• JP
  • magnifying glass search icon to open search field
  • お問い合わせ
  • リソースセンター
  • サポートを受ける
  • 現在、攻撃を受けていますか?
Palo Alto Networks logo
  • 製品
  • ソリューション
  • サービス
  • 業種
  • パートナー
  • パロアルトネットワークスをお勧めする理由
  • 会社案内
  • その他
  • JP
    Language
  • お問い合わせ
  • リソースセンター
  • サポートを受ける
  • 現在、攻撃を受けていますか?
  • スタート ガイド

 

 

Whitepaper: Understanding the Role of Stolen Credentials in Data Breaches

Defending against cyberattacks is tough, especially when attackers pose as authenticated users on your network. In this whitepaper, we provide the insight you need to understand and stop credential phishing and the subsequent abuse of credentials.

Download the Whitepaper


Preventing Credential-Based Attacks

The theft and use of stolen passwords is one of the oldest attacks in the book, yet it remains highly effective. With stolen credentials, an adversary can bypass the entire attack lifecycle by impersonating a valid user, move uninterrupted throughout the organization's network, and shift to the abuse of credentials from within.

PAN-OS® 8.0 neutralizes credential theft by providing prevention capabilities across the attack lifecycle to stop the theft and subsequent abuse of stolen credentials.

The platform identifies and prevents attempts to steal credentials by stopping the submission of valid corporate credentials to illegitimate websites, and neutralizes an attacker’s ability to use stolen credentials for lateral movement and network compromise by enforcing authentication policies at the network layer.


PAN-OS 8.0 introduces new capabilities to neutralize credential theft by adding preventive capabilities to stop the theft and the abuse of passwords across this specific attack lifecycle.

 

  • Stop users from submitting password-based corporate credentials to unknown sites
  • Block access to known phishing sites with PAN-DB URL Filtering, using the latest global threat intelligence updated every five minutes
  • Protect critical applications and stop attackers from using stolen credentials to conduct lateral movement with policy-based multi-factor authentication enforced at the network level

Demo: Preventing Credential-Based Attacks

Watch our product managers and threat researchers demonstrate how protections in the Palo Alto Networks platform neutralize an attacker's ability to steal credentials, as well as stop them from abusing stolen credentials to gain unauthorized access.


Webinar: Disrupting credential-based attacks

Watch this webinar to learn what you can do today to stop credential theft and abuse. In this session, we will present the specific attack lifecycle for credential-based attacks and demonstrate how you can prevent a successful attack using innovative capabilities delivered by the Palo Alto Networks platform.

Watch the Webinar


Credential Theft: Exposing the Ecosystem and Motives Behind Credential Phishing, Theft and Abuse

In this report, Unit 42 details the ecosystem behind how adversaries steal and leverage legitimate credentials to break-in and move laterally within the organization, often bypassing security controls. Learn the key attack methods currently in use, how this technique fits into attacker playbooks, and real-world guidance on preventing successful attacks.

Read the Report


Live Community

Questions about PAN-OS 8.0? Get quick answers from expert Palo Alto Networks users in the Live Community!


What's New/Related Content

  • What's New in PAN-OS 8.0
  • Understanding the Role of Stolen Credentials
    (whitepaper)
  • URL Filtering overview
  • Next-Gen Firewall overview
  • Network Segmentation/Zero Trust
  • WildFire overview
  • Threat Prevention overview

Live Community Discussion Articles

  • Support for Data Classification Tags

Related Technical Documentation

  • Credential Phishing Prevention
  • Five-Minute Updates for PAN-DB Malware and Phishing URL Categories
  • Authentication Policy and Multi-Factor Authentication

最新ニュース、イベント情報、脅威アラートを配信

このフォームを送信すると、お客様は弊社の利用規約とプライバシー ポリシーに同意したものとみなされます。

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

人気のあるリソース

  • 会社概要
  • イベント センター
  • イベント
  • リソースセンター
  • プレスリリース
  • Unit42 ブログ
  • 投資家の皆様へ
  • ブログ
  • Japan Live Community
  • Tech Docs
  • キャリア
  • お問い合わせ
  • サイトマップ

法定通知

  • プライバシー
  • 個人情報保護基本方針
  • 利用規約
  • トラスト センター
  • ドキュメント
  • 一般事業主行動計画

アカウント

  • 購読の管理
  • パートナーログイン
  • パートナーになる
脆弱性の報告

Copyright © 2023 Palo Alto Networks. All rights reserved