Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...
CLEAR

eBook | Presented by Palo Alto Networks

Cloud Security & Compliance For Dummies®

In the rush to the cloud – whether SaaS, public, private or hybrid – it can be hard to know if you’re doing enough to secure your data and apps there.

eBook | Presented by Palo Alto Networks

Cloud Security & Compliance For Dummies®

In the rush to the cloud – whether SaaS, public, private or hybrid – it can be hard to know if you’re doing enough to secure your data and apps there.

ESP @ Work - Continuous Security and Compliance in the Cloud

In this guide you’ll find snapshots that describe what challenges our customers are facing and the solutions they are using to overcome them.

SWIFT Mandatory and Advisory Security Controls

Take a Bite Out of the SWIFT Customer Security Controls Framework with Palo Alto Networks Security Operating Platform

The Total Economic Impact Of Palo Alto Networks (A Forrester Study)

Forrester Consulting concludes that Palo Alto Networks total economic impact results in nearly 10 million dollars in total benefits and 65% ROI.

2018 NSS Labs Next-Generation Firewall Report

Palo Alto Networks® is focused on securing your business with a prevention-focused architecture you can easily deploy and operate. In its 2018 “Next Generation Firewall Group Test Report,” NSS Labs® recognized this and gave our NGFW a Recommended rating.

The CISO Definitive Guide for Picking the NGFW That Works for You (IDC Workbook)

In this research, IDC affirms that NGFWs deployed as hardware, cloud service, and virtual machines are fast becoming the control plane for an organization's security strategy. IDC and Palo Alto Networks offer practical guidance for increasing your security maturity by picking the right NGFW for your organization.

2018 NSS Labs Advanced Endpoint Protection Report

NSS labs awards Palo Alto Network Traps Endpoint Security a rating of "recommend" in the Advanced Endpoint Protection Test.

Traps: A Key Tool for the Road to GDPR Compliance

Traps assist GDPR compliance in five key ways: preventing unauthorized access; preventing unauthorized or unlawful processing and accidental loss, destruction or damage; applying data protection by design and by default; facilitating risk mitigation; and accounting for state-of-the-art technology.

VM-Series on Google Cloud Deployment Guidelines

From a security perspective, moving your applications and data to GCP does not necessarily eliminate or minimize your security challenges, which is why it’s so critical to understand the shared responsibility model.

Load More