Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Implementing Palo Alto Networks Prisma® Access
  • Table Of Contents Toc
Implementing Palo Alto Networks Prisma® Access

Implementing Palo Alto Networks Prisma® Access

By : Tom Piens Aka 'Reaper'
5 (1)
close
close
Implementing Palo Alto Networks Prisma® Access

Implementing Palo Alto Networks Prisma® Access

5 (1)
By: Tom Piens Aka 'Reaper'

Overview of this book

Understand how Palo Alto Networks’ firewall as a service (FWaaS) platform Prisma Access offers secure access to internal and external resources to mobile users and branch offices. Written by Palo Alto Networks expert Tom Piens, a renowned mentor instrumental in fostering a dynamic learning environment within the Palo Alto Networks LIVE community, this guide is your roadmap to harnessing the full potential of this platform and its features. The first set of chapters will introduce you to the concept of cloud-delivered security and the key components of Prisma Access. As you progress, you’ll gain insights into how Prisma Access fits into the larger security landscape and its benefits for organizations seeking a secure and scalable solution for their remote networks and mobile workforce. From setting up secure connections, implementing advanced firewall policies, harnessing threat prevention capabilities, and securing cloud applications and data, each chapter equips you with essential knowledge and practical skills. By the end of this book, you will be armed with the necessary guidance and insights to implement and manage a secure cloud network using Prisma Access successfully.
Table of Contents (17 chapters)
close
close
Lock Free Chapter
1
Part 1:Activate and Configure Prisma Access
6
Part 2:Configure Mobile User and Remote Network Security Processing Nodes
11
Part 3:Advanced Configuration and Best Practices

Other Books You May Enjoy

If you enjoyed this book, you may be interested in these other books by Packt:

Windows APT Warfare

Sheng-Hao Ma

ISBN: 978-1-80461-811-0

  • Explore various DLL injection techniques for setting API hooks
  • Understand how to run an arbitrary program file in memory
  • Become familiar with malware obfuscation techniques to evade antivirus detection
  • Discover how malware circumvents current security measures and tools
  • Use Microsoft Authenticode to sign your code to avoid tampering
  • Explore various strategies to bypass UAC design for privilege escalation

Malware Science

Shane Molinari

ISBN: 978-1-80461-864-6

  • Understand the science behind malware data and its management lifecycle
  • Explore anomaly detection with signature and heuristics-based methods
  • Analyze data to uncover relationships between data points and create a network graph
  • ...
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Implementing Palo Alto Networks Prisma® Access
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon