At Palo Alto Networks, it’s our mission to develop products and services that help you, our customer, detect and prevent successful cyberattacks. We’ve developed our best practice documentation to help you do just that. Whether you’re looking for the best way to secure administrative access to your next-gen firewalls and Panorama, create best practice security policy to safely enable application access at the internet gateway and the data center, or learn the best way roll out a decryption policy to prevent threats from sneaking into your network, you will find the guidance you need here in our best practice documentation. And, our best practice library keeps growing and evolving to keep up with the ever-changing threat landscape, so be sure to check back often!
Documents, checklists, videos, webinars, best practice assessment tools, and more help you learn about and apply security best practices.
Use the Decryption Best Practices to ensure that threats aren't sneaking onto your network in encrypted traffic.
To protect your network from cyberattack and improve your overall security posture, implement a best practice internet gateway security policy. Use the guidelines in this site to plan, deploy, and maintain your internet gateway best practice security policy.
You can't defend against threats you can’t see. By enabling decryption on your next-gen firewalls you can inspect and control SSL/TLS and SSH traffic so that you can detect and prevent threats that would otherwise remain hidden in encrypted traffic. Use the best practice guidelines in this site to learn how to plan for and deploy decryption in your organization.
Your enterprise's most valuable assets reside in your data center, including proprietary source code, intellectual property, and sensitive company and customer data. Your customers and employees trust you to maintain the confidentiality and integrity of their data and expect that data to be always available, so it's important to implement a data center best practice security policy that safeguards your data and prevents successful attacks. Use the guidelines in this site to plan, deploy, and maintain your data center best practice security policy.
Protect against DoS attacks that try to take down your network and critical devices using a layered approach that defends your network perimeter, zones, and individual devices.
Evaluate your Security policy, identify areas to improve, prioritize changes, and then transition safely to a best practice Security policy.
Apply security best practices to reduce the attack surface, gain visibility into traffic, prevent threats, and protect your network, users, and data.
The Panorama management server ™ is the Palo Alto Networks network security management solution for centralized management and visibility for your Next-Generation firewalls . Review the best practices for onboarding new firewalls or migrating existing firewalls to Panorama to simplify and streamline this operation.
Learn the best practices for using WildFire as part of your network threat detection and prevention solution.
Learn the best practices for securing administrative access to your firewalls to prevent successful cyberattacks through an exposed management interface.
Learn the best practices for keeping application and threat content signatures up-to-date seamlessly.
Learn the best practices for keeping applications and threats content signatures up-to-date seamlessly.
Apply best practices during the planning, deployment, and maintenance of your IoT Security implementation.
User-ID leverages user context from a wide range of repositories to identify users and apply the principle of least privilege to users based on their trust level and behavior. User-ID protects your corporate credentials from use on third-party websites and prevents reuse of stolen credentials by enabling multi-factor authentication (MFA) at the network layer for any application without any application changes.
Use the URL Filtering best practices to guide you how to reduce your exposure to web-based threats, without limiting your users’ access to web content that they need.
To monitor and protect your network from most Layer 4 and Layer 7 attacks, follow our best practice recommendations.
About this webinar
App-ID increases the value of our next-generation firewalls by making it easier and faster to determine the exact identity of applications traversing the network, enabling teams to set and enforce the right policies.
Join Palo Alto Networks experts and learn how you can use the New Policy Optimizer capability to migrate your legacy rule set to App-ID based rules. In this webcast, you will:
About this webinar
Employees are accessing any application they want, using work or personal devices, regardless of the business and security risks involved.
Join the webinar and discover:
About this webinar
Visibility and policy control based on users is critical for cybersecurity. User-based policies readily show their business relevance, are more secure, easier to manage, and allow better forensics. In this webinar you will:
About this webinar
The growth in SSL/TLS encrypted traffic traversing the internet is on an explosive upturn. Given the primary benefits associated with encryption, the private and secure exchange of information over the internet, compliance with certain privacy and security regulations – such as the Health Insurance Portability and Accountability Act and Payment Card Industry Data Security Standard, or HIPAA and PCI DSS – the trend in SSL adoption is expected to continue to rise.
Watch as our Palo Alto Networks® team of experts presents the “hows and whys” of SSL decryption. In this webcast, you will: