Palo Alto Networks

This category contains 631 posts

Traps “Recommended” in NSS Labs Advanced Endpoint Protection Test

We are excited to announce that Palo Alto Networks Traps advanced endpoint protection has achieved a “Recommended” rating, and is positioned in the upper-right corner of the NSS Labs AEP Security Value Map (SVM), indicating outstanding protection and low total cost of ownership. Attackers must complete a certain sequence of events to successfully accomplish their objectives, … Continue reading

See the Graph Security API in Action at RSA Conference 2018

Today, Microsoft announced the public preview of their Microsoft Graph Security API. The security API enables a single point of programmatic access to aggregated security insights from Microsoft and partner security solutions, as well as business information from other Microsoft Graph entities (Office 365, Azure Active Directory, Intune, and more) that can add high-value context to … Continue reading

Digital Transformation Gets Easier When Security Just Works

When I ask customers what they like about Palo Alto Networks, their answer is consistent: it just works. They can operate efficiently and prevent successful cyberattacks. Our Security Operating Platform is built for automation – it has to be easy to operate if we’re going to help our customers achieve digital transformation. You may not recognize the name “Security … Continue reading

Cloud Security: Embracing Change Requires a Mindset Shift

When meeting with organizations across EMEA, I often hear them cite concerns about putting security in the cloud. However, in the following discussions, they typically admit that doing just that is inevitable. There’s a mindset change here that needs to be embraced on all sides of the cybersecurity equation. I’ve worked previously with companies operating … Continue reading

Automating Cloud Security with Ansible and Palo Alto Networks

History has shown that using automation to perform repetitive tasks without human assistance can result in labor and production cost reductions as well as improvements to quality, accuracy and precision. In the ongoing effort to protect applications and data from bad actors, automating repetitive security tasks allows you to achieve the same benefits of accuracy, … Continue reading

Tech Docs: Get Started with Traps 5.0 and the New Traps Management Servic

We recently announced Traps 5.0 cloud-delivered advanced endpoint protection and there is already quite the buzz! The Traps 5.0 and Traps management service releases include the following key features: Cloud-delivered service—The Traps management service streamlines the deployment of your endpoint security infrastructure, thus eliminating the need to build, manage, and maintain management servers. Integration with the Logging … Continue reading

Announcing Traps 5.0: Cloud-Delivered Advanced Endpoint Protection

Our recent enhancements to Traps have focused on reinforcing prevention capabilities and introducing innovative techniques for protecting against malware, exploits and ransomware. At the same time, our team has also been focused on transforming Traps into a cloud-delivered advanced endpoint protection service. Today, we are excited to announce Traps 5.0, the most significant release for … Continue reading

Threat Brief: What’s Driving the Shift to Cryptocurrency Mining Malware?

Over the past six months, we’ve seen a major increase in the number of attack campaigns with the ultimate goal of mining cryptocurrency. It’s a subject Unit 42 has been tracking in the past year: Large Scale Monero Cryptocurrency Mining Operation using XMRig Unauthorized Coin Mining in the Browser Rig EK One Year Later: From … Continue reading

PAN-OS 8.1: New Features for the Financial Sector

Hopefully, you saw our recent announcement of PAN-OS 8.1. This blog will highlight the top three features in 8.1 that help bolster confidence and control in the growing use of the public cloud by financial institutions, and optimize the decryption infrastructure for operational efficiencies and and improved performance. Consistent Multi-Cloud Security Resiliency and geographic diversity are … Continue reading

Protecting Workloads on Google Cloud Platform with the VM-Series

One of three articles in a series about the VM-Series on: Google, AWS and Azure. Organizations are adopting Google Cloud Platform to take advantage of the same technologies that drive the commonly used Google search engine and maps services. Business initiatives – such as big data, analytics and machine learning – deployed on GCP can … Continue reading

Web Stats

  • 132,330 hits


@PhilipHungCao, CISM, CCSP, CCSK, CASP, CIW-WSP, GICSP, PCNSE, ACSP, CCDA, DCSE, JNCIA, MCTS, MCSA, VCP5-DCV, VCP6-NV, ZCNT is a #TekF@rmer. He has 17 years' experience in ICT/Cybersecurity industry in various sectors & positions.

Personal Links

View Full Profile →

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 2,799 other followers

Twitter Updates


April 2018
« Mar