IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access

Deploy Prisma Access for mobile users, remote networks, and service connections harnessing advanced features Key Features Find out how to activate, deploy, and configure Prisma Access Configure mobile user and remote network security processing nodes Understand user identification and the Cloud Iden...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Piens, Tom (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Birmingham, UK Packt Publishing Ltd. 2024
Ausgabe:1st edition.
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a22000002 4500
001 ZDB-30-ORH-104368950
003 DE-627-1
005 20240701091159.0
007 cr uuu---uuuuu
008 240701s2024 xx |||||o 00| ||eng c
020 |a 9781835086605  |c electronic bk.  |9 978-1-83508-660-5 
020 |a 1835086608  |c electronic bk.  |9 1-83508-660-8 
020 |a 9781835081006  |9 978-1-83508-100-6 
035 |a (DE-627-1)104368950 
035 |a (DE-599)KEP104368950 
035 |a (ORHE)9781835081006 
035 |a (DE-627-1)104368950 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 23/eng/20240528 
100 1 |a Piens, Tom  |e VerfasserIn  |4 aut 
245 1 0 |a IMPLEMENTING PALO ALTO PRISMA ACCESS  |b learn real world network protection with Prima Access  |c Tom Piens, aka, 'Reaper.' 
250 |a 1st edition. 
264 1 |a Birmingham, UK  |b Packt Publishing Ltd.  |c 2024 
300 |a 1 online resource 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Deploy Prisma Access for mobile users, remote networks, and service connections harnessing advanced features Key Features Find out how to activate, deploy, and configure Prisma Access Configure mobile user and remote network security processing nodes Understand user identification and the Cloud Identity Engine Purchase of the print or Kindle book includes a free PDF eBook Book Description Understand how Palo Alto Networks' firewall as a service (FWaaS) platform Prisma Access offers secure access to internal and external resources to mobile users and branch offices. Written by Palo Alto Networks expert Tom Piens, a renowned mentor instrumental in fostering a dynamic learning environment within the Palo Alto Networks LIVE community, this guide is your roadmap to harnessing the full potential of this platform and its features. The first set of chapters will introduce you to the concept of cloud-delivered security and the key components of Prisma Access. As you progress, you'll gain insights into how Prisma Access fits into the larger security landscape and its benefits for organizations seeking a secure and scalable solution for their remote networks and mobile workforce. From setting up secure connections and implementing advanced firewall policies to harnessing threat prevention capabilities and securing cloud applications and data, each chapter equips you with essential knowledge and practical skills. By the end of this book, you will be armed with the necessary guidance and insights to implement and manage a secure cloud network using Prisma Access successfully. What you will learn Configure and deploy the service infrastructure and understand its importance Investigate the use cases of secure web gateway and how to deploy them Gain an understanding of how BGP works inside and outside Prisma Access Design and implement data center connections via service connections Get to grips with BGP configuration, secure web gateway (explicit proxy), and APIs Explore multi tenancy and advanced configuration and how to monitor Prisma Access Leverage user identification and integration with Active Directory and AAD via the Cloud Identity Engine Who this book is for This book is for network engineers, security engineers, security administrators, security operations specialists, security analysts, and anyone looking to integrate Prisma Access into their security landscape. Whether you're a newcomer to the field or a seasoned expert, this guide offers valuable insights for implementing and managing a secure cloud network effectively. Basic knowledge of Palo Alto will be helpful, but it's not a prerequisite. 
650 0 |a Computer networks  |x Security measures 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
776 1 |z 1835081002 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 1835081002 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781835081006/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-104368950
_version_ 1818767368225030144
adam_text
any_adam_object
author Piens, Tom
author_facet Piens, Tom
author_role aut
author_sort Piens, Tom
author_variant t p tp
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)104368950
(DE-599)KEP104368950
(ORHE)9781835081006
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition 1st edition.
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04052nam a22003972 4500</leader><controlfield tag="001">ZDB-30-ORH-104368950</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240701091159.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240701s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781835086605</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-83508-660-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1835086608</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-83508-660-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781835081006</subfield><subfield code="9">978-1-83508-100-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104368950</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP104368950</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781835081006</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104368950</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240528</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Piens, Tom</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IMPLEMENTING PALO ALTO PRISMA ACCESS</subfield><subfield code="b">learn real world network protection with Prima Access</subfield><subfield code="c">Tom Piens, aka, 'Reaper.'</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing Ltd.</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Deploy Prisma Access for mobile users, remote networks, and service connections harnessing advanced features Key Features Find out how to activate, deploy, and configure Prisma Access Configure mobile user and remote network security processing nodes Understand user identification and the Cloud Identity Engine Purchase of the print or Kindle book includes a free PDF eBook Book Description Understand how Palo Alto Networks' firewall as a service (FWaaS) platform Prisma Access offers secure access to internal and external resources to mobile users and branch offices. Written by Palo Alto Networks expert Tom Piens, a renowned mentor instrumental in fostering a dynamic learning environment within the Palo Alto Networks LIVE community, this guide is your roadmap to harnessing the full potential of this platform and its features. The first set of chapters will introduce you to the concept of cloud-delivered security and the key components of Prisma Access. As you progress, you'll gain insights into how Prisma Access fits into the larger security landscape and its benefits for organizations seeking a secure and scalable solution for their remote networks and mobile workforce. From setting up secure connections and implementing advanced firewall policies to harnessing threat prevention capabilities and securing cloud applications and data, each chapter equips you with essential knowledge and practical skills. By the end of this book, you will be armed with the necessary guidance and insights to implement and manage a secure cloud network using Prisma Access successfully. What you will learn Configure and deploy the service infrastructure and understand its importance Investigate the use cases of secure web gateway and how to deploy them Gain an understanding of how BGP works inside and outside Prisma Access Design and implement data center connections via service connections Get to grips with BGP configuration, secure web gateway (explicit proxy), and APIs Explore multi tenancy and advanced configuration and how to monitor Prisma Access Leverage user identification and integration with Active Directory and AAD via the Cloud Identity Engine Who this book is for This book is for network engineers, security engineers, security administrators, security operations specialists, security analysts, and anyone looking to integrate Prisma Access into their security landscape. Whether you're a newcomer to the field or a seasoned expert, this guide offers valuable insights for implementing and managing a secure cloud network effectively. Basic knowledge of Palo Alto will be helpful, but it's not a prerequisite.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1835081002</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1835081002</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781835081006/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-104368950
illustrated Not Illustrated
indexdate 2024-12-18T08:48:46Z
institution BVB
isbn 9781835086605
1835086608
9781835081006
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource
psigel ZDB-30-ORH
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher Packt Publishing Ltd.
record_format marc
spelling Piens, Tom VerfasserIn aut
IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access Tom Piens, aka, 'Reaper.'
1st edition.
Birmingham, UK Packt Publishing Ltd. 2024
1 online resource
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Deploy Prisma Access for mobile users, remote networks, and service connections harnessing advanced features Key Features Find out how to activate, deploy, and configure Prisma Access Configure mobile user and remote network security processing nodes Understand user identification and the Cloud Identity Engine Purchase of the print or Kindle book includes a free PDF eBook Book Description Understand how Palo Alto Networks' firewall as a service (FWaaS) platform Prisma Access offers secure access to internal and external resources to mobile users and branch offices. Written by Palo Alto Networks expert Tom Piens, a renowned mentor instrumental in fostering a dynamic learning environment within the Palo Alto Networks LIVE community, this guide is your roadmap to harnessing the full potential of this platform and its features. The first set of chapters will introduce you to the concept of cloud-delivered security and the key components of Prisma Access. As you progress, you'll gain insights into how Prisma Access fits into the larger security landscape and its benefits for organizations seeking a secure and scalable solution for their remote networks and mobile workforce. From setting up secure connections and implementing advanced firewall policies to harnessing threat prevention capabilities and securing cloud applications and data, each chapter equips you with essential knowledge and practical skills. By the end of this book, you will be armed with the necessary guidance and insights to implement and manage a secure cloud network using Prisma Access successfully. What you will learn Configure and deploy the service infrastructure and understand its importance Investigate the use cases of secure web gateway and how to deploy them Gain an understanding of how BGP works inside and outside Prisma Access Design and implement data center connections via service connections Get to grips with BGP configuration, secure web gateway (explicit proxy), and APIs Explore multi tenancy and advanced configuration and how to monitor Prisma Access Leverage user identification and integration with Active Directory and AAD via the Cloud Identity Engine Who this book is for This book is for network engineers, security engineers, security administrators, security operations specialists, security analysts, and anyone looking to integrate Prisma Access into their security landscape. Whether you're a newcomer to the field or a seasoned expert, this guide offers valuable insights for implementing and managing a secure cloud network effectively. Basic knowledge of Palo Alto will be helpful, but it's not a prerequisite.
Computer networks Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
1835081002
Erscheint auch als Druck-Ausgabe 1835081002
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781835081006/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Piens, Tom
IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access
Computer networks Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
title IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access
title_auth IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access
title_exact_search IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access
title_full IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access Tom Piens, aka, 'Reaper.'
title_fullStr IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access Tom Piens, aka, 'Reaper.'
title_full_unstemmed IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access Tom Piens, aka, 'Reaper.'
title_short IMPLEMENTING PALO ALTO PRISMA ACCESS
title_sort implementing palo alto prisma access learn real world network protection with prima access
title_sub learn real world network protection with Prima Access
topic Computer networks Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
topic_facet Computer networks Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
url https://learning.oreilly.com/library/view/-/9781835081006/?ar
work_keys_str_mv AT pienstom implementingpaloaltoprismaaccesslearnrealworldnetworkprotectionwithprimaaccess