{"id":13414,"date":"2016-04-28T05:00:56","date_gmt":"2016-04-28T12:00:56","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=13414"},"modified":"2016-04-27T14:44:04","modified_gmt":"2016-04-27T21:44:04","slug":"forrester-research-rates-palo-alto-networks-a-leader-for-automated-malware-analysis","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/04\/forrester-research-rates-palo-alto-networks-a-leader-for-automated-malware-analysis\/","title":{"rendered":"Forrester Research Rates Palo Alto Networks a Leader for Automated Malware Analysis"},"content":{"rendered":"<p>We\u2019re pleased that Forrester Research has identified Palo Alto Networks as a leader in The Forrester Wave\u2122: Automated Malware Analysis, Q2 2016. As part of the report, Forrester evaluated WildFire based on criteria in the categories of current offering, market presence, and strategy.<\/p>\n<p>Automated malware analysis is a necessity in the security stack, providing visibility into targeted attack vectors and creating tailored threat intelligence to generate what Forrester calls \u201chighest fidelity\u201d alerts.<!--more--><\/p>\n<p>Palo Alto Networks takes automated malware analysis several steps further by broadening the scope of threat intelligence and extending its preventive capabilities. As part of our Next-Generation Security Platform, WildFire identifies -- and helps prevent -- malware attempting to traverse the network, infect endpoints, and make its way to cloud environments.<\/p>\n<p>Please access the entire Forrester Wave on Automated Malware Analysis at the URL below:<br \/>\n<a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/forrester-wave-automated-malware-analysis.html\" target=\"_blank\">https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/forrester-wave-automated-malware-analysis.html<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019re pleased that Forrester Research has identified Palo Alto Networks as a leader in The Forrester Wave\u2122: Automated Malware Analysis, Q2 2016. As part of the report, Forrester evaluated WildFire based on &hellip;<\/p>\n","protected":false},"author":111,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,131,115,1229],"tags":[1885,356,1884,69],"coauthors":[980],"class_list":["post-13414","post","type-post","status-publish","format-standard","hentry","category-announcement","category-malware-2","category-reports","category-security-platform","tag-automated-malware-analysis","tag-forrester","tag-forrester-wave","tag-wildfire"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/13414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/111"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=13414"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/13414\/revisions"}],"predecessor-version":[{"id":13417,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/13414\/revisions\/13417"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=13414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=13414"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=13414"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=13414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}