Share Business Whitepapers and Research Papers.

Join the community of professionals just like you.

Featured Whitepaper

Protecting Developer Environments With The VM-Series On AWS

The move to AWS is enabling many organizations to adopt a more agile, iterative application development methodology. In so...

Stop Targeted Attacks Without Decrypting Traffic

Threat actors conceal their attacks in SSL traffic to evade corporate defenses. Palo Alto Networks Security Operating Platform provides...

12 PRÁTICAS RECOMENDADAS PARA DEIXAR AS CONFIGURAÇÕES DO SEU AWS MAIS SEGURAS

O Amazon® Web Services defende a forte segurança da nuvem desde seu lançamento em 2006. O AWS® e seus...

eBook: Cloud Security and Compliance for Dummi

In the rush to the cloud – whether SaaS, public, private or hybrid – it can be hard to...

Guide to Securing Microsoft Office 365 for the Enterprise

The skyrocketing adoption of Microsoft Office 365 has made it a valuable target for cybercriminals. While Microsoft’s security tools...

Best Practices for Executing on Zero Trust

The goal of the cybersecurity industry is to prevent successful cyberattacks. However, today\'s point product approach brings additional challenges:...

Jump into the Security Operating Platform

Cyberattacks continue to disrupt businesses. Spending on security feels endless, and legacy security tools require analysts to manually stitch...

Protecting the Extended Perimeter with GlobalProtect Cloud Service

Your Perimeter Is Everywhere. The world you need to secure is undergoing tremendous transformation. Global expansion, mobile workforces and...

5 Endpoint Protection Best Practices

Attackers must complete a certain sequence of events, known as the attack lifecycle, to successfully accomplish their objectives, whether...

10 Things to Test in Your Future NGFW

This paper discusses ten points to consider and actively test in your current security infrastructure and your future NGFW....

5 Mistakes When Evaluating a Next-Generation Firewall – WP

The firewall is the foundation of enterprise data security. All firewalls are not created equal, though and no two...

5 Requirements for Effective Endpoint Protection

Organizations should select security products that provide superior security value, not just in terms of monetary cost but also...

Protecting Developer Environments With The VM-Series On AWS

The move to AWS is enabling many organizations to adopt a more agile, iterative application development methodology. In so...

Comprehensive Data Security in the Cloud

Data and applications reside everywhere, on the network, endpoints, and in the constantly evolving cloud ecosystem. As a result,...

Safely Enable Your SaaS Applications

The appeal of SaaS applications, such as Office 365®, G Suite, Box and Salesforce® is growing, but so are...

DECRIPTAÇÃO: POR QUE, ONDE E COMO

O tráfego criptografado da Internet com protocolos Secure Sockets Layer ou Transport Layer Security, respectivamente SSL e TLD, está...

5 ERROS CRÍTICOS AO AVALIAR UM FIREWALL DE ÚLTIMA GERAÇÃO

O firewall é a base da segurança de dados corporativos. Os firewalls são todos diferentes uns dos outros e...

PARA ALÉM DE 2020: O QUE O FUTURO RESERVA PARA AS EQUIPES CISOs E INFOSEC?

A fim de acompanhar a digitalização, novas tecnologias, leis e regulamentações, as funções das equipes CISOs e InfoSec estão...

3 REQUISITOS PARA UMA TRANSFORMAÇÃO DIGITAL SEGURA

Em uma empresa digital, para superar a concorrência é preciso ter raciocínio rápido, bem como práticas ágeis de negócios...

Stop Targeted Attacks Without Decrypting Traffic

Threat actors conceal their attacks in SSL traffic to evade corporate defenses. Palo Alto Networks Security Operating Platform provides...
 
Page 5 of 226«34567»