

    According to the Google Transparency Report, nearly 95% of traffic uses encryption depending on the platform. However, if uninspected, encrypted traffic leaves organizations blind to security risks contained inside. View this white paper to learn about TLS decryption and how a next-gen firewall (NGFW) can help you meet decryption needs.

  • Find and Stop Cryptojacking Attacks Cortex XSOAR Webinar

    Cryptojacking affects 23% of organizations globally. Organizations leveraging cryptocurrency must know how to defend from cryptojackers in order to protect their business. Watch this in-depth webinar to learn best practices for cryptojacking prevention built around security orchestration, automation and response (SOAR).

  • Enabling the Future of Work with Zero Trust

    Zero Trust is gaining popularity as organizations embrace the necessity of enabling a hybrid workforce. Read this exclusive report from Forrester to unlock insights and considerations regarding the essentials for creating a Zero Trust roadmap.

  • Has XDR Crossed the Chasm Webinar

    Watch this webinar to go through the evolution of extended detection and response (XDR) and learn why XDR has crossed the chasm as both a product and a product category. Then, see how Cortex XDR from Palo Alto Networks was evaluated against Forrester’s Wave report and round 3 of MITRE ATT&CK.

  • 2021 SANs Panel Discussion - Top Skills Analyst Need to Master

    With an employment rate growing 32% from 2018 to 2028, security analysts must become a master of all trades. But what are the technical and nontechnical skills required in this role? In this this SANS panel discussion, discover the top skills security analysts need to master to be effective at defending their organizations.

  • Carbanak+Fin7: Unpacking the MITRE Round 3 Results Webinar

    In the Round 3 MITRE ATT&CK Evaluation, Cortex XDR was assessed against attack tactics and techniques that have been leveraged by the threat actor groups known as Carbanak and FIN7. After watching this webinar, you will be able to make an unbiased decision on your next EDR-related purchase.

  • Rethinking Threat Intel Management feat. Dark Reading

    According to SANS, 88% of SOCs use cyber threat intelligence for threat detection, and nearly half of organizations with SOCs have a dedicated threat intel team. To learn more about the challenges, opportunities and trends of today’s threat intelligence approaches, watch this webinar.

  • Cloud Security Blind Spots: Detecting And Fixing Cloud Misconfigurations

    The deployment processes and tooling for cloud environments look basically the same as those of on-premises infrastructure, but there are a variety of nuanced differences that can be easy to overlook. Access this white paper to learn 5 common blind spots caused by misconfiguration in cloud security and how to fix them.

  • Guide To Cloud Security Posture Management Tools

    In the era of multi-cloud environments, ensuring cloud security hygiene starts with good security and compliance posture. This e-guide looks at cloud security posture management (CSPM) tools, unique challenges for multi-cloud CSPM, strategic recommendations, and more. Read on to get started.

  • Why And How To Add Runtime Defense To Your Cloud Security Strategy

    Gartner predict that 70% of organizations will run at least 3 applications in containers by 2023. This means more container risk and more security modules designed for containers. Download this white paper to learn about runtime security, end-to-end monitoring and validation of all activity within containers, hosts and serverless functions.

  • The State Of The Kubernetes Ecosystem

    Access this free 82-page e-book, "The State of the Kubernetes Ecosystem" (second edition) for a guide to everything Kubernetes-related.

  • Cloud Threat Report 1H 2021

    Cloud security incidents increased by an astounding 188% from April to June of 2020. This Unit 42 report details the scope of COVID-19's impact on the cloud threat landscape and explains which types of risks are most prevalent in specific geographies and industries.

  • Why SASE is the future of IoT security

    30% of devices on today’s enterprise networks are IoT – and hackers are keen to exploit the vulnerabilities that these IoT devices present. Watch this webinar to learn more about the threats targeting your IoT devices and how SASE can help protect them and your network.

  • Internet access, Security for all, Cloud-delivered

    Still working to find a unified platform for secure access for all your resources? This webinar explains how a Secure Access Service Edge (SASE) can help you in this work from anywhere journey.

  • Solve The MTTR Challenge with ADEM

    Facing cloud networking challenges in your remote workforce? Watch this webinar to learn how autonomous digital experience management can help you solve the mean time to recover (MTTR) challenge in your cloud environment.

  • The Essential Guide to MITRE Round 3 Evaluations

    For Round 3 of the MITRE ATT&CK Evaluation, 29 vendors participated to see how their solutions stacked up. This e-book provides a comparative look at how vendors performed across various measures, with guidance on how to explore the results further

  • ZTNA: Default to Deny, Never Trust, Always Verify

    Contrary to popular belief, Zero Trust and Zero Trust Network Access (ZTNA) are entirely different. Watch this webinar to learn more about the differences between them, the challenges ZTNA addresses, how organizations can embrace ZTNA, the key features of Palo Alto’s Prisma Access, and more.

  • How Next-Gen SD-WAN is driving the SASE revolution

    In response to growing networking and security challenges in the digital era, Gartner created the concept of Secure Access Service Edge (SASE) to help organizations embrace the future of network security. Watch this webinar to learn more about the SASE revolution and why it’s dependent on a new approach to SD-WAN.

  • Demystifying SASE: What SASE really is and how it help your users, IT department, and business

    In this webinar, join Palo Alto’s VP of SASE for a discussion around the trends reshaping today’s organizations, the 5 tenets of Gartner’s SASE concept, how to implement effective SASE, and more. Watch now to get started.

  • Gartner 2021 Strategic Roadmap for SASE Convergence Report

    For more clarity and confidence in your SASE efforts, get the new comprehensive Gartner report, "2021 Strategic Roadmap for SASE Convergence."

  • ENGLISH Ransomware Webinar

    In 2020, ransomware attacks were constantly making headlines as they successfully compromised even the most seemingly secure organizations. Access this webinar to unlock best practices to help you prepare for and defend against ransomware attacks.

  • A Guide to Securing Virtual Desktops in Microsoft Azure

    This white paper is your guide to securing virtual desktops in Microsoft Azure, covering virtual desktop security vulnerabilities, what to look for in a provider and how to take the next steps towards remote workforce enablement. Open now to learn more.

  • Best Practices in Securing SAP Migrations to Microsoft Azure

    When an organization is migrating SAP to Microsoft Azure, or considering moving some or all of its SAP workloads, it is essential to focus on security at every stage of the process. Open up this white paper to find best security practices for migrating SAP to Microsoft Azure, as well as where potential gaps can occur and how to fill those gaps.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences