Customer support changes coming your way: home page, portal, wizard, and where's my profile and log-in? Read all about it before the October change. New URL filtering category refines malware. GlobalProtect cloud service and more, like activating and installing logging, and changes in macOS affecting GlobalProtect connections. Pan(w)achrome makes life easier--our video shows how. Big up for ransomware prevention. Create a firewall using Azure PowerShell. Transum with WireShark. Reaper turns 500!
on 09-27-201701:14 PM - last edited on 10-24-201709:34 AM by editeur
A new category in URL filtering, command-and-control, helps break out specifics from the malware category. Get ready for the debut of this new category coming soon. In the interim, we entertain your questions.
on 09-26-201705:15 PM - last edited on 09-28-201712:39 PM by editeur
Attackers have traditionally profited by stealing identities or credit card numbers, then selling them on underground markets. Now cyber attackers are on the hunt for new ways to make a profit. Don't let them profit at your expense.
New capabilities in Traps 4.1 monitor ransomware behavior and upon detection, shut down an attack and block new exploit techniques. Palo Alto Networks has created applications to identify Tor connections and block Tor application traffic on your network. Malware vs exploits --the differences between the two attack vectors to an endpoint and how each attack, if successful, is used to compromise an endpoint. Visit our YouTube channel for this and other points of clarification. Follow us on Twitter. Learn, share, and connect in the Live Community.
That guy in finance again -- got a report due today but didn't update his records after using some contractor's custom app 3 weeks ago and this is somehow your problem?! Yes, and we help you solve it! The Children’s Internet Protection Act (CIPA), a US federal law, addresses internet safety in schools and libraries. As most search engines can serve up content encrypted over SSL, enforcing CIPA becomes even more challenging, and Palo Alto Networks steps up.
byreaper09-11-201705:45 AM - edited 10-11-201709:21 AM
You have hundreds of millions of bytes worth of logfiles, but how can you find that single instance where Greg from finance used some contractor's custom application to connect to his database machine in the DMZ three weeks ago and failed to update his records, and now he has a report due today and you need to fix his connection ASAP?