Resources

Access the latest technical content from Fuel and Palo Alto Networks.

Fuel's resource center houses webinars, presentations, technical papers and more on the latest topics in cybersecurity. Learn critical threat prevention strategies, migration tips, the latest PAN-OS update, and other tools for defending against cybersecurity threats. Fuel resources feature experts in the field and are available exclusively to Fuel User Group members.

Log in or Join to access the Resource Center  

Recent WebinarS 
Yes We Can: Bringing Rogue Cloud Apps into Compliance: Join Ofer Or, Vice President of Products at Tufin, for a webinar to learn how to monitor and manage security policies for applications that span physical networks and hybrid cloud platforms for increased agility with maximum security and compliance – all in 5 steps. View recent and upcoming webinars.
recently uploaded
Best Practices for Automating Next Generation Firewall Change Processes
In this webcar recording, Moshe Itah, Product Line Manager at Palo Alto Networks, and Edy Almer, VP Product at AlgoSec, share advice on automating and managing policy changes.
Fuel User Group and VMUG Present: NSX, Next-Gen Firewall and the Software-Defined Data Center
In this webinar, experts from Palo Alto Networks and VMware, along with members of Fuel and VMUG will provide a technical overview of the advantages of pairing Palo Alto Networks’ VM-series next-generation firewall and Panorama centralized management tools with VMware’s NSX network virtualization platform.
Find Your Blindspot, Plan for Visibility
Network architects must support a wide range of security appliances - including firewalls, intrusion prevention, forensics, etc. to guard against the growing threat landscape. As networks become increasing complex, it's critical to plan - and require - visibility.
The Scarlet Mimic Campaign: An Ask the Expert Session with Unit 42

The Palo Alto Networks threat research team, Unit 42, spent seven months investigating a series of attacks targeting human rights activists, dubbed “Scarlet Mimic.” In a Q&A session, members of the Unit 42 team shared the findings of their research and discussed the tools used to complete this analysis. 

Optimizing Network Design in Security Projects
 Whether you are deploying a next-gen firewall, forensic analyzer, or other security systems, preparing an accurate network design schema to support the solution is the first step towards optimizing results.