CN-Series Articles
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.
Flexible Licensing & Consumption for VM-Series & CN-Series NGFWs
View full article
Let’s walkthrough three prominent use cases for employing CN-Series container firewalls to protect Kubernetes environments.  
View full article
Learn how Palo Alto Networks' CN-Series firewall helps Network Security teams secure Kubernetes workloads. 
View full article
Why Palo Alto Networks created the industry’s first CN-Series container firewall—and how it can help secure your Kubernetes environments.
View full article
Securing an airport and securing your cloud-native applications have more in common than you may realize – and two essentials of airport threat prevention nicely illustrate why virtual and container NGFWs are vital for security in the cloud. As digital transformation drives you to move crown jewel applications to public clouds and containers, you need to use the same layered security approach airports typically provide.    Want to learn more? Check it out.
View full article
Container adoption is on a serious rise, which is why we’re releasing CN-Series, the containerized version of our ML-Powered Next-Generation Firewall (NGFW), designed specifically for Kubernetes environments. It’s a significant development because, according to Gartner, in the next three years, the vast majority of organizations will be running multiple containerized applications in production.    Learn more here!
View full article
  • 6 Posts
  • 204 Subscriptions
Customer Advisories

Your security posture is important to us. If you’re a Palo Alto Networks customer, be sure to login to see the latest critical announcements and updates in our Customer Advisories area.

Learn how to subscribe to and receive email notifications here.

Listen to PANCast

PANCast is a Palo Alto Networks podcast that provides actionable insights to customers, helping you maximize your investment while improving your cybersecurity posture.

Top Contributors