ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Palo Alto Networks

  • Unit 42 Attack Surface Threat Report

    Explore the latest cybersecurity threats and vulnerabilities in the Unit 42 Attack Surface Threat Report. Uncover critical insights to strengthen your security posture. Read the full report for comprehensive analysis.

  • A New Regulatory Era for Cybersecurity

    As the cybersecurity landscape evolves, organizations must stay ahead of new regulatory changes, including requirements from the U.S. Securities and Exchange Commission (SEC). Read this 12-page e-book to learn about the SEC cybersecurity reporting rule, what it covers, how to comply with it, and much more.

  • 5 Essential Steps to SOC Transformation

    This guide explores five essential steps to transform your security operations center (SOC) for the modern threat landscape. Learn how to elevate your SOC with automation and AI to better detect, investigate, and respond to threats. Read the full SOC Transformation Guide to optimize your security operations.

  • 10 Essential Use Cases for Attack Surface Management

    Discover 10 essential use cases for attack surface management to secure your complex, evolving attack surface. Learn how Cortex Xpanse can help you prevent ransomware, eliminate shadow IT, respond to zero-days, and more. Read the full e-book to take a proactive approach to attack surface management.

  • Optimizing Security Operations with Palo Alto Networks’ Cortex XSOAR

    Cortex XSOAR is a powerful SOAR platform that empowers security teams to automate incident response, manage cases, and leverage threat intelligence. This in-depth review examines XSOAR's capabilities, including dashboards, reporting, incident management, and playbooks. Discover how XSOAR can optimize your security operations. Read the full review.

  • Magic Quadrant for Single-Vendor SASE

    This Gartner Research Report evaluates 9 leading single-vendor SASE offerings, examining vendor strengths, cautions, and market trends. Download this Gartner Magic Quadrant for Single-Vendor SASE to make an informed SASE selection for your organization.

  • Driving the Future of Work Through Enterprise-wide SASE

    This e-book explores how Secure Access Service Edge (SASE) empowers the hybrid workforce, supports cloud initiatives, enables branch transformation, and secures contractors and BYOD. Read the e-book to obtain guidance on SASE implementation and key elements of an effective solution.

  • A Practical Guide to Deploying SecOps Automation

    This e-book offers a guide for deploying SecOps automation, focusing on key considerations, defining use cases, best practices, and starting simple with an easy-to-follow plan. Read the e-book to get started and to pave your way to SecOps automation success today.

  • The Forrester Wave™: Attack Surface Management Solutions, Q3 2024

    Forrester Wave evaluates 11 leading attack surface management (ASM) providers, highlighting their strengths and weaknesses. Discover how vendors like CrowdStrike, Palo Alto Networks, and Trend Micro stack up in this comprehensive report.

  • Buyer’s Guide for Data-Centric Security Tools

    Discover how data-centric security tools like DSPM and DDR can help secure your data across cloud environments. Learn what to look for when evaluating cloud data security providers. Read the full Buyer's Guide to learn more.

  • The State Of Cloud Data Security

    This research report analyzes over 13 billion files to reveal where sensitive data resides in the cloud, who has access to it, and how it flows between services. Learn how to improve cloud data security and compliance by reading the full report.

  • The Definitive Guide To Container Security

    Securing container environments requires understanding tools and policies for protecting infrastructure, applications, and components. This guide explores container security across the lifecycle, from build to runtime, and offers a roadmap to prepare your environment and secure your containers. Read the full e-book to learn more.

  • The State of Cloud-Native Security Report

    This annual report examines the security practices, tools, and technologies that organizations worldwide are employing to secure cloud services and new application tech stacks. Explore insights on cloud migration strategies, data security challenges, and the impact of AI on application development. Read the full report.

  • The Total Economic Impact™ Of Palo Alto Networks Prisma Cloud

    Prisma Cloud secures applications across multicloud environments. Forrester found that it can deliver a 264% ROI by improving SecOps efficiency, boosting DevOps productivity, and reducing breach costs. Read the full Forrester Total Economic Impact report now to learn more.

  • Establishing a Governance Framework for AI-Powered Applications

    This whitepaper explores establishing a governance framework for AI-powered applications. It covers the AI landscape, security implications, and risks like data poisoning and model bias. Readers will learn to gain visibility into AI models, implement control policies, and maintain compliance. Read the full white paper for AI governance practices.

  • Cortex XSIAM The Machine-Led, Human-Empowered Security Platfrom

    Advanced cyberthreats necessitate an advanced security posture. This white paper maps out how, with Cortex XSIAM, you can advance your organization's posture through a machine-led, human-empowered approach. To learn about how the platform works and the outcomes it has driven for Imagination Technologies Group, read on.

  • XSIAM Buyer's Guide: How to Transform Your SOC for the AI Era

    This buyer's guide explores a transformative approach to adapt your security operations center for the AI era. Inside, you'll learn how to address evolving security challenges, improve critical SOC metrics, and future-proof your security operations. Read the full buyer's guide now to find out if XSIAM is the right solution for your organization.

  • The economics of Palo Alto Networks Software Firewalls

    Palo Alto Networks Software Firewalls can provide significant benefits like 25% savings in firewall deployment, 50% reduction in security posture attainment time, and 15% reduction in data breach risk. Read the full Forrester Total Economic Impact report to see how your organization could benefit.

  • Incident Response Report 2024

    This Incident Response Report from Unit 42 by Palo Alto Networks provides insights into the latest threat actor tactics, techniques, and targets. Learn how to enhance your security posture, detect threats faster, and respond more effectively. Read the full report.

  • 5 Security Concerns for CISOs and How to Address Them

    This white paper explores 5 key security concerns for CISOs, including supply chain attacks, cloud security, and overloaded security teams. Get expert guidance on how to address these issues and prepare your organization for evolving cyberthreats. Read the full white paper to learn more.

  • Incident Response Report 2024

    This comprehensive incident response report analyzes the latest attack tactics, including the rise of AI-enabled social engineering and the threat of encrypted data stockpiles. Learn how to strengthen your security posture and accelerate your response to cyberthreats. Read the full report now.

  • A New Regulatory Era for Cybersecurity

    Explore the latest regulatory changes impacting cybersecurity. This white paper provides in-depth insights to help you navigate the evolving landscape. Read the full white paper to learn more.

  • AI-Driven SOC Transformation with Cortex XSIAM

    Discover how AI-driven solutions like Cortex XSIAM can transform your security operations center (SOC). Learn how leading organizations improved efficiency, reduced false positives, and accelerated incident resolution. Read the white paper to see the results XSIAM can deliver for your SOC.

  • 5 Essential Steps to SOC Transformation

    Discover the 5 essential steps to transform your Security Operations Center (SOC) and elevate your security with automation and AI capabilities designed for the modern threat landscape. Learn how to overcome challenges and achieve a best-in-class SOC. Read the guide.

  • UNIT 42 Managed Services Threat Report Summary

    The MITRE Engenuity Unit 42 team identified a sophisticated attack involving APT10 and BlackCat groups. The report details the attack vectors, malware analysis, and recommendations to enhance your security posture. Read the full report to understand the impact and mitigate the risk of similar attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.