Research Library

Powered by

All Research Sponsored By:Palo Alto Networks

  • Surviving Ransomware - What You Need to Know

    Ransomware attacks dominate headlines in a seemingly endless parade of compromises in numerous sectors. From Trojan.Gpcoder, the first modern ransomware exploit, to high-profile hits on Colonial Pipeline, it’s becoming clear that security practitioners are up against formidable foes. Read this white paper to learn how to survive ransomware.

  • The Essential Guide to MITRE ATT&CK Round 4

    For the 4th round of the MITRE ATT&CK Evaluations, 30 vendors participated to see how their solutions stacked up to protect and defend against relevant and sophisticated threat groups. Read this e-book provides a comparative look at how vendors performed across various measures, with guidance on how to explore the results further.

  • Cloud NGFW: Best-in-Class Security, Unparalleled Simplicity on AWS

    Amazon Web Services (AWS) and Palo Alto Networks have introduced Cloud NGFW. Tap into this e-book to learn how to deploy next-generation protection quickly and easily.

  • Container Security 101

    Developers have widely embraced containers because they are designed to make building and deploying so-called cloud native applications simpler, but they also carry a range of cybersecurity issues. Download this e-book to learn how you can ensure security for these essential applications.

  • The Forrester New Wave™: Extended Detection And Response (Xdr) Providers, Q4 2021

    This Forrester report details how XDR solutions vary in maturity, cohesiveness, vision, and realization. Read this report to make sure you’re selecting the right partner for your XDR needs.

  • The State of Cloud Native Security Report 2022

    Palo Alto Networks surveyed 3,000 security and DevOps experts at the forefront of the cloud and cloud native security ecosystem and asked: What's happening in cloud native security today and what's working best for organizations? Open the report to get a deeper analysis and unlock all the facts.

  • How Soar Is Transforming Threat Intelligence

    Today’s security teams still rely on siloed threat intelligence platforms (TIPs) to provide visibility into external threats, but teams still struggle to take automated actions on relevant indicators across disjointed threat feeds. Access this white paper to learn how the Cortex XSOAR platform is designed to provide 3 key benefits.

  • Palo Alto Networks Special Edition: XDR

    With the combination of too many alerts and too little context, you could lose visibility and control. Ultimately, your company becomes even more at risk as a result. Access this e-book, XDR for Dummies, to learn 10 key XDR capabilities and features, XDR use cases and more.

  • The State of Security Automation

    According to a 2021 Palo Alto Networks report, respondent report that the 3 highest volume incident types were phishing alerts (74%), malware alerts (56%) and endpoint security alerts (53%). Download this comprehensive report to learn how you can approach security automation.

  • Security Automation Maturity Model

    For SecOps teams, the move to implement security orchestration, automation and response (SOAR) tools is a methodology for keeping up with the pace of today’s evolving threats. Download this IDC report to learn how SOC teams have optimized their SOAR strategy.

  • From The Node Up: The Complete Guide To Kubernetes Security

    Tap into this e-book to learn how to keep your Kubernetes-based workloads secure, no matter how large your cluster is or which type of infrastructure you use to host it—on-premises, public cloud, or managed service.

  • Enterprise Data Loss Prevention, Revisited

    To protect data assets both in motion and at rest, a modern approach to data loss prevention (DLP), designed for today’s digital enterprise, is paramount. Read this exclusive ESG white paper to learn more about rethinking DLP for the modern workflow.

  • Overcoming Enterprise Data Protection Challenges

    Data usage and dependence has evolved rapidly in recent years – which has led to a rise in the necessity for effective data loss prevention (DLP), especially as organization migrate their data to the cloud. Access this exclusive e-book for a closer look at modern data protection challenges and requirements and an intro to cloud-based DLP.

  • The Enterprise Buyer’s Guide to: Integrated CASB Security

    To address today’s cloud security challenges, enterprises must take an integrated approach to CASBs to keep up with the exponential growth of SaaS. Download this e-book to learn about 5 must-haves of an integrated CASB solution, solution benefits and more.

  • XDR

    With the combination of too many alerts and too little context, you could lose visibility and control. Thus, extended detection and response (XDR) emerged as an answer to this complexity. But, how does XDR work? Download this e-book now to get up to speed on the XDR category of security solutions and what it can mean for your company.

  • The Evolution of Cloud Access Security Brokers

    Today, organizations rely on the cloud for core business applications and data, but a layered approach has also increased complexity and brings new challenges. This ESG report digs into how integrating CASB with SaaS security providers aims to address these challenges by delivering key capabilities. Read on to get started.

  • Navigating the SaaS Security Jungle

    SaaS applications have become popular in recent years due to their widespread availability, ease of use, and low costs – but they’re not always secure. In this white paper, you will learn about how a SASE solution is designed to assist your cloud transformation and safely adopt SaaS applications. Download now to learn about solution benefits.

  • Unlocking the Power of Threat Intelligence

    As the threat landscape continues to evolve, enterprises need to modernize security and automate security systems to stay ahead of threat actors. In this panel discussion experts explore threat intelligence management solutions on the market today, implications of paying or not paying ransom and more. Watch now to get started.


    Supply chain attacks in the cloud continue to grow as an emerging threat. To gain insight into this growing threat, Palo Alto Networks Unit 42 cloud threat researchers analyzed data from a variety of public data sources around the world. Download the report to learn the full scope of supply chain attacks and their connection to cloud security.

  • Whitepaper: Creating Intelligent SOCs: Cortex XSOAR Top Machine Learning Use Cases (G)

    Read this white paper to explore 6 use cases that describe the challenge SOCs face, how Cortex XSOAR helps and the benefits these capabilities provide.

  • Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR

    Extended detection and response (XDR) have become the answer for security teams needing a simpler, more effective way to approach cybersecurity concerns.In this report, ‘Adapt or Die: XDR is on a Collision Course with SIEM And SOAR', authored by Forrester industry analyst Allie Mellen, see why EDR is dead, long live XDR.

  • The Essential Guide to XDR

    Extended detection and response (XDR) changes everything by breaking down security silos. Investing in XDR today can protect you against tomorrow’s threats. Read the guide to learn more about its applications and use cases.

  • Discovering Your Total Cloud Footprint

    Today’s organizations are creating and abandoning assets in the cloud, leaving huge cloud footprints that are hard to see in the ephemeral IP space they occupy. Read this brief to learn how your organization can get complete cloud visibility with a “whole-of-internet” approach to discovering and securing cloud assets.

  • Security Ratings are a Dangerous Fantasy

    Security ratings – as they’re presently conceived and sold – don’t and can’t work the way you need them to. Namely, they don’t predict breaches or help people make valuable business decisions, and they don’t directly make anyone safer. Read this white paper to learn a better way to measurably improve external network postures.

  • Cloud Workload Security, Q1 2022

    The cloud workload security (CWS) market has been undergoing considerable consolidation – according to Forrester, organizations increasingly prefer suite providers over disparate tools. Access this Forrester Wave report for a comprehensive evaluation of 12 CWS market leaders.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.