Displaying 31 - 50 of 50
Use Case
Simplify the Retail Store Stack
Reduce costs of security and network hardware, infrastructure, and tool sets—all while simplifying operations and improving overall security posture
Whitepaper
PCI DSS v4.0 Compliance with Cortex XDR
Palo Alto Networks Cortex XDR™ enables you to satisfy multiple PCI DSS requirements and bolster your security posture with one integrated solution for prevention, detection, and response across your enterprise. Cortex XDR is the industry’s first extended detection and response platform that prevents advanced malware, exploits, and fileless attacks while also integrating endpoint, network, and cloud data to stop sophisticated attacks.
Research Reports
IDC InfoBrief: Securing the Entire Value Chain for Today’s Omnichannel Retailers
As the march to digital transformation accelerates on multiple fronts, the security risk profile for many retailers increases. The seamless omnichannel experience needed to compete in today’s environment requires a complete security portfolio across suppliers and all operations.
Book
云原生安全成熟度:以安全方式提高软件开发效率
Learn how senior decision makers secure their applications and underlying platforms, what tools they use, how they finesse systems and processes into organizational alignment and ways they leverage controls.
Whitepaper
White Paper: Modern Commerce Made Secure, How to improve business outcomes with better and stronger security from Palo Alto Networks
Palo Alto Networks offers the most comprehensive, and best-in-class set of cybersecurity solutions for Retailers. Learn how to improve retail business outcomes in this white paper.
Book
Cloud Native Security Maturity: Using Security to Drive Software
Learn how senior decision makers secure their applications and underlying platforms, what tools they use, how they finesse systems and processes into organizational alignment and ways they leverage controls.
Find out why security program maturity correlates to operational excellence and enables more functionality and on-time product delivery.
Leverage the insights of a thousand seasoned security professionals. Access key benchmarks of the development processes toward a mature security program in this actionable e-book.
Whitepaper
Your Retail Branches Are Under Siege
Learn the key challenges of branch security and how retail organizations can meet those challenges.
Whitepaper
Revolutionize NGFWs and CASB App-ID with Machine Learning
In this white paper we bring to you Palo Alto Networks’ point of view on why revolutionizing the Next-generation Firewall and CASB App-ID with machine learning is vital for SaaS Security.
Infographic
Which Cloud Defender Are You?
Learn how Zero Trust Network Access provides an integrated, comprehensive solution for segmentation, access control, and threat prevention in this interactive.
Whitepaper
Palo Alto Networks Prisma Access and Cradlepoint NetCloud Solution Brief
To learn more about the key benefits of implementing this integration and sample use cases, download the Palo Alto Networks Prisma Access and Cradlepoint NetCloud Solution Brief
Video
Securing Branch Offices with Prisma
Learn how Prisma can help secure your branch offices through cloud-delivered security in this short video.
Webinar
Protect your business with Security delivered from the cloud
Watch this webinar for an in depth overview of how Prisma Access delivers protection from over 100 locations around the world from a cloud-native infrastructure that dramatically simplifies cloud access and networking – without compromising on security or performance.
Security Roundtable Article
Back to the Basics: A Necessary Grind for Online Retailers
If we’ve learned anything from recent security breaches faced by several unfortunate retailers, it’s that often the attacks …
Erin Nealy Cox,
Security Roundtable Article
‘Poor Cyber Hygiene’: Three Dirty Words for Online Retailers
Breakdowns in routine cyber hygiene have resulted in several recent security breaches at online retailers. CISOs, CIOs, and …
Erin Nealy Cox,
Security Roundtable Article
Four Big Cyber Risks Facing CMOs this Holiday Season
Tis the season for costly cyberattacks and breaches, seasonal employees with access to sensitive data, malicious ad bots, …
Stephanie Overby,
Security Roundtable Article
Machine Learning Knows It Wasn’t You Who Swiped Your Credit Card
You’re sitting at home minding your own business when you get a call from your credit card’s fraud …
Security Roundtable Article
Happy Holidays! You’ve Been Hacked!
Businesses of every shape and size must be particularly vigilant during the holiday season. Scammers and cybercriminals rely …
Sam Greengard,
Security Roundtable Article
Blockchain For Beginners: Year of Hype, Year of Promise
The speaker took the stage in front of an audience of marketing professionals and pulled up a slide …
Mercedes Cardona,
References and Case Studies
株式会社東急ハンズ
出口対策に有効な仮想化次世代ファイアウォールを導入
東急ハンズは2017年10月、内部ネットワークとインターネットのゲートウェイに設置するセキュリティ対策機能として、パロアルトネットワークスの仮想化次世代ファイアウォール「VM-Series」を導入、運用を開始した。アマゾン ウェブ サービス(AWS)による“100%クラウド"
を推進する同社では、セキュリティ強化の一環として標的型サイバー攻撃の出口対策に有効なアプリケーションの可視化・制御を行うソリューションの導入を検討。日本のAWSユーザーが集まる「JAWS-UG(AWS Users Group-Japan)」での評価も参考にしながら機能・性能を比較した結果、VM-Seriesを選定したという。
Whitepaper
Secure the Network through Application Visibility PDF
Governments and businesses must continuously assess the use of new applications and services that improve processes and operations. As such, they must weigh the business benefits from the adoption of newly sanctioned applications against potential risk to the business, its data and other resources. Applications themselves, such as remote access, can represent undue risk. In addition, if applications are not appropriately secured in the business network, today’s attackers can hide communications within the very communication mechanisms the applications use. Adoption of security that appropriately identifies, granularly controls and secures enterprise applications can be slow if those charged with such controls don’t understand the necessity, value or ease with which appropriate controls can be adopted.
Download our use case "Secure the Network through Application Visibility" for the benefits of this approach, along with some common concerns over adoption, and read about the experiences of several customers across different industries who made this transition.
Displaying 31 - 50 of 50