This paper examines the changing threat landscape and highlights the importance of best-in-class endpoint protection working in lockstep with other security products to create coordinated and comprehensive enterprise security. Palo Alto Networks Traps advanced endpoint protection provides superior endpoint threat prevention as well as bridges the gap between endpoint security and network security, augmenting next-generation firewalls to provide stronger defense with fewer resources.


Технический документ

10 Things to Test In Your Future NGFW

This paper discusses ten points to consider and actively test in your current security i nfrastructure and your future NGFW. Using these as guidelines for cross-functional conversations, you will expand the lens through which you can view your NGFW in order to determine if your potential security investments are easy to implement, alleviate workloads, and offer your organization the best protection and value, today and in the future.

  • 1

Техническое описание

VM-Series for Amazon Web Services

Key features, performance capacities and specifications of VM-Series for Amazon Web Services.

  • 1

Техническое описание

PA-5200 Series Specsheet

Palo Alto Networks® PA-5200 Series of next-generation firewall appliances comprises the PA-5260, the PA-5250 and the PA-5220, which target high-speed data center, internet gateway and service provider deployments. The PA-5200 Series delivers up to 72 Gbps of throughput using dedicated processing and memory for the key functional areas of networking, security, threat prevention and management.

  • 4205

Техническое описание

PA-7000 Series Specsheet

Key features, performance capacities and specifications for our PA-7000 Series.

  • 1

Техническое описание

PA-800 Series Specsheet

Palo Alto Networks PA-800 Series next-generation firewall appliances, comprising the PA-820 and PA-850, are designed to secure enterprise branch offices and midsized businesses.

  • 4205

Статья

Top 3 Security Considerations for the Cloud

This brief discusses the top three considerations for securing traditional and cloud-based data centers, as well as key requirements for cloud security.

  • 1