article thumbnail

How to Use a Firewall for Network Traffic Analysis and Behavioral Detection

Palo Alto Networks

On March 17, we’ll host a webinar called “ Leverage Your Firewall to Expose Attackers Hiding in Your Network ” to share tips on how you can use your firewall for network traffic analysis. Organizations can take this to the next level by connecting their firewalls to other security sensors throughout their organization.

article thumbnail

New: The Industry’s Most Flexible Software NGFW Consumption Model

Palo Alto Networks

What if there was a licensing approach that would let you procure software firewalls and security services with the speed and flexibility to match rapidly changing cloud requirements? Or how about dynamically resizing your software firewalls in response to changes in your organization? And why stop there? Then they hope for the best.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Busted by Cortex XDR: Network Traffic Analysis in Action

Palo Alto Networks

Join us on March 17 for our “ Leverage Your Firewall to Expose Attackers Hiding in Your Network ” webinar to learn more about how to use Network Traffic Analysis, including a live attack demo. . The story begins at a large pharmaceutical company that had Cortex XDR deployed using firewalls as sensors to analyze their network traffic.

article thumbnail

Multi-Cloud Networking Advances as Palo Alto Networks and Alkira Team Up

Palo Alto Networks

Palo Alto Networks is working with Alkira, a multi-cloud networking provider, to embed Palo Alto Networks VM-Series virtual firewalls into Alkira’s networking-as-a-service platform. Autoscale avoids provisioning for peak capacity; at the same time, it allows dynamic high firewall scale when needed.

Network 71
article thumbnail

How to Protect Your Business From Supply Chain Attacks

Kaseya

The latest information on this supply chain attack, as described in this ZDNet article , indicates that hackers used a total of four malware strains: Sunspot, Sunburst (Solorigate), Teardrop and Raindrop. These malware strains were used in a sophisticated sequence of escalated attacks. Effective Tips To Better Protect Your Business.

Malware 59
article thumbnail

Your Own Devices Can Be Used Against You! – How to Prevent Living Off the Land (LOTL) Attacks

Kaseya

As NextGen AV and EDR solutions have evolved to better respond to malware, more and more cybercriminals are performing living off the land (LOTL) attacks instead.  What is a LOTL attack?  Computers have powerful built-in tools that are crucial to an operating system functioning.

Malware 52
article thumbnail

Busted by Cortex XDR: a True Story of Human Intuition and AI

Palo Alto Networks

On March 17, our webinar “ Leverage Your Firewall to Expose Attackers Hiding in Your Network ” webinar will share tips on using Cortex XDR to discover network threats. Although the malware was a never-before-seen mutation of the Qbot virus, our Behavioral Threat Protection (BTP) engine caught it. Register today! .