Research Library

Powered by

All Research Sponsored By:Palo Alto Networks

  • Zero Trust Network Security: Core Capabilities

    Zero Trust provides IT and security teams with a clear pathway towards securing and managing access across an increasingly distributed workforce operating within an increasingly complex environment. Watch this video to learn more about Zero Trust Network Security and the SaaS explosion.

  • Why And How To Add Runtime Defense To Your Cloud Security Strategy

    Gartner predict that 70% of organizations will run at least 3 applications in containers by 2023. This means more container risk and more security modules designed for containers. Download this white paper to learn about runtime security, end-to-end monitoring and validation of all activity within containers, hosts and serverless functions.

  • The State Of The Kubernetes Ecosystem

    Access this free 82-page e-book, "The State of the Kubernetes Ecosystem" (second edition) for a guide to everything Kubernetes-related.

  • SaaS Security: A Deep Dive

    Stream this webinar featuring Palo Alto Networks Founder and CTO for a deep dive on SaaS application security. Topics include SaaS security best practices and how enterprises can use machine learning (ML) to keep SaaS apps secure.

  • A Complete Zero-Trust Network Security Architecture

    There are a variety of zero-trust situations that require different zero-trust mechanisms. As a result, businesses need an all-encompassing architecture that works with the reality of a hybrid work environment. In this video, discover how you can achieve a complete zero-trust network security architecture.

  • Cloud Threat Report 1H 2021

    Cloud security incidents increased by an astounding 188% from April to June of 2020. This Unit 42 report details the scope of COVID-19's impact on the cloud threat landscape and explains which types of risks are most prevalent in specific geographies and industries.

  • Why SASE is the future of IoT security

    30% of devices on today’s enterprise networks are IoT – and hackers are keen to exploit the vulnerabilities that these IoT devices present. Watch this webinar to learn more about the threats targeting your IoT devices and how SASE can help protect them and your network.

  • Internet access, Security for all, Cloud-delivered

    Still working to find a unified platform for secure access for all your resources? This webinar explains how a Secure Access Service Edge (SASE) can help you in this work from anywhere journey.

  • Solve The MTTR Challenge with ADEM

    Facing cloud networking challenges in your remote workforce? Watch this webinar to learn how autonomous digital experience management can help you solve the mean time to recover (MTTR) challenge in your cloud environment.

  • The Essential Guide to MITRE Round 3 Evaluations

    For Round 3 of the MITRE ATT&CK Evaluation, 29 vendors participated to see how their solutions stacked up. This e-book provides a comparative look at how vendors performed across various measures, with guidance on how to explore the results further

  • ZTNA: Default to Deny, Never Trust, Always Verify

    Contrary to popular belief, Zero Trust and Zero Trust Network Access (ZTNA) are entirely different. Watch this webinar to learn more about the differences between them, the challenges ZTNA addresses, how organizations can embrace ZTNA, the key features of Palo Alto’s Prisma Access, and more.

  • Cortex XDR Rides the Forrester Wave as a Leader

    With the shifted to work from home in 2020, organizations demanded SaaS-delivered endpoint security. This report evaluated the 12 most significant endpoint security vendors and scored them across 24 criteria. Read on to understand how each vendor measures up and helps security and risk professionals select the right one for their needs.

  • How Next-Gen SD-WAN is driving the SASE revolution

    In response to growing networking and security challenges in the digital era, Gartner created the concept of Secure Access Service Edge (SASE) to help organizations embrace the future of network security. Watch this webinar to learn more about the SASE revolution and why it’s dependent on a new approach to SD-WAN.

  • 2021 Unit 42 Ransomware Threat Report

    For cybercriminals ransomware has become a goldmine – with the average ransom paid by organizations in the US, Canada and Europe rising by 171% since 2019. Access this ransomware threat report to explore ransomware trends and variants observed in 2020 and unlock strategic recommendations for 2021.

  • Demystifying SASE: What SASE really is and how it help your users, IT department, and business

    In this webinar, join Palo Alto’s VP of SASE for a discussion around the trends reshaping today’s organizations, the 5 tenets of Gartner’s SASE concept, how to implement effective SASE, and more. Watch now to get started.

  • Gartner 2021 Strategic Roadmap for SASE Convergence Report

    For more clarity and confidence in your SASE efforts, get the new comprehensive Gartner report, "2021 Strategic Roadmap for SASE Convergence."

  • ENGLISH Ransomware Webinar

    In 2020, ransomware attacks were constantly making headlines as they successfully compromised even the most seemingly secure organizations. Access this webinar to unlock best practices to help you prepare for and defend against ransomware attacks.

  • The 10 Tenets Of An Effective Sase Solution

    Coined by Gartner, the concept of SASE is to help organizations embrace cloud and mobility by providing network and network security services. Access this e-book to unlock Palo Alto’s 10 tenets of effective SASE.

  • Four Good Reasons To Modernize Your Remote Access Security Now

    Modernizing remote security can come in many forms. SASE is a preferred route – it allows organizations to secure networks more efficiently with robust access controls. View this Palo Alto Networks white paper to learn the key to unlocking SASE and leaving legacy infrastructure in the past – and learn 4 reasons why the time to modernize is now.

  • 10 Things To Test In Your Future Next-Generation Firewall

    How can you determine if the features of your new next-generation firewall are what your organization needs to grow and move forward? The answer is simple: you test it. In this white paper, explore 10 points to consider and actively test in your current security infrastructure as well as your future next-generation firewall.

  • Provide Secure Remote Access And Gain Peace Of Mind With Palo Alto Networks Prisma Access

    As more apps, servers & services are delivered from the cloud, organizations are reevaluating whether legacy point solutions can adequately scale & provide secure, reliable access for their users & locations. Security is being stepped up in response. Read this Forrester report to explore the value of Palo Alto Networks Prisma Access.

  • The Total Economic Impact Of Palo Alto Networks For Network Security And SD-WAN

    Palo Alto Networks commissioned Forrester Consulting to conduct an objective Total Economic Impact study and examine the potential ROI enterprises realize when deploying Palo Alto Networks for network security and SD-WAN. Download this report to explore key findings from the study.

  • Top Security and Risk Management Trends

    Acting on the relentless pace of digital business and ongoing transition to the cloud, security and risk management leaders can and must improve resilience, better support business objectives and elevate their organizational standing. View this Gartner resource detailing top security and risk management trends to give you the upper hand.

  • A New Methodology to Secure IoT Devices

    As unmanaged Internet of Things (IoT) devices continue to pop up, securing them becomes increasingly important. Watch this video to unlock a new methodology to secure IoT devices, which revolves around a 5-step lifecycle.

  • ENGLISH Protect Every Medical Device In Your Network

    Healthcare organizaitons are beginning to realize the operational benefits of Internet of Things (IoT) devices, creating an industry-specific niche known as Internet of Medical Things (IoMT). Watch this webinar to learn more about IoMT-related security threats, considerations, recommended strategies and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences