Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics.

Filter the library by ...

How Enterprises Respond to the Incident Response Challenge

This 2020 Incident Response report examines how enterprises are building their incident response teams and processes, and how they respond to new breaches.

The Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation

Read the new white paper, “The Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation,” to learn: How the Round 2 evaluation worked and what was (and wasn’t) tested. How EDR vendors scored on number and quality of detections, correlation, user interface and more. How to use free tools to get your hands on the raw MITRE data and better inform your next EDR investment.

5 Critical Mistakes When Evaluating A Next-Gen Firewall

Read this white paper to understand how to choose a Next-Generation Firewall that will help you stay ahead of new, emerging threats and secure your entire enterprise.

eGuide | Presented by Palo Alto Networks

5 Must-Haves to Look For in a Best-in-Class IoT Security Solution

Read the e-book, The 5 Must-Haves for Best-in-Class IoT Security, to learn about the current state of enterprise IoT adoption, unique challenges to security teams and the five key stages in the lifecycle of a best-in-class IoT security solution.

Data Center & Hybrid Cloud Security for Dummies

The new “Data Center and Hybrid Cloud Security For Dummies®” e-book is the ultimate guide to protecting your data center and hybrid cloud environments.

Decryption: Why, Where, and How

Consumers and businesses rely on encryption to securely exchange private information over the internet as well as comply with regulations. However, with nearly 95% of web traffic now encrypted, if it’s not inspected, encrypted traffic leaves organizations blind to the security risks that may be hiding inside.

Impacts of Cyberattacks on IoT Devices

Read the white paper “The Impacts of Cyberattacks on IoT Devices” to learn about: Three types of modern IoT attacks. The entire attack lifecycle. How two primary cyberattack scenarios impact IoT devices.

Next-Generation Firewall Buyer’s Guide

The rapid evolution of IT has changed the face of the network perimeter. Data and users are everywhere. New devices are joining the network and proliferating more quickly than most organizations can keep up, sometimes without notice.

Cortex XSOAR: Redefining Security Orchestration, Automation, and Response

This white paper looks at how Cortex XSOAR can help enterprises improve their incident response and security posture.

Introducing Cortex XSOAR

This on-demand webcast discusses the businesses benefits of implementing a Security Orchestration, Automation and Response (SAOR) solution to improve organisational security.

Load More