Overview
Explore
Expertise
Ecosystem
Select a tab
23 results found
The Evolution of Cortex: Building the Future of Security Operations
Built on a decade of innovation and strategic acquisitions, Cortex unifies data from endpoints, networks and cloud environments, empowering organizations to efficiently combat advanced cyber threats with minimal manual intervention.
Blog
• Nov 11, 2024
PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists
Looking to implement external dynamic lists in your Palo Alto NGFW or Prisma Access? This post will answer all your questions about how EDLs work in PAN-OS to dynamically improve your security posture.
Blog
• Oct 10, 2023
What is the Prisma Access Browser
The Prisma Access Browser, a custom Chromium-based browser by Palo Alto Networks, integrates advanced security services to offer seamless, robust protection. It validates users, limits access based on roles and eliminates the need for cumbersome VPNs, making it an ideal solution for modern, flexible work environments.
Blog
• Nov 11, 2024
Introduction to XQL: Writing Your First Query
Learning a new programming or query language can be daunting, but if you've used the boolean options in a web search engine before, you can master XQL queries in no time. Like with web searches, we start with a hypothesis of our search, add filters to limit our results, and then validate the results that are returned against our hypothesis.
Blog
• Nov 18, 2024
What is Palo Alto Cloud NGFW?
Leverage the power of Palo Alto Networks Industry Leading Next Generation Firewall With Cloud Native Deployment, Scalability, Automation and Performance With Cloud NGFW from Palo Alto Networks.
Blog
• Dec 13, 2024
Introduction to Cortex XDR
Learn how Cortex XDR secures the future by rewiring security operations.
Blog
• Jan 23, 2023
Demystifying Precision AI: How Palo Alto Networks Is Redefining Cybersecurity
Precision AI by Palo Alto Networks revolutionizes cybersecurity by integrating machine learning, deep learning and generative AI for real-time, high-confidence threat protection.
Blog
• Nov 5, 2024
Enterprise Browsers vs Virtual Desktop Infrastructure (VDI): What are they, what do they do and how are they different
In today's digital workspace, organizations seek secure, efficient solutions to manage remote access and application delivery. This blog post explores the concept of an enterprise browser and virtual desktop infrastructure (VDI), detailing their functionalities, use cases and key differences. By understanding these tools, businesses can make informed decisions on which solution best meets their usability, security and operational needs.
Blog
• Sep 2, 2024
Assessing Good Data Loss Prevention with SSE
In a world of escalating cyber threats, effective Data Loss Prevention (DLP) is crucial. Secure Service Edge (SSE) solutions offer integrated DLP capabilities, enhancing data protection across networks, endpoints and cloud environments. Understanding and implementing "good" DLP practices ensures robust data security and compliance, evolving with organizational needs.
Blog
• Nov 21, 2024
Securing AI in Real-Time with Palo Alto Networks' AI Runtime Security
As AI adoption grows, so do the risks. Palo Alto Networks' AI Runtime Security offers real-time monitoring, advanced threat detection and zero-trust access controls to protect AI applications. This solution ensures data security, regulatory compliance and operational integrity, enabling businesses to confidently leverage AI's potential while mitigating vulnerabilities.
Blog
• Nov 19, 2024
ZTNA: More Than Just an Acronym
Zero Trust Network Access (ZTNA) is not just a buzzword your management is emphasizing; it's a critical design principle that should be integrated into your network security practices.
Blog
• Dec 5, 2024
Empowering Safe AI Adoption with Palo Alto Networks' AI Access Security
Palo Alto Networks' AI Access Security offers a comprehensive solution for managing and securing generative AI applications. It provides real-time visibility, granular access controls and advanced data protection, enabling organizations to harness AI's potential while minimizing risks of data leakage and unauthorized access. Embrace AI responsibly with AI Access Security.
Blog
• Nov 15, 2024