Profile

Cover photo
543 followers|342,400 views
AboutPostsPhotosYouTube

Stream

Palo Alto Networks

Shared publicly  - 
 
Palo Alto Networks regional CSO Sean Duca discusses what the convergence of corporate IT and operational technology means for cybersecurity http://bit.ly/1Ky0p67 
1
Add a comment...

Palo Alto Networks

Shared publicly  - 
 
Ever wondered how long it takes to identify & resolve a cyberattack? You’re looking at 24 days http://bit.ly/1fyXHQ8
1
1
Chiang Lin Ng's profile photo
Add a comment...

Palo Alto Networks

Shared publicly  - 
 
Secure server configurations for virtualized environments http://bit.ly/1HUgexX
1
Add a comment...

Palo Alto Networks

Shared publicly  - 
 
Know the unknown: effective prevention of and response to threats http://bit.ly/1g1cJ29
2
2
Nataly Mejia's profile photoJacob Heejeong Yang's profile photo
Add a comment...

Palo Alto Networks

Shared publicly  - 
 
Rick Howard explains why network defenders should transform tactical incident response groups into full-scale cyber intelligence teams http://bit.ly/1fPGUcw 
1
Add a comment...

Palo Alto Networks

Shared publicly  - 
 
Does Rick Howard think this 2011 book is Cybersecurity Canon-worthy? Find out http://bit.ly/1OgxYrO
1
Add a comment...
Have them in circles
543 people
William Cook's profile photo
don crossman's profile photo
Glyn  Cheesman's profile photo
David Macia's profile photo
Vangelis Neroladakis's profile photo
ZYCKO's profile photo
Jim Lucking's profile photo
László Sándor's profile photo
Paul Swanson's profile photo

Palo Alto Networks

Shared publicly  - 
 
Telstra becomes first Palo Alto Networks Diamond Partner in Asia Pacific region http://bit.ly/1I7s0VX
1
Add a comment...

Palo Alto Networks

Shared publicly  - 
 
All of the top Palo Alto Networks news from the past week is right here http://bit.ly/1DEwCB2
1
1
Marius Dreyer's profile photo
Add a comment...

Palo Alto Networks

Shared publicly  - 
 
Find out why Jon Oltsik thinks The Florentine Deception by Carey Nachenberg is a logical addition to the Cybersecurity Canon http://bit.ly/1HSvUSu
1
1
Chiang Lin Ng's profile photo
Add a comment...

Palo Alto Networks

Shared publicly  - 
 
All the top Palo Alto Networks news from the past week http://bit.ly/1Om6Fwh
1
Add a comment...

Palo Alto Networks

Shared publicly  - 
 
Webinar, 7/22: Join Del Rodillas of Palo Alto Networks and Mike Assante, Director of ICS at the SANS Institute, to take a closer look at APTs in ICS, and explore methods for protecting your organization against them using a platform approach http://bit.ly/1HNUYJg
1
Add a comment...

Palo Alto Networks

Shared publicly  - 
 
Unit 42 uncovers a new #CozyDuke campaign related to #Seaduke #malware http://bit.ly/1ObfI3d
1
1
Marius Dreyer's profile photo
Add a comment...
People
Have them in circles
543 people
William Cook's profile photo
don crossman's profile photo
Glyn  Cheesman's profile photo
David Macia's profile photo
Vangelis Neroladakis's profile photo
ZYCKO's profile photo
Jim Lucking's profile photo
László Sándor's profile photo
Paul Swanson's profile photo
Contact Information
Contact info
Phone
1.866.320.4788
Email
Story
Tagline
The enterprise security company.
Introduction

We are leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Because of our deep expertise, commitment to innovation and game-changing security platform, thousands of customers have chosen us and we are the fastest growing security company in the market.

Our security platform natively brings together all key network security functions, including advanced threat protection, firewall, IDS/IPS, and URL filtering. Because these functions are natively-built into the platform and share important information across the respective disciplines, we ensure better security than legacy firewalls, UTMs, or point threat detection products.

With our platform, organizations can safely enable the use of all applications, maintain complete visibility and control, confidently pursue new technology initiatives like cloud and mobility, and protect the organization from cyber attacks — known and unknown.