Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Big Data, Cloud and Mobile.

Filter the library by ...

10 Things Your Next Firewall Must Do

This paper discusses ten points to consider and actively test in your current security i nfrastructure and your future NGFW.

eBook | Presented by Palo Alto Networks

Cloud Security for a Good Night’s Sleep

In this eBook, you’ll learn how Palo Alto Networks and Microsoft Azure can help you modernize and cut costs with next-generation security that prevents cyberthreats - from servers to the cloud to endpoints and everywhere in between.

eBook | Presented by Palo Alto Networks

eBook: Cloud Security and Compliance for Dummies

This e-book provides a step-by-step guide to properly managing cloud risk without slowing deployment. It's designed to help you build security directly into your company's processes, understand the cloud and its impact on security and compliance and adopt a scalable cloud security strategy.

2018 NSS Labs Advanced Endpoint Protection Report

Palo Alto Networks® Traps™ advanced endpoint protection stands apart in its ability to protect endpoints from attacks that leverage malware, exploits and ransomware before they can compromise endpoints by combining multiple methods of prevention.

CyberEdge Group: 2018 Cyberthreat Defense Report

Based on a survey of 1,200 IT security decision makers and practitioners, the report delivers countless insights that IT security teams can use to better understand how their perceptions, priorities, and security postures stack up against those of their peers.

2018 Next Generation Firewall Test Report and Security Value Map

NSS Labs® has published the results of its 2018 “Next Generation Firewall Test Report” and Security Value Map™, and we’re happy to report that our NGFW blocked 100% of evasions, helping us earn a Recommended rating – the highest NSS Labs offers.

10 Requirements for Securing Endpoints

Endpoint security historically meant using ineffective antivirus tools. Read ten requirements for effectively protecting systems, users and endpoints.