{"id":9029,"date":"2015-05-06T14:30:54","date_gmt":"2015-05-06T21:30:54","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9029"},"modified":"2015-05-06T13:29:42","modified_gmt":"2015-05-06T20:29:42","slug":"using-the-global-threat-community-to-prevent-known-and-unknown-threats","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/05\/using-the-global-threat-community-to-prevent-known-and-unknown-threats\/","title":{"rendered":"Using the Global Threat Community to Prevent Known and Unknown Threats"},"content":{"rendered":"<p>Organizations can't keep up with advanced attackers if their only option is to clean up after\u00a0the fact.<\/p>\n<p>By employing the\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/solutions\/initiative\/threat-prevention.html\" target=\"_blank\">Palo Alto Networks Threat Intelligence Cloud<\/a>, organizations can reduce their attack surface, block all known threats and use actionable data from the global threat community\u00a0to prevent both known and unknown threats.\u00a0<!--more--><\/p>\n<p><a href=\"https:\/\/paloaltonetworks.com\/resources\/whitepapers\/threat-intelligence-cloud.html\" target=\"_blank\">Download this whitepaper<\/a>\u00a0to learn more about the Palo Alto Networks Threat Intelligence Cloud and a prevention-based approach to security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Organizations can't keep up with advanced attackers if their only option is to clean up after\u00a0the fact. By employing the\u00a0Palo Alto Networks Threat Intelligence Cloud, organizations can reduce their attack surface, block &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[108],"tags":[1175,1174,585],"coauthors":[716],"class_list":["post-9029","post","type-post","status-publish","format-standard","hentry","category-threat-prevention-2","tag-global-threat-community","tag-threat-intelligence-cloud","tag-whitepaper"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9029"}],"version-history":[{"count":2,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9029\/revisions"}],"predecessor-version":[{"id":9031,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9029\/revisions\/9031"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9029"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9029"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9029"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}