Overview: Palo Alto Networks™ is the leader in next-generation firewalls, which accurately identify and control applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by Palo Alto Networks.
Research offered by Palo Alto Networks
10 Things Your Next Firewall Must Do by Palo Alto Networks. March 24, 2011 - Users continue to adopt new applications and technologies – and the threats carried by them. In some organizations, obstructing the adoption of new technologies can be a career-limiting move.
A Pragmatic Approach to Network Security for Virtualized Computing Environments by Palo Alto Networks. April 16, 2012 -
Organizations often struggle when it comes to virtualization technologies, especially in providing adequate network security for modern computing environments. In this paper, explore the common challenges organizations face today and uncover a framework and best practices that organizations can use to address them.
Controlling Botnets with the Next-Generation Firewall by Palo Alto Networks. March 14, 2012 - View this paper for an overview of botnets and how they work; and uncover a model that can enable enterprises to proactively protect themselves with the unique capabilities of next-generation firewalls.
Next-generation firewalls are mainstream: What to expect by Palo Alto Networks. March 15, 2012 - Today, as enterprises increasingly implement next-generation firewalls, there are a number of kinks that must be addressed. In this e-guide, explore the ins and outs of next-generation firewalls including the potential implementation headaches and how to overcome them.
Palo Alto Networks in the Data Center: Eliminating Compromise by Palo Alto Networks. April 20, 2012 -
This resource explores best practices for data center network security. Learn how to protect your business without compromising flexibility and application availability.
Protecting your Network and Data Center with Next-Gen Firewalls by Palo Alto Networks. April 13, 2012 - Learn how your organization can take advantage of next-generation firewalls. This resource provides clarity on this popular security solution so you can determine which features are right for your needs.
Solution Note: Enabling the Secure Use of Facebook by Palo Alto Networks. April 13, 2012 - With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner.
The Application Usage and Risk Report by Palo Alto Networks. December 01, 2011 - This Application Usage and Risk Report from Palo Alto Networks provides a global review of enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide. View now to uncover key findings so that you can build effective strategies to mitigate the risks inherent in certain application.
The Application Usage and Risk Report by Palo Alto Networks. June 30, 2010 - The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.
To Block or Not. Is that the Question? by Palo Alto Networks. December 01, 2009 - This White Paper is a practical guide to how to properly deal with Enterprise 2.0 applications (and what they are to begin with), from getting visibility to how to create and enforce policies that allow for safe enablement.