Forrester Research Rates Palo Alto Networks a Leader for Automated Malware Analysis

We’re pleased that Forrester Research has identified Palo Alto Networks as a leader in The Forrester Wave™: Automated Malware Analysis, Q2 2016. As part of the report, Forrester evaluated WildFire based on criteria in the categories of current offering, market presence, and strategy.

Automated malware analysis is a necessity in the security stack, providing visibility into targeted attack vectors and creating tailored threat intelligence to generate what Forrester calls “highest fidelity” alerts. …Continue reading

2016 Verizon Data Breach Investigations Report (DBIR): Insights from Unit 42

The ninth annual edition of Verizon’s Data Breach Investigations Report (DBIR) has just been released, and Palo Alto Networks is proud to have contributed data and analysis to help make the report as comprehensive as possible. Palo Alto Networks is committed to sharing threat intelligence across the security industry, exposing the evolving nature of threats, in order for organizations to better protect themselves.

This year we extracted a massive dataset from the AutoFocus threat intelligence service on over 38 million sessions carrying over 2.7 million unique malware samples. We worked with the Verizon team to add context to these samples with AutoFocus tag data, illuminating what campaign or family they were associated with. …Continue reading

For Cyberattackers, Time Is The Enemy

posted by: on February 1, 2016 5:00 AM

filed in: Announcement, Cybersecurity, Reports, Security Platform

Current research in cybersecurity often has a narrow focus, detailing recently successful attacks and how those attacks were accomplished. Attackers are often represented as shadowy, nameless figures, with a special kind of mystique surrounding them. That Hollywood image couldn’t be further from the truth. In a new study released today, “Flipping the Economics of Attacks,” Palo Alto Networks has partnered with the Ponemon Institute to understand not only what motivates these attackers but also how we can turn the tables on them by taking away their financial incentives to attack.

The data also shows us a clear path to shift the economic motivation of attacks with two compelling facts: …Continue reading

Older posts →