Share Business Whitepapers and Research Papers.

Join the community of professionals just like you.

Featured Whitepaper

5 Critical Mistakes When Evaluating A Next-Generation Firewall

The firewall is the foundation of enterprise data security. All firewalls are not created equal, though and no two...

Decryption: Why, Where and How

The growth in encrypted (SSL/TSL) traffic traversing the Internet is on an explosive up-turn. And, unfortunately, criminals have learned...

GUIA PARA A SEGURANÇA DO MICROSOFT OFFICE 365 ENTERPRISE

Nos últimos anos, o Microsoft® Office 365® – a versão baseada na nuvem do pacote de colaboração da Microsoft...

Guide to Securing Microsoft Office 365 for the Enterprise

The skyrocketing adoption of Microsoft Office 365 has made it a valuable target for cybercriminals. While Microsoft’s security tools...

Best Practices for Executing on Zero Trust

The goal of the cybersecurity industry is to prevent successful cyberattacks. However, today\'s point product approach brings additional challenges:...

10 Things to Test In Your Future NGFW

This paper discusses ten points to consider and actively test in your current security infrastructure and your future NGFW....

10 Things Your Next Firewall Must Do

A true NGFW offers a prevention-focused architecture that is easy to deploy and operate; uses automation to reduce manual...

eBook: Cloud Security and Compliance for Dummies

In the rush to the cloud – whether SaaS, public, private or hybrid – it can be hard to...

AWS Security 12 Best Practices

Amazon® Web Services has been an advocate for strong cloud security since it launched in 2006. AWS® and its...

Network and Endpoint Security

The most promising weapon in the endpoint security arsenal is machine learning with its ability to quickly learn, make...

eBook: Business Case for Cloud Threat Defense

As your organization embraces public cloud computing, security and compliance challenges are top of mind. Traditional network monitoring tools...

5 Requirements for Effective Endpoint Protection

Organizations should select security products that provide superior security value, not just in terms of monetary cost but also...

Protecting Developer Environments With The VM-Series On AWS

The move to AWS is enabling many organizations to adopt a more agile, iterative application development methodology. In so...

Stop Targeted Attacks Without Decrypting Traffic

Threat actors conceal their attacks in SSL traffic to evade corporate defenses. Palo Alto Networks Security Operating Platform provides...

12 PRÁTICAS RECOMENDADAS PARA DEIXAR AS CONFIGURAÇÕES DO SEU AWS MAIS SEGURAS

O Amazon® Web Services defende a forte segurança da nuvem desde seu lançamento em 2006. O AWS® e seus...

eBook: Cloud Security and Compliance for Dummi

In the rush to the cloud – whether SaaS, public, private or hybrid – it can be hard to...

Guide to Securing Microsoft Office 365 for the Enterprise

The skyrocketing adoption of Microsoft Office 365 has made it a valuable target for cybercriminals. While Microsoft’s security tools...

Best Practices for Executing on Zero Trust

The goal of the cybersecurity industry is to prevent successful cyberattacks. However, today\'s point product approach brings additional challenges:...

Jump into the Security Operating Platform

Cyberattacks continue to disrupt businesses. Spending on security feels endless, and legacy security tools require analysts to manually stitch...

Protecting the Extended Perimeter with GlobalProtect Cloud Service

Your Perimeter Is Everywhere. The world you need to secure is undergoing tremendous transformation. Global expansion, mobile workforces and...
 
Page 4 of 226«23456»