Palo Alto Networks' product portfolio is paying dividends as customers look to reduce their vendor footprint, says CEO Nikesh Arora. He says despite pressures in the global economy, enterprises aren't currently stressing about their IT budgets.
Double-extortion ransomware. Supply chain attacks. Weaponized zero-days. It's an advanced threat landscape, and it requires advanced defenses. Taylor Ettema of Palo Alto Networks outlines the key capabilities today's security solutions require to step up against the adversaries' ongoing innovation.
In this eBook...
Check Point is aggressively expanding its salesforce and standing up "rockets" focused on emerging technology areas to land more customer deals outside network security. The company will couple 25% growth in its salesforce with dedicated investments around cloud security, email security and MDR.
With the need for effective threat detection and response becoming more crucial by the day, cybersecurity leaders realize that partnering with a vendor is crucial. At the same time, they are confused about which service provider is right for their business.
This white paper is intended to help you understand the...
When it comes to advanced threat response, 42% of financial institutions say their current abilities are average. Only 35% say automation currently plays a strong role. Josh Zelonis of Palo Alto Networks and Sid Srivastava of Accenture analyze the State of Security Automation in Financial Services.
Are you interested in exploring how to defend against ransomware and supply chain attacks, or securing your public cloud? Then register now to experience hands on how Vectra sees threats and stops breaches.
Securing hybrid and multi-cloud workloads and supporting infrastructures is a daunting challenge for many organizations. Tried and trusted on-premises approaches and tools often don’t easily translate to the cloud and cloud-native monitoring and security tools are often platform specific making it difficult to gain...
XDR - Extended detection and response - promises to integrate data from any source to stop today's sophisticated and often automated attacks. The key is: Which source?
Register for this exclusive session for insights on why network evidence must be a key part of your XDR strategy. Topics to be discussed include how...
Perimeter defenses are nothing new, and when it comes to cybercriminals and ransomware purveyors, they’re getting better at evading perimeter defenses.
Once they’ve gotten in, they’re hiding in network blind spots, operating using encrypted traffic and targeting cloud workloads. What if you could turn this...
Leveraging advanced cloud network security solutions from Palo Alto Networks and Google Cloud to automate and secure your cloud transformation
Organizations shifting workloads and applications to the on-demand infrastructures of public cloud need to understand how best to reduce attack surfaces -- and apply threat...
Complex IT ecosystems coupled with fragile security protocols leave companies vulnerable to security attacks. As companies move towards Zero Trust, microsegmentation solutions help protect against unknown exposures on the network. Organizations are continuously responding to changes in the cybersecurity landscape and...
Change is afoot at Trellix, which is the new name of the cybersecurity software business formed from the merger of McAfee Enterprise and FireEye. CEO Bryan Palma says the extended detection and response - aka XDR - software imperative for his customers is to do more, but with fewer suppliers and management overhead.
As our business-critical applications are a blend of cloud and on-premises based and users need secure access to resources from everywhere, the traditional firewall approach no longer works. Our single network perimeter has evolved to multiple micro-perimeters. For many organizations the application is the new...
Network compromise drives big business on the dark web. Cybercriminals are actively buying and selling unauthorized network access in a variety of underground forums.
This specific variety of criminal market offerings is less well known than others, but the extended cybercrime activity it enables is impacting...
The network detection and response market is "relatively unchallenged at this point by other markets," and detection is the most important use case, says Nat Smith of Gartner, who shares key findings from the company's report titled Emerging Trends: Top Use Cases for Network Detection and Response.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.