Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Expertise
Ecosystem

Select a tab

39 results found

Introduction to XQL: Custom Datasets for Threat Hunting

Both Cortex XDR and XSIAM let you go well beyond endpoint telemetry from the XDR Agent by ingesting custom datasets through the Broker VM. Forwarding Proxmox syslogs, you can analyze failed logins and suspicious system activity directly in XQL. This unlocks the ability to correlate hypervisor events with endpoint, network, and identity data—all in one platform. Tracking brute-force attempts against pvedaemon, custom datasets give you visibility into layers that traditional EDR misses.
Blog
•May 20, 2025

Introduction to XQL: Writing Your First Query

Learning a new programming or query language can be daunting, but if you've used the boolean options in a web search engine before, you can master XQL queries in no time. Like with web searches, we start with a hypothesis of our search, add filters to limit our results, and then validate the results that are returned against our hypothesis.
Blog
•Nov 18, 2024

What is the Prisma Access Browser

The Prisma Access Browser, a custom Chromium-based browser by Palo Alto Networks, integrates advanced security services to offer seamless, robust protection. It validates users, limits access based on roles and eliminates the need for cumbersome VPNs, making it an ideal solution for modern, flexible work environments.
Blog
•Nov 11, 2024

Introduction to XQL: Writing Your First Correlation Rule

Correlation Rules in Cortex XDR and XSIAM are how we can use XQL queries to detect patterns, anomalies or sequences of activities that could indicate malicious behavior, even when each individual event might not appear suspicious on its own. Correlation Rules typically leverage data from multiple datasets, but for our example, we'll keep it simple to alert on failed login attempts to a NGFW, and build on the query later.
Blog
•Dec 31, 2024

PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists

Looking to implement external dynamic lists in your Palo Alto NGFW or Prisma Access? This post will answer all your questions about how EDLs work in PAN-OS to dynamically improve your security posture.
Blog
•Oct 10, 2023

Introduction to Cortex XDR

Learn how Cortex XDR secures the future by rewiring security operations.
Blog
•Jan 24, 2023

Introduction to XQL: Building Your First Widget

Widgets transform XQL query results into interactive visualizations, aiding SOC analysts in identifying trends and anomalies. This article demonstrates using widgets to graph failed GlobalProtect logins, helping detect brute-force attacks and misconfigurations, and providing proactive assistance to users.
Blog
•Jun 4, 2025

How the Prisma Access Browser Trivializes Decryption

Anyone who works with TLS decryption will probably tell you it's hard to do and never truly finished. New support tickets about websites or applications that don't work as expected are constantly coming in, requiring continual tuning of TLS decryption settings. The Prisma Access Browser can significantly reduce the complexity and increase the effectiveness of the overall solution. Let's talk about how it does this.
Blog
•Jun 26, 2025

Demystifying Precision AI: How Palo Alto Networks Is Redefining Cybersecurity

Precision AI by Palo Alto Networks revolutionizes cybersecurity by integrating machine learning, deep learning and generative AI for real-time, high-confidence threat protection.
Blog
•Nov 5, 2024

Harnessing Customer Engagement for Net Zero Success in IT

Customer energy use represents one of the largest sources of Scope 3 emissions for IT hardware companies. Shifting focus from supplier to customer engagement, leveraging renewable energy attestations and fostering collaboration can drive the substantial emissions reductions required to achieve Net Zero goals.
Blog
•Jul 7, 2025

Contractors and the Prisma Access Browser Solution

How the Prisma Access Browser can safely allow contractors or employees on personal devices access to protected resources
Blog
•Apr 2, 2025

Enterprise Browsers vs Virtual Desktop Infrastructure (VDI): What are they, what do they do and how are they different

In today's digital workspace, organizations seek secure, efficient solutions to manage remote access and application delivery. This blog post explores the concept of an enterprise browser and virtual desktop infrastructure (VDI), detailing their functionalities, use cases and key differences. By understanding these tools, businesses can make informed decisions on which solution best meets their usability, security and operational needs.
Blog
•Sep 2, 2024

Palo Alto Networks

Palo Alto Networks' cybersecurity solutions include advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security.

280 Followers

At a glance

90Total
39Blogs
25Articles
5Case Studies
5Labs
4Briefings
4Learning Paths
3Events
2Videos
2Workshops
1Assessment
What's related
  • Security
  • Blog
  • Network Security
  • Palo Alto Next-Generation Firewalls
  • Palo Alto Networks Prisma Access
  • Security Operations
  • AI Security
  • Network Security with Palo Alto Networks
  • SASE
  • Palo Alto Prisma SASE
  • Cybersecurity Risk & Strategy
  • Networking
  • Palo Alto Networks Security Operations
  • Software Defined WAN (SD-WAN)
  • ATC
  • AI & Data
  • Cloud
  • Cloud Security
  • Cyber Range
  • Applied AI

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies