{"id":8847,"date":"2015-04-21T14:00:07","date_gmt":"2015-04-21T21:00:07","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8847"},"modified":"2015-04-20T12:29:36","modified_gmt":"2015-04-20T19:29:36","slug":"palo-alto-networks-named-2015-best-enterprise-security-solution-product-by-cyber-defense-magazine","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/04\/palo-alto-networks-named-2015-best-enterprise-security-solution-product-by-cyber-defense-magazine\/","title":{"rendered":"Palo Alto Networks Named 2015 Best Enterprise Security Solution Product by Cyber Defense Magazine"},"content":{"rendered":"<p>Cyber Defense Magazine has named the Palo Alto Networks enterprise security platform as Best Enterprise Security Solution Product for 2015.<\/p>\n<p><center><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/palo-alto.png\"><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:88.26%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-8848 size-medium lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/palo-alto-230x203.png\" alt=\"palo-alto\" width=\"230\" height=\"203\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/palo-alto-230x203.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/palo-alto-500x441.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/palo-alto-339x300.png 339w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/palo-alto-45x40.png 45w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/palo-alto.png 906w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/a><\/center><!--more--><\/p>\n<p>The representatives from the magazine stopped by the Palo Alto Networks booth, #N4120, at <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/04\/come-find-us-expert-presentations-product-demos-and-wii-mario-kart-racing-at-rsa-2015\/\" target=\"_blank\">RSA 2015<\/a> to deliver the award.<\/p>\n<p>Cyber Defense Magazine recognizes companies for their unique and compelling value proposition for their product and service.\u00a0 The natively integrated Palo Alto Networks enterprise security platform brings network, cloud and endpoint security into a common architecture, with complete visibility and control, ensuring organizations can detect and prevent attacks. This next-generation enterprise platform streamlines day-to-day operations and boosts security efficacy, and the one-of-a-kind, multi-layered defense model prevents threats at each stage of the attack kill chain. For more information on our award-winning Enterprise Security Platform, <a href=\"https:\/\/www.paloaltonetworks.com\/products\/platforms.html\" target=\"_blank\">click here<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Defense Magazine has named the Palo Alto Networks enterprise security platform as Best Enterprise Security Solution Product for 2015.<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155],"tags":[1147,454],"coauthors":[709],"class_list":["post-8847","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","tag-cyber-defense-magazine","tag-enterprise-security-platform"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8847","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8847"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8847\/revisions"}],"predecessor-version":[{"id":8849,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8847\/revisions\/8849"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8847"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8847"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8847"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8847"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}