IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access
Deploy Prisma Access for mobile users, remote networks, and service connections harnessing advanced features Key Features Find out how to activate, deploy, and configure Prisma Access Configure mobile user and remote network security processing nodes Understand user identification and the Cloud Iden...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK
Packt Publishing Ltd.
2024
|
Ausgabe: | 1st edition. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-104368950 | ||
003 | DE-627-1 | ||
005 | 20240701091159.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240701s2024 xx |||||o 00| ||eng c | ||
020 | |a 9781835086605 |c electronic bk. |9 978-1-83508-660-5 | ||
020 | |a 1835086608 |c electronic bk. |9 1-83508-660-8 | ||
020 | |a 9781835081006 |9 978-1-83508-100-6 | ||
035 | |a (DE-627-1)104368950 | ||
035 | |a (DE-599)KEP104368950 | ||
035 | |a (ORHE)9781835081006 | ||
035 | |a (DE-627-1)104368950 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240528 | |
100 | 1 | |a Piens, Tom |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a IMPLEMENTING PALO ALTO PRISMA ACCESS |b learn real world network protection with Prima Access |c Tom Piens, aka, 'Reaper.' |
250 | |a 1st edition. | ||
264 | 1 | |a Birmingham, UK |b Packt Publishing Ltd. |c 2024 | |
300 | |a 1 online resource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Deploy Prisma Access for mobile users, remote networks, and service connections harnessing advanced features Key Features Find out how to activate, deploy, and configure Prisma Access Configure mobile user and remote network security processing nodes Understand user identification and the Cloud Identity Engine Purchase of the print or Kindle book includes a free PDF eBook Book Description Understand how Palo Alto Networks' firewall as a service (FWaaS) platform Prisma Access offers secure access to internal and external resources to mobile users and branch offices. Written by Palo Alto Networks expert Tom Piens, a renowned mentor instrumental in fostering a dynamic learning environment within the Palo Alto Networks LIVE community, this guide is your roadmap to harnessing the full potential of this platform and its features. The first set of chapters will introduce you to the concept of cloud-delivered security and the key components of Prisma Access. As you progress, you'll gain insights into how Prisma Access fits into the larger security landscape and its benefits for organizations seeking a secure and scalable solution for their remote networks and mobile workforce. From setting up secure connections and implementing advanced firewall policies to harnessing threat prevention capabilities and securing cloud applications and data, each chapter equips you with essential knowledge and practical skills. By the end of this book, you will be armed with the necessary guidance and insights to implement and manage a secure cloud network using Prisma Access successfully. What you will learn Configure and deploy the service infrastructure and understand its importance Investigate the use cases of secure web gateway and how to deploy them Gain an understanding of how BGP works inside and outside Prisma Access Design and implement data center connections via service connections Get to grips with BGP configuration, secure web gateway (explicit proxy), and APIs Explore multi tenancy and advanced configuration and how to monitor Prisma Access Leverage user identification and integration with Active Directory and AAD via the Cloud Identity Engine Who this book is for This book is for network engineers, security engineers, security administrators, security operations specialists, security analysts, and anyone looking to integrate Prisma Access into their security landscape. Whether you're a newcomer to the field or a seasoned expert, this guide offers valuable insights for implementing and managing a secure cloud network effectively. Basic knowledge of Palo Alto will be helpful, but it's not a prerequisite. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
776 | 1 | |z 1835081002 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1835081002 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781835081006/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-104368950 |
---|---|
_version_ | 1818767368225030144 |
adam_text | |
any_adam_object | |
author | Piens, Tom |
author_facet | Piens, Tom |
author_role | aut |
author_sort | Piens, Tom |
author_variant | t p tp |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)104368950 (DE-599)KEP104368950 (ORHE)9781835081006 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04052nam a22003972 4500</leader><controlfield tag="001">ZDB-30-ORH-104368950</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240701091159.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240701s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781835086605</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-83508-660-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1835086608</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-83508-660-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781835081006</subfield><subfield code="9">978-1-83508-100-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104368950</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP104368950</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781835081006</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104368950</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240528</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Piens, Tom</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IMPLEMENTING PALO ALTO PRISMA ACCESS</subfield><subfield code="b">learn real world network protection with Prima Access</subfield><subfield code="c">Tom Piens, aka, 'Reaper.'</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing Ltd.</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Deploy Prisma Access for mobile users, remote networks, and service connections harnessing advanced features Key Features Find out how to activate, deploy, and configure Prisma Access Configure mobile user and remote network security processing nodes Understand user identification and the Cloud Identity Engine Purchase of the print or Kindle book includes a free PDF eBook Book Description Understand how Palo Alto Networks' firewall as a service (FWaaS) platform Prisma Access offers secure access to internal and external resources to mobile users and branch offices. Written by Palo Alto Networks expert Tom Piens, a renowned mentor instrumental in fostering a dynamic learning environment within the Palo Alto Networks LIVE community, this guide is your roadmap to harnessing the full potential of this platform and its features. The first set of chapters will introduce you to the concept of cloud-delivered security and the key components of Prisma Access. As you progress, you'll gain insights into how Prisma Access fits into the larger security landscape and its benefits for organizations seeking a secure and scalable solution for their remote networks and mobile workforce. From setting up secure connections and implementing advanced firewall policies to harnessing threat prevention capabilities and securing cloud applications and data, each chapter equips you with essential knowledge and practical skills. By the end of this book, you will be armed with the necessary guidance and insights to implement and manage a secure cloud network using Prisma Access successfully. What you will learn Configure and deploy the service infrastructure and understand its importance Investigate the use cases of secure web gateway and how to deploy them Gain an understanding of how BGP works inside and outside Prisma Access Design and implement data center connections via service connections Get to grips with BGP configuration, secure web gateway (explicit proxy), and APIs Explore multi tenancy and advanced configuration and how to monitor Prisma Access Leverage user identification and integration with Active Directory and AAD via the Cloud Identity Engine Who this book is for This book is for network engineers, security engineers, security administrators, security operations specialists, security analysts, and anyone looking to integrate Prisma Access into their security landscape. Whether you're a newcomer to the field or a seasoned expert, this guide offers valuable insights for implementing and managing a secure cloud network effectively. Basic knowledge of Palo Alto will be helpful, but it's not a prerequisite.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1835081002</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1835081002</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781835081006/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-104368950 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:48:46Z |
institution | BVB |
isbn | 9781835086605 1835086608 9781835081006 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource |
psigel | ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Packt Publishing Ltd. |
record_format | marc |
spelling | Piens, Tom VerfasserIn aut IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access Tom Piens, aka, 'Reaper.' 1st edition. Birmingham, UK Packt Publishing Ltd. 2024 1 online resource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Deploy Prisma Access for mobile users, remote networks, and service connections harnessing advanced features Key Features Find out how to activate, deploy, and configure Prisma Access Configure mobile user and remote network security processing nodes Understand user identification and the Cloud Identity Engine Purchase of the print or Kindle book includes a free PDF eBook Book Description Understand how Palo Alto Networks' firewall as a service (FWaaS) platform Prisma Access offers secure access to internal and external resources to mobile users and branch offices. Written by Palo Alto Networks expert Tom Piens, a renowned mentor instrumental in fostering a dynamic learning environment within the Palo Alto Networks LIVE community, this guide is your roadmap to harnessing the full potential of this platform and its features. The first set of chapters will introduce you to the concept of cloud-delivered security and the key components of Prisma Access. As you progress, you'll gain insights into how Prisma Access fits into the larger security landscape and its benefits for organizations seeking a secure and scalable solution for their remote networks and mobile workforce. From setting up secure connections and implementing advanced firewall policies to harnessing threat prevention capabilities and securing cloud applications and data, each chapter equips you with essential knowledge and practical skills. By the end of this book, you will be armed with the necessary guidance and insights to implement and manage a secure cloud network using Prisma Access successfully. What you will learn Configure and deploy the service infrastructure and understand its importance Investigate the use cases of secure web gateway and how to deploy them Gain an understanding of how BGP works inside and outside Prisma Access Design and implement data center connections via service connections Get to grips with BGP configuration, secure web gateway (explicit proxy), and APIs Explore multi tenancy and advanced configuration and how to monitor Prisma Access Leverage user identification and integration with Active Directory and AAD via the Cloud Identity Engine Who this book is for This book is for network engineers, security engineers, security administrators, security operations specialists, security analysts, and anyone looking to integrate Prisma Access into their security landscape. Whether you're a newcomer to the field or a seasoned expert, this guide offers valuable insights for implementing and managing a secure cloud network effectively. Basic knowledge of Palo Alto will be helpful, but it's not a prerequisite. Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures 1835081002 Erscheint auch als Druck-Ausgabe 1835081002 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781835081006/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Piens, Tom IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures |
title | IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access |
title_auth | IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access |
title_exact_search | IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access |
title_full | IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access Tom Piens, aka, 'Reaper.' |
title_fullStr | IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access Tom Piens, aka, 'Reaper.' |
title_full_unstemmed | IMPLEMENTING PALO ALTO PRISMA ACCESS learn real world network protection with Prima Access Tom Piens, aka, 'Reaper.' |
title_short | IMPLEMENTING PALO ALTO PRISMA ACCESS |
title_sort | implementing palo alto prisma access learn real world network protection with prima access |
title_sub | learn real world network protection with Prima Access |
topic | Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures |
topic_facet | Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures |
url | https://learning.oreilly.com/library/view/-/9781835081006/?ar |
work_keys_str_mv | AT pienstom implementingpaloaltoprismaaccesslearnrealworldnetworkprotectionwithprimaaccess |