{"id":14683,"date":"2016-06-15T15:00:49","date_gmt":"2016-06-15T22:00:49","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=14683"},"modified":"2016-06-15T15:04:24","modified_gmt":"2016-06-15T22:04:24","slug":"securing-data-in-the-data-center-reducing-the-attack-surface-and-preventing-threats","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/06\/securing-data-in-the-data-center-reducing-the-attack-surface-and-preventing-threats\/","title":{"rendered":"Securing Data In The Data Center: Reducing the Attack Surface and Preventing Threats"},"content":{"rendered":"<p>Attacks against corporate and government data centers continue to evolve at a substantial rate, and center on three major categories:<\/p>\n<ul>\n<li>Cybercriminals attacking retail and commercial enterprises<\/li>\n<li>Hacktivists seeking to deface or cause harm to companies to which they\u2019re opposed.<\/li>\n<li>State-sponsored attacks targeting government or commercial enterprises.<\/li>\n<\/ul>\n<p><!--more--><\/p>\n<p>With <a href=\"https:\/\/www.paloaltonetworks.com\/products\/designing-for-prevention\/security-platform\" target=\"_blank\">Palo Alto Networks\u00ae Next-Generation Security Platform<\/a> you can protect your data center assets with an effective <a href=\"https:\/\/www.paloaltonetworks.com\/solutions\/initiatives\/network-segmentation\" target=\"_blank\">Zero Trust<\/a> security model and work to achieve the ultimate goal of threat prevention in the data center.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/best-practices-data-center-security\" target=\"_blank\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:28.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-14686 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Screen-Shot-2016-06-15-at-1.30.35-PM-500x141.png\" alt=\"Screen Shot 2016-06-15 at 1.30.35 PM\" width=\"500\" height=\"141\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Screen-Shot-2016-06-15-at-1.30.35-PM-500x141.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Screen-Shot-2016-06-15-at-1.30.35-PM-230x65.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Screen-Shot-2016-06-15-at-1.30.35-PM-768x217.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Screen-Shot-2016-06-15-at-1.30.35-PM-510x144.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Screen-Shot-2016-06-15-at-1.30.35-PM-142x40.png 142w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Screen-Shot-2016-06-15-at-1.30.35-PM.png 846w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/apps\/pan\/public\/downloadResource?pagePath=\/content\/pan\/en_US\/resources\/whitepapers\/best-practices-data-center-security\" target=\"_blank\">Download our whitepaper<\/a> to learn more about how to secure data in the data center.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attacks against corporate and government data centers continue to evolve at a substantial rate, and center on three major categories: Cybercriminals attacking retail and commercial enterprises Hacktivists seeking to deface or cause &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[75,1229],"tags":[585,73],"coauthors":[716],"class_list":["post-14683","post","type-post","status-publish","format-standard","hentry","category-data-center-2","category-security-platform","tag-whitepaper","tag-zero-trust"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=14683"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14683\/revisions"}],"predecessor-version":[{"id":14692,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14683\/revisions\/14692"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=14683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=14683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=14683"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=14683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}