{"id":13781,"date":"2016-05-17T13:00:35","date_gmt":"2016-05-17T20:00:35","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=13781"},"modified":"2016-05-17T14:15:39","modified_gmt":"2016-05-17T21:15:39","slug":"get-your-copy-of-network-security-management-for-dummies","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/05\/get-your-copy-of-network-security-management-for-dummies\/","title":{"rendered":"Get Your Copy of \u201cNetwork Security Management for Dummies\u201d"},"content":{"rendered":"<p>Palo Alto Networks is happy to announce the availability of a new \u201cNetwork Security Management for Dummies\u201d book. It is the latest addition to a series of books that explain the ins and outs of network and cyber security \u2013 and it\u2019s available to you for free.<\/p>\n<p>Our new book focuses on the importance of deploying a network security management solution when managing multiple firewalls, multiple security vendors, or both.<!--more--><\/p>\n<p>In easy-to-read language the book explains market changes leading to the need for network security management, the requirements a good network security management product should meet, and profiles the security and operational benefits that can be derived from network security management.<\/p>\n<p>On the highest level, today\u2019s enterprise security deployments require a network security management solution that provides:<\/p>\n<ul>\n<li>Centralized administration with automated and streamlined management and configuration processes.<\/li>\n<li>Greater network visibility with comprehensive reporting across the entire network security environment.<\/li>\n<li>Prioritization of critical threats to enable faster, more effective incident response.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/content\/pan\/en_US\/resources\/whitepapers\/network-security-management-for-dummies.html\" target=\"_blank\">Download your copy of Network Security Management for Dummies here<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/content\/pan\/en_US\/resources\/whitepapers\/network-security-management-for-dummies.html\" target=\"_blank\" rel=\"attachment wp-att-13788\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:22.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-13788 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/05\/Dummies_Network-Security_1170x260-500x111.jpg\" alt=\"Dummies_Network Security_1170x260\" width=\"500\" height=\"111\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/05\/Dummies_Network-Security_1170x260-500x111.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/05\/Dummies_Network-Security_1170x260-230x51.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/05\/Dummies_Network-Security_1170x260-768x171.jpg 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/05\/Dummies_Network-Security_1170x260-510x113.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/05\/Dummies_Network-Security_1170x260-180x40.jpg 180w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/05\/Dummies_Network-Security_1170x260.jpg 1170w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks is happy to announce the availability of a new \u201cNetwork Security Management for Dummies\u201d book. It is the latest addition to a series of books that explain the ins &hellip;<\/p>\n","protected":false},"author":111,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155],"tags":[1926],"coauthors":[980],"class_list":["post-13781","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","tag-network-security-management-for-dummies","net_sec_category-next-generation-firewalls"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/13781","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/111"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=13781"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/13781\/revisions"}],"predecessor-version":[{"id":13790,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/13781\/revisions\/13790"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=13781"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=13781"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=13781"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=13781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}