GlobalProtect extiende la protección del Firewall de nueva generación de Palo Alto Networks a los miembros de su fuerza laboral móvil, sin importar dónde vayan.
Detecte y detenga los ataques ocultos mediante la unificación de los datos de redes, endpoints y nubes.
POR TIPO
POR TEMA
By Industry
POR CATEGORÍA DE PRODUCTO
By Features
By Technology
By Services
POR AUDIENCIA
POR IDIOMA
Ver 31 a 60 de 106
Hoja de Datos
Ficha técnica de privacidad de Cortex XSIAM
The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how Personal Data is captured, processed, and stored by and within the service.
Hoja de Datos
Asesoramiento de Confianza Cero de Unit 42
The Unit 42® Zero Trust Advisory enables you to implement a more strategic approach to cybersecurity. Eliminate implicit trust and safeguard critical assets.
Hoja de Datos
Evaluación de la seguridad en la nube de Unit 42
The Unit 42® Cloud Security Assessment combines threat intelligence with cloud security expertise to identify cloud risks, prioritize remediations and establish a roadmap for improved cloud security.
Hoja de Datos
Reduzca la dependencia de VDI con Prisma Browser
Discover how Prisma Browser can significantly reduce your reliance on Virtual Desktop Infrastructure deployments.
Hoja de Datos
Resumen del uso seguro de la IA generativa con Prisma Browser
Ensure safe and productive use of GenAI tools with Prisma Browser. With advanced security features and data protection built into the browser, organizations can leverage GenAI technology securely while maintaining compliance and control.
Hoja de Datos
Ficha técnica de PA-5200 Series
Palo Alto Networks® PA-5200 Series of next-generation firewall appliances is comprised of the PA-5280, PA-5260, PA-5250 and PA-5220.
Hoja de Datos
PA-450R
PA-450R de Palo Alto Networks es un firewall de nueva generación (NGFW) con tecnología de ML resistente que presenta capacidades de nueva generación para aplicaciones industriales en entornos hostiles.
Hoja de Datos
Hoja de especificaciones y resumen de producto
Funciones clave, capacidades de rendimiento y especificaciones para todos los firewalls de Palo Alto Networks.
Hoja de Datos
Ficha técnica de PA-7000 Series
Palo Alto Networks PA-7000 Series ML-Powered Next-Generation Firewalls enable enterprise-scale organizations and service providers to deploy security in high-performance environments, such as large data centers and high-bandwidth network perimeters.
Hoja de Datos
Ficha técnica de PA-3200 Series
The PA-3200 Series secures all traffic, including encrypted traffic, using dedicated processing and memory for networking, security, threat prevention and management.
Hoja de Datos
Privacidad de Prisma Access
Get the details on how Prisma Access captures, processes, and stores personal information to better understand the impact on your overall privacy posture.
Hoja de Datos
Ficha técnica del aislamiento de navegador remoto (RBI)
RBI for Prisma Access enables users to safely browse the internet no matter where they are
Hoja de Datos
Ficha técnica de privacidad de navegador remoto (RBI)
The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how Personal Data is captured, processed, and stored by and within the service.
Hoja de Datos
Prisma Cloud y Amazon Web Services (AWS)
Prisma Cloud secures applications from code-to-cloud. Protect your cloud resources and assets with our comprehensive Cloud-Native Application Protection Platform (CNAPP) for AWS.
Hoja de Datos
Servicios de respuesta ante incidentes de Unit 42
Unit 42 incident response experts can help you quickly investigate security incidents and eliminate threats, so you can recover and get back to business fast.
Hoja de Datos
Servicios de inteligencia de amenazas y respuesta ante incidentes de Unit 42
Palo Alto Networks Unit 42 brings together world-renowned threat researchers with an elite team of incident responders and security consultants to create an intelligence-driven, response-ready organization passionate about helping customers more proactively manage cyber risk.
Hoja de Datos
MDR para Cortex XSIAM
Unit 42 experts leverage Cortex XSIAM to aggregate security telemetry from endpoints, network, cloud and identity sources and apply high-fidelity threat intelligence, next-generation behavioral indicators, and AI-powered analytics to prevent, detect and respond to even the most advanced threats.
Hoja de Datos
Prisma Cloud: Resumen
Con Prisma Cloud de Palo Alto Networks®, las organizaciones pueden mantener el cumplimiento normativo, controlar la seguridad y habilitar las operaciones de seguridad en entornos informáticos en la nube pública.
Hoja de Datos
Evaluación de la preparación ante la vulneración del correo electrónico de negocios
The Unit 42 Business Email Compromise (BEC) Readiness Assessment delivers a targeted cybersecurity risk assessment focused on all of the elements necessary to defend against BEC and other email-based attacks. Learn more in this datasheet.
Hoja de Datos
Evaluación de la preparación para el ransomware
The Unit 42 Ransomware Readiness Assessment focuses on preparing your people, processes, and technologies to mitigate the threat of ransomware. We work with you to develop control enhancements, remediation recommendations, and a best-practice playbook based on the latest threat intelligence to achieve a target state of ransomware readiness. Read datasheet to learn more.
Hoja de Datos
Programa de resiliencia operativa de Palo Alto Networks
Due to the recent and increasing volume of customer inquiries regarding the resilience program (e.g., framework, program components, alignment with leading standards, etc.), we developed a resilience focused narrative as a sales enablement artifact to be leverage across account teams, bid response, customer trust, and adjacent sales teams.
Hoja de Datos
Prevención de pérdida de datos empresariales (DLP) de un vistazo
DLP helps safeguard a company’s reputation by preventing data breaches and assists in meeting compliance requirements for regulations like PCI-DSS, HIPAA, GDPR, CCPA etc.
Hoja de Datos
Ficha técnica de PA-800 Series
The controlling element of the PA-800 Series is PAN-OS®, the same software that runs all Palo Alto Networks NextGeneration Firewalls. PAN-OS natively classifies all traffic, inclusive of applications, threats, and content, and then ties that traffic to the user regardless of location or device type.
Hoja de Datos
Tecnologías, suscripciones y servicios de firewalls de nueva generación con tecnología de inteligencia artificial (ML)
Este documento brinda una lista completa de las funciones de seguridad de NGFW con tecnología de ML, así como de las funciones de seguridad disponibles mediante la implementación de todas las suscripciones de seguridad basadas en la nube disponibles.
Hoja de Datos
Informe de la solución de AIOps para NGFW
Our AIOps (Artificial Intelligence for IT Operations) for NGFW solution revolutionizes firewall operations with ML-powered insights for the best security posture and optimal health. Proactively address the top operational challenges of today like misconfigurations, human errors, compliance with best practices, resource usage, hardware and software failures, and a lot more. In this solution brief, you will learn how AIOps for NGFW redefines the firewall operational experience by predicting, interpreting, and resolving problems before they become business-impacting.
Hoja de Datos
DNS Security Service
Apply predictive analytics to disrupt attacks that use DNS for command and control or data theft
Hoja de Datos
Ficha técnica de WildFire
Los segundos importan: Por qué el análisis de malware tradicional y el sandboxing han fallado
Hoja de Datos
Ficha técnica de Threat Prevention
Today’s attackers are well-funded and well-equipped. They use evasive tactics to succeed in gaining a foothold in the network, launching both high-volume and sophisticated attacks while remaining invisible to an organization’s traditional defenses – from packet obfuscation, polymorphic malware and encryption to multi-phased payloads and fast-flux DNS.
Ver 31 a 60 de 106




























