• JP
  • magnifying glass search icon to open search field
  • お問い合わせ
  • リソースセンター
  • サポートを受ける
  • 現在、攻撃を受けていますか?
Palo Alto Networks logo
  • 製品
  • ソリューション
  • サービス
  • パートナー
  • 会社案内
  • 詳細
  • JP
    Language
  • お問い合わせ
  • リソースセンター
  • サポートを受ける
  • 現在、攻撃を受けていますか?
  • スタート ガイド

 

 

Whitepaper: Understanding the Role of Stolen Credentials in Data Breaches

Defending against cyberattacks is tough, especially when attackers pose as authenticated users on your network. In this whitepaper, we provide the insight you need to understand and stop credential phishing and the subsequent abuse of credentials.

Download the Whitepaper


Preventing Credential-Based Attacks

The theft and use of stolen passwords is one of the oldest attacks in the book, yet it remains highly effective. With stolen credentials, an adversary can bypass the entire attack lifecycle by impersonating a valid user, move uninterrupted throughout the organization's network, and shift to the abuse of credentials from within.

PAN-OS® 8.0 neutralizes credential theft by providing prevention capabilities across the attack lifecycle to stop the theft and subsequent abuse of stolen credentials.

The platform identifies and prevents attempts to steal credentials by stopping the submission of valid corporate credentials to illegitimate websites, and neutralizes an attacker’s ability to use stolen credentials for lateral movement and network compromise by enforcing authentication policies at the network layer.


PAN-OS 8.0 introduces new capabilities to neutralize credential theft by adding preventive capabilities to stop the theft and the abuse of passwords across this specific attack lifecycle.

 

  • Stop users from submitting password-based corporate credentials to unknown sites
  • Block access to known phishing sites with PAN-DB URL Filtering, using the latest global threat intelligence updated every five minutes
  • Protect critical applications and stop attackers from using stolen credentials to conduct lateral movement with policy-based multi-factor authentication enforced at the network level

Demo: Preventing Credential-Based Attacks

Watch our product managers and threat researchers demonstrate how protections in the Palo Alto Networks platform neutralize an attacker's ability to steal credentials, as well as stop them from abusing stolen credentials to gain unauthorized access.


Webinar: Disrupting credential-based attacks

Watch this webinar to learn what you can do today to stop credential theft and abuse. In this session, we will present the specific attack lifecycle for credential-based attacks and demonstrate how you can prevent a successful attack using innovative capabilities delivered by the Palo Alto Networks platform.

Watch the Webinar


Credential Theft: Exposing the Ecosystem and Motives Behind Credential Phishing, Theft and Abuse

In this report, Unit 42® details the ecosystem behind how adversaries steal and leverage legitimate credentials to break-in and move laterally within the organization, often bypassing security controls. Learn the key attack methods currently in use, how this technique fits into attacker playbooks, and real-world guidance on preventing successful attacks.

Read the Report


Live Community

Questions about PAN-OS 8.0? Get quick answers from expert Palo Alto Networks users in the Live Community!


What's New/Related Content

  • What's New in PAN-OS 8.0
  • Understanding the Role of Stolen Credentials
    (whitepaper)
  • URL Filtering overview
  • Next-Gen Firewall overview
  • Network Segmentation/Zero Trust
  • WildFire overview
  • Threat Prevention overview

Live Community Discussion Articles

  • Support for Data Classification Tags

Related Technical Documentation

  • Credential Phishing Prevention
  • Five-Minute Updates for PAN-DB Malware and Phishing URL Categories
  • Authentication Policy and Multi-Factor Authentication

最新ニュース、イベント情報、脅威アラートを配信

このフォームを送信すると、利用規約とプライバシーに関する声明に同意したことになります 。

製品とサービス

  • AI利用ネットワーク セキュリティ プラットフォーム
  • AIのセキュア バイ デザイン
  • Prisma AIRS
  • AI Access Security
  • クラウド提供型セキュリティ サービス
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • 次世代ファイアウォール
  • ハードウェア ファイアウォール
  • ソフトウェア ファイアウォール
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • セキュア アクセス サービス エッジ
  • Prisma SASE
  • App Acceleration
  • 自律型デジタルエクスペリエンス管理
  • Enterprise DLP
  • Prisma Access
  • Prisma Access Browser
  • Prisma SD-WAN
  • リモート ブラウザ分離
  • SaaS Security
  • AI駆動型セキュリティ運用プラットフォーム
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI駆動型SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42マネージド ディテクション&レスポンス
  • マネージドXSIAM
  • 脅威インテリジェンス&インシデント応答サービス
  • 予防評価
  • インシデント レスポンス
  • セキュリティ戦略を変革
  • 脅威インテリジェンスについて

会社名

  • パロアルトネットワークスについて
  • 採用情報
  • お問合せ
  • 企業責任
  • お客様向け
  • IR
  • 拠点
  • ニュースルーム

人気のあるリンク

  • ブログ
  • コミュニティ
  • コンテンツライブラリ
  • Cyberpedia
  • イベントセンター
  • 電子メール設定の管理
  • 製品A〜Z
  • 製品認証
  • 脆弱性の報告
  • サイトマップ
  • テクニカル ドキュメント
  • Unit 42
  • 個人情報の販売や共有はしないでください
PAN logo
  • プライバシー
  • トラスト センター
  • 利用規約
  • ドキュメント

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Select your language