Remove tag software-firewalls
article thumbnail

Palo Alto Networks Secures Black Hat from Itself

Palo Alto Networks

In addition, Palo Alto Networks Next-Generation Firewalls (NGFWs) isolate that activity from the rest of the network. The firewalls also provide network App-ID visibility and CDSS alert profiles on the entire network. The post Palo Alto Networks Secures Black Hat from Itself appeared first on Palo Alto Networks Blog.

Network 52
article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

Ansible can help automate the backup, and you can learn more in this month’s how-to video that covers using Ansible to back up a Cisco ASA firewall. These tools provide reporting on changes to the operating system — but come with a price tag. Don’t stop with the backup, though — we still need to monitor for changes.

Backup 92
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Busted by Cortex XDR: a True Story of Human Intuition and AI

Palo Alto Networks

On March 17, our webinar “ Leverage Your Firewall to Expose Attackers Hiding in Your Network ” webinar will share tips on using Cortex XDR to discover network threats. These analysts are called Unit 42: the global threat intelligence team at Palo Alto Networks that is renowned for their work to hunt, catch and tag threats.

article thumbnail

Flash Prices are Dropping. Now What?

Infinidat

Charlie Giancarlo from Pure Storage wrote an excellent blog about the architectural shift from “big compute” with large, legacy applications, to small, transient/stateless compute (e.g. The impact on AFA costs is the reason for another Pure Storage blog by Ben Woo, explaining their perspective on why encryption shouldn’t move up the stack.

WAN 74
article thumbnail

Impact of Social Software Within the Enterprise by Jon Iwata

elsua: The Knowledge Management Blog

After a few days away from my regular blogging activities (Due to the Lotusphere Comes to You events in both Madrid & Barcelona and a couple of days off here and there), here I am back again! And this time around with a reference to an interview on control, i.e. command-and-control, and the impact of social software within the enterprise.

Social 40
article thumbnail

6 Reasons Our Firewall Platform is Critical for Zero Trust Across Workloads

Palo Alto Networks

That’s why our firewall platform significantly bolsters a Zero Trust architecture by moving network security as close to workloads as possible – and there are six primary reasons it does so effectively. CN-Series container firewalls secure Kubernetes environments and protect traffic traversing Kubernetes namespace boundaries.

article thumbnail

Traditional Knowledge Management Systems - Adapt or Die

elsua: The Knowledge Management Blog

What happens when a traditional Knowledge Management System like IBM's Global Business Services KnowledgeView gets hit by social computing within the firewall? Tags: Social Computing Enterprise 2.0 Well, Knowledge Portal is born. Here is a story on "Adapt or Die" for traditional KMS.

System 51