Apply security best practices to reduce the attack surface, gain visibility into traffic, prevent threats, and protect your network, users, and data.
Featured Topics
Prevention Architecture Methodology
Documents, checklists, videos, webinars, best practice assessment tools, and more help you learn about and apply security best practices.
Decryption Best Practices
You can't defend against threats you can’t see. By enabling decryption on your next-gen firewalls you can inspect and control SSL/TLS and SSH traffic so that you can detect and prevent threats that would otherwise remain hidden in encrypted traffic. Use the best practice guidelines in this site to learn how to plan for and deploy decryption in your organization.
Recommended Topics
Data Center Best Practices
Data centers house your enterprise's most valuable assets. Data center confidentiality, integrity, and availability are critical. A best practices data center Security policy safeguards your data and prevents successful attacks.
Best Practices for Securing Administrative Access
Learn the best practices for securing administrative access to your firewalls to prevent successful cyberattacks through an exposed management interface.
Internet Gateway Best Practices
To protect your network from cyberattack and improve your overall security posture, implement a best practice internet gateway security policy. Use the guidelines in this site to plan, deploy, and maintain your internet gateway best practice security policy.
Videos
Best Practice Assessment Plus (BPA+) Tool Demo
BPA+ YouTube Channel
Click "View BPA+ Playlist" to access all of the BPA+ videos, including best practice network security checks and a demo.