Displaying 31 - 60 of 153
Article
Qu’est-ce qu’un botnet ?
Un bot est un malware qui infecte un ordinateur pour exécuter des commandes pilotées à distance par un attaquant.
Datasheet
Preparing for CMMC Solutions
Our portfolio of products can help support the CMMC compliance journey for any DIB organization.
Article
O que é um botnet?
A bot is a piece of malware that infects a computer to carry out commands under the remote control of the attacker.
Article
¿Qué es una Botnet?
A bot is a piece of malware that infects a computer to carry out commands under the remote control of the attacker.
Article
¿Qué es una botnet?
Un bot es un malware que infecta un ordenador para ejecutar comandos controlados a distancia por un atacante.
Webinar
Future-Proofing Federal Cybersecurity: Cloud Security Continuous Improvement under EO 14028
Tune into this fireside chat with industry leaders from Palo Alto Networks and Deep Water Point to learn their insight and perspective on Executive Order 14028 and how a Cloud Native Application Protection Platform addresses continual improvement and increased cybersecurity while adhering and complying with EO 14028.
Whitepaper
Prisma Cloud Goes FedRAMP High: Expanded Capabilities for the CISA’s CDM Program
In its commitment to be the government's cybersecurity partner of choice, Prisma Cloud and the entirety of Palo Alto Networks provides unparalleled support for federal organizations, with dedicated investment in creating tools for a safer and more secure digital world.
Whitepaper
Army 2030 Network Requirements - Security & Data Analysis Whitepaper
Download our whitepaper that covers Army 2030's network needs: whole-network approaches, security, data analysis, and Zero Trust for military communications.
Whitepaper
Enhance Your Cybersecurity Posture with the CIS Controls and Palo Alto Networks
A Blog outlining how the Center for Internet Security (CIS) developed controls to help enhance cybersecurity by sharing insights, tools and maping specific controls to various regulatory frameworks.
Research Reports
Frost Radar™: Cloud Workload Protection Platforms, 2023
Cloud workload protection platform (CWPP) solutions evaluated by Frost and Sullivan in the 2023 Frost Radar report help organizations match the CWPP to their needs.
Video
Securing the Future: Leadership Lessons in Building Secure Operations
FedTalks 2023, Presented by FedScoop. Live from the Waldorf Astoria in Washington, D.C..
Whitepaper
AI & The Modern SOC: Winning Tomorrow’s Cyber Mission Through Advanced Capabilities
Advanced AI will radically change the nature of government operations, policy and security, including changing the capabilities of human teams.
Presentation
Protecting patients during the pandemic by securing the Internet of Medical Things
A large public sector healthcare organization had millions of unsecured IoMT and IoT devices jeopardizing patient care, data privacy, and network security.
Other
Secure Your Entire Organization with Cybersecurity Solutions That Work Better Together
Today’s organizations are complex, cloud-enabled, and continually transforming—with increasingly larger IT environments and more distributed endpoints.
Whitepaper
Modernize federal operations and tackle cybersecurity complexity with Zero Trust
Keeping up with cyber threats in the highly regulated and cloud-enabled US Public Sector can be challenging.
Event
Public Sector Ignite '23
Public Sector Ignite '23 will bring together leading cybersecurity experts and government luminaries to explore what’s next in cybersecurity.
Live Event
Book
Ahead for SLED: Conversations with Security Leaders in State and Local Government
State, local, and education (SLED) organization’s IT and security teams face challenges with implementing security solutions while often dealing with limited budgets and staffing. Additionally, they must navigate rules and regulations at state and local levels, as well as federal regulations and requirements. This e-book showcases real-world conversations with SLED security leaders who discuss how Cortex XDR, Cortex XSOAR, and Cortex Xpanse help minimize those challenges via automation, analytics, and machine learning to transform their security operations.
Use Case
Cloud Native Security Across The Software Lifecycle
Federal departments and agencies will use the cloud as a new
foundation upon which to build more effective security across
domains, including cyberspace.
Whitepaper
Scale Your SOC with Cortex Xpanse and Cortex XSOAR - Federal Version
Integrating Cortex Xpanse attack surface management and Cortex XSOAR, a security orchestration, automation and response (SOAR) platform helps federal agencies automate attack surface remediation workflows to drastically reduce their mean time to detect and mean time to respond.
Article
What is the Difference between FISMA and FedRAMP?
To deliver cloud-based services to the government, it’s important to have an understanding of government-enacted Federal IT compliance standards
Webinar
Lessons Learned on the Zero Trust Journey
During this webinar, you will learn how to, Establish the criteria for defining an agency's most sensitive and valuable data, Delineate elements of the network, including third-party access, to be addressed in a zero trust architecture, Define the role of strong identity management and its role in zero trust, Identify all applications used by the networks for continuous monitoring
Whitepaper
Protect Your Cloud Journey in the Public Sector
MMIS and IES are complex in-service modules that reside on large-scale IT infrastructure.
Webinar
GovExec Zero Trust CyberSmart TV Series
Adopting a Zero Trust architecture is certainly not a new concept, but its implementation has never felt as urgent as it does now. With sophisticated and tireless cyberthreats, a permanently expanded perimeter defining the next normal and increased support from the current administration to prioritize Zero Trust advancement, federal agencies are taking unprecedented measures to modernize their security efforts and defend against tomorrow’s attacks. Join Nextgov and Route Fifty in this episode to explore the efforts made since the Biden administration’s Executive Order on Improving the Nation's Cybersecurity and the path forward for Zero Trust.
Datasheet
Prisma Access, a FedRAMP Authorized Service
Rapidly connect remote users and branches with Prisma Access, a FedRAMP Authorized service
Webinar
Cloud Native Application Protection for DOE and NASA
Prisma Cloud enables you to secure your cloud native infrastructure and cloud native applications using a single dashboard.
Webinar
Defining Moments: The Future of the Workforce
MeriTalk's Defining Moments explores events that are having profound effects on government and IT. Palo Alto Networks Senior Vice President of Public Sector Dana Barnes kicks off the new series with an examination of how the global pandemic inspired a new working world.
Webinar
Scaling and Securing Cloud Management for Defense Applications
Reliance on legacy networking architectures has seen DOD leaders across the globe contending with scalability, performance and usability constraints across their cloud access points.
Datasheet
5G-Native Security At a Glance
Learn how 5G-Native Security protects all facets of the 5G infrastructure, including the user communications, applications, and data of business-critical enterprises, governments, as well as consumers.
Webinar
Effectively Monitoring and Managing Internet Operations is Not Optional
The SolarWinds hack, increasing pressure on U.S. networks by foreign incursions and software vulnerabilities underline the importance of effective internet operations management.
Displaying 31 - 60 of 153