Palo Alto Networks Whitepapers


Sort by: Date | Company | Title


Application Usage and Threat Report
By Palo Alto Networks | 5/1/2015
The Application Usage and Threat Report (June 2014) provides a global view into enterprise application usage and the associated cyber threat landscape. Accomplished by summarizing network traffic assessments conducted across more than 5,500 organizations worldwide between March 2013 and March 2014. This version of the report will analyse the relationship between threats and their application vectors. The most surprising data points being both the diversity of applications displaying threat activity and the high concentration of activity surrounding only a few key techniques.
Download this now


A Spotlight on Malware Attack Vectors in Key Industries
By Palo Alto Networks | 5/1/2015
This edition of the recurring Threat Landscape Review examines data from WildFire™, a key component of the Palo Alto Networks threat intelligence cloud, to identify how organizations in different industries are targeted and affected by malware. Download the latest research from Unit 42 to see current trends and malware distribution patterns across 10 industries, and find out what you need to know about the Kuluoz malware family, and how to defend against it.
Download this now


5 Keys to Preventing Advanced Attacks
By Palo Alto Networks | 14/11/2013
It is no secret that modern information-based attacks have become increasingly sophisticated and common, and these advanced threats present one of the most important challenges facing network security teams today. In this whitepaper, we look at some of the most important criteria to consider when architecting your defences against advanced attacks and modern malware.
Download this now


Reducing Costs With Next-generation Firewalls
By Palo Alto Networks | 14/11/2013
For enterprise IT security organizations, the evolution of applications and threats, coupled with the stagnation of traditional network security technology has resulted in a loss of visibility and control. This paper examines three different organizations, the legacy infrastructure they replaced, the firewalls they deployed and the subsequent savings.
Download this now


The Application Usage and Threat
By Palo Alto Networks | 14/11/2013
This whitepaper provides provides a global view into enterprise application usage and the associated threats by summarizing network traffic assessments conducted in 3,056 organizations worldwide in 2012. The application and threat patterns discussed within this report dispel the position that social networking, filesharing and video applications are the most common threat vectors, while reaffirming that internal applications are highly prized targets.
Download this now


Application Usage and Risk Report on Enterprise Networks in Australia and New Zealand
By Palo Alto Networks | 22/3/2012
The data in this presentation is based on actual network traffic. Findings include: Number of social networking applications per organisation; Number of browser-based filesharing applications per organisation; filesharing use for entertainment or work and more. See the results of this Application Usage and Risk Report.
Download this now


Eliminating Compromise in the Data Center
By Palo Alto Networks | 22/3/2012
The ever-increasing demands for application availability and performance, the constantly evolving threat landscape, and the need to understand what is happening with applications from a security perspective combine to make the seemingly easy demands for data center network security much more difficult to meet. Indeed, most organizations have been forced into significant compromises – trading security, function, and visibility for performance, simplicity, and efficiency. Read on.
Download this now


10 Things Your Next Firewall Must Do
By Palo Alto Networks | 24/1/2012
While the next-generation firewall (NGFW) is well defined by Gartner as something new, enterprisefocused, and distinct, many network security vendors are claiming NGFW is a subset of other functions (e.g. UTM or IPS). Most traditional network security vendors are attempting to provide application visibility and control by using a limited number of application signatures supported in their IPS or other external database. But underneath, these capabilities are poorly integrated and their products are still based on legacy port-blocking technology, not NGFW technology. Read on.
Download this now


IDC Whitepaper: Next Generation Firewall - Enabling New Security Strategies
By Palo Alto Networks | 24/1/2012
The firewall market has traditionally been a staple, yet, mature market within the security space with little innovation being introduced. However, with the rapid change in the technology and threat landscape, a newer breed of of innovation focussing on applications visibility and control, termed Next Generation Firewalls has surfaced. This paper examines how Next Generation Firewalls can help organisations identify and block threat, while at the same time enforcing policies at an application level and ultimately helping organisations reduce the number of security devices and thus, saving costs.
Download this now

Top Whitepapers

Featured Whitepapers