The Latest Palo Alto Networks News
Product and Solution Information, Press Releases, Announcements
Palo Alto Networks Joins the Responsible Business Alliance
At Palo Alto Networks, we believe our corporate responsibilities to respect our planet, uplift our communities and advance our industry are core to achieving our vision of a world where each day is safer and more secure than the one before. We view RBA membership as a foundational component of our comprehensive approach to Corporate Responsibility (CR).
Best Practices for Cloud Infrastructure: Zero Trust Microsegmentation
There’s a learning curve, however, to understanding how to apply that principle throughout your infrastructure. In the case of cloud native technologies, infrastructure and development processes often don’t look the same as in traditional environments. The way we apply Zero Trust must shift as well. In constantly changing cloud environments, Zero Trust microsegmentation is a technique that can help enforce cloud security policies that follow Zero Trust best practices.
The New Hybrid Workforce
The unprecedented COVID-19 pandemic necessitated multitudes of employees once confined to their corporate campuses to suddenly be enabled to work remotely. The pandemic also accelerated the move to digital transformation, requiring IT and cybersecurity teams to ensure that infrastructure and resources essential for work remain available and secure. And these changes do not appear to be temporary.
Cortex XDR: Fortify the SOC Against SolarStorm, Variants and Imitators
While organizations chase down their SolarWinds servers and investigate the impact of the attack, it’s important to prepare more broadly for what inevitably comes next. An attack of this level of sophistication, conducted by suspected nation-state operators, highlights a set of tactics, techniques and procedures (TTPs). It’s only a matter of time before copycats reverse-engineer and reuse elements of the attack. In addition, the original threat actors behind the attack will undoubtedly update their methods, changing not only indicators of compromise (IOCs) like domain names, but also adversary tactics and tools to evade security controls. Protecting against these unavoidable threats requires a robust and layered defense.
You Think You’re Prepared for the Next SolarWinds. You Are Not.
As the world focuses on the growing list of organizations that have been compromised, there’s also a growing list of those that believe they’re ok. Many have taken the approach that if they are not running SolarWinds, or a particular version of it, then they can go back to business as usual. I saw a security researcher post a picture of a whisky glass with ice and a cigar recommending other security folks to take a break, because he was fearful this could be a long winter.
Cortex XDR 2.6: Better Search for Better Threat Hunting
With XQL search, we’ve brought advanced query options – traditionally only available with log management and security information and event management (SIEM) solutions – to our detection and response platform. Now, your team can search across XDR data, merge findings from multiple data sources and explore over 800 catalogued fields to find stealthy threats. Investigations that previously required multiple queries across siloed tools can be performed in a snap with XQL search.
Chrome Enterprise Recommended Program Includes Palo Alto Networks App
Organizations are more mobile than ever, accessing the network from any place, at any time. Given this reality, endpoint antivirus and VPN technologies aren’t enough to stop advanced threats. By protecting Chrome device traffic with Prisma Access or the Palo Alto Networks Next-Generation Firewall using the GlobalProtect Android app for Chrome OS, organizations deploying Chrome OS devices can now secure their remote users and gain visibility into users, traffic and applications.
The Top 3 Benefits of Next-Generation SD-WAN
The SD-WAN market is at a critical inflection point. We are past the early adopters phase and mainstream enterprises are now looking to deploy SD-WAN. This is where many products sputter out, since mainstream customers often have requirements that are different or more comprehensive than the early adopters. To avoid failed deployments, customers must consider whether the products they are evaluating were designed for early adopters, or for mainstream customers, much like themselves. Understanding the context of SD-WAN solutions – and the benefits of Next-Generation SD-WAN – is essential when evaluating what the market has to offer.