Hi [[ session.user.profile.firstName ]]

Palo Alto Networks

  • Date
  • Rating
  • Views
  • Shaping the Future of Cloud Security
    Shaping the Future of Cloud Security Amar Singh | Raef Meeuwisse | Paul Dignan | Chris Munday Recorded: May 9 2018 56 mins
    Tune in for an interactive discussion with cloud and security experts on the key trends shaping enterprise cloud strategy, explore the latest technological advancements, and discover how to better secure your critical data and workflows in the cloud.

    Join top cloud and security experts for this interactive Q&A discussion on:
    - The top cloud trends in 2018
    - Advanced security reporting & analysis
    - Minimizing your risk and reducing your attack surface
    - Recommendations for improved security
    - The future of cloud

    Speakers:
    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Raef Meeuwisse, CISM, CISA, Author of "Cybersecurity for Beginners"
    - Paul Dignan, Application Delivery, Networking and Security Expert, F5 Networks
    - Chris Munday, Senior Systems Engineer and cloud expert, Palo Alto Networks

    The session will be broadcast LIVE from the AWS Summit in London.
  • Strengthening Your Security Posture With a Transit VPC
    Strengthening Your Security Posture With a Transit VPC Matt Keil, Director of Product Marketing, Palo Alto Networks & John Plishker, Solution Architect, REAN Cloud Recorded: May 3 2018 55 mins
    As your AWS deployment scales, the web of connectivity to VPCs, the web, or resources on the corporate network can create a complex sprawl and an expanded threat footprint. Managing the many individual connections while ensuring your workloads and data are secure can become cumbersome and costly, slowing deployments and increasing risk.

    Please join Palo Alto Networks and REAN Cloud to learn how a Transit VPC coupled with the VM-Series firewall can solve these challenges using a shared services approach that centralizes security and connectivity, resulting in an improved security posture by simplified management and lowering costs.

    This webinar will discuss how the Transit VPC solution jointly built with REAN Cloud was implemented using AWS capabilities and the Palo Alto Networks VM-Series next generation firewall.
  • Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks
    Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks Kasey Cross, Senior Product Marketing Manager and Yoni Allon, Manager, Behavioral Research Recorded: Apr 26 2018 47 mins
    Fileless attacks are estimated to account for 35 percent of all attacks in 2018, according to Ponemon Institute. Threat actors can use a combination of exploits, scripts, and “living off the land” to stay under the radar. They can even carry out sophisticated attacks without ever installing malware on compromised endpoints. They can also use common networking and admin tools together with traditional malware to maintain persistence while locating and stealing valuable data.

    By monitoring user and device behavior, organizations can detect anomalies that indicate an attack is under way. Because most fileless attacks start with a vulnerability exploit, advanced endpoint protection can block the initial step of an attack from succeeding in the first place. Join us on April 26 as we discuss how organizations can detect and stop all stages of fileless attacks.

    Attend this webinar to:
    •Find out how fileless attacks occur with a demo of an attack
    •Learn how Magnifier behavioral analytics, the first app of the Palo Alto Networks Application Framework, can detect the network behaviors associated with fileless attacks.
    •Understand how Traps advanced endpoint protection can block the exploits that lead to endpoint compromise.
  • [Breach Prevention Week] Best Practices for Effective Endpoint Security
    [Breach Prevention Week] Best Practices for Effective Endpoint Security Joel Boyd, Sr. Product Marketing Manager Recorded: Apr 25 2018 63 mins
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • Cybersecurity Webinar: Behavioural Analytics with Magnifier
    Cybersecurity Webinar: Behavioural Analytics with Magnifier Bertrand Le Bail, Cybersecurity Systems Engineer, Palo Alto Networks Magnifier, Logging Service, Application Framework Recorded: Apr 25 2018 47 mins
    Join Palo Alto Networks for an exclusive Cybersecurity Webinar ‘Behavioural Analytics with Magnifier’ on April 25th at 10.30 a.m. (BST)

    During this event Bertrand Le Bail, Cybersecurity Systems Engineer for Palo Alto Networks Magnifier, Logging Service and Application Framework will introduce the concept of behavioural analytics and show how to rapidly identify and defeat targeted attacks with cloud-delivered analytics and machine learning.

    Attend this webinar to find out:

    - How to win back control of your security events using unique machine learning functionality

    - Discover how Magnifier from Palo Alto Networks can help you expose the stealthiest attacker during advanced cyberattacks
  • [Breach Prevention Week] Driving Innovations in Securing the Public Cloud
    [Breach Prevention Week] Driving Innovations in Securing the Public Cloud Anuj Sawani, Product Marketing Manager Recorded: Apr 24 2018 47 mins
    Organizations are rapidly adopting the public cloud to keep pace with growing business demands. Risk management is a top concern, as legacy security tools and techniques designed for the traditional datacenter cannot adapt to the continuous deployment model in the cloud. The tools for securing public cloud services infrastructure are manual and fragmented, making operations time-consuming and error-prone. Security, DevOps, and compliance teams need a frictionless approach to securing public cloud workloads.

    In this session, learn about recent Palo Alto Networks innovations that are changing how organizations secure the public cloud. We will cover:

    •Understand the several options available today to secure the public cloud
    •Build a strategy to manage and reduce your public cloud risks
    •Deploy security with a frictionless approach in a multi-cloud environment
  • Medical Grade Security for your Unpatchable Medical Devices
    Medical Grade Security for your Unpatchable Medical Devices Mick Coady, PwC, and Matt Mellen, Palo Alto Networks Recorded: Apr 24 2018 59 mins
    Because security is often an afterthought when medical devices are designed and maintained by the manufacturer, they are the most vulnerable devices in a hospital’s network.

    The medical device community is beginning to improve the security of their products, but it will take years for legacy devices to be upgraded or replaced. Until then, healthcare organizations need to develop strategies for mitigating the cybersecurity risks these unpatchable devices pose to their patients and the organizations themselves.

    Join Matt Mellen, a healthcare security architect and former security lead for a hospital network, and Mick Coady, a partner in the Health Information Privacy and Security Practice at PricewaterhouseCoopers, as they discuss how to approach and mitigate the challenges associated with securing medical devices in hospital environments.

    In this webinar, you will discover:
    •The cybersecurity risks posed by unpatchable and hard-to-patch medical devices
    •How to successfully mitigate medical device security risks
    •Strategies you can implement today to secure medical devices
  • Best Practices for Effective Endpoint Security
    Best Practices for Effective Endpoint Security Joel Boyd, Senior Product Marketing Manager, Palo Alto Networks & Chris Kisselburgh, Security Engineer, Cloud Harmonics Recorded: Apr 24 2018 63 mins
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • Best Practices for Effective Endpoint Security
    Best Practices for Effective Endpoint Security Joel Boyd, senior product marketing manager, Palo Alto Networks & Chris Kisselburgh, security engineer, Cloud Harmonics Recorded: Apr 24 2018 63 mins
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • [Breach Prevention Week] Beyond Layered Approach
    [Breach Prevention Week] Beyond Layered Approach Navneet Singh, Product Marketing Director, Palo Alto Networks Recorded: Apr 23 2018 50 mins
    Maintaining and troubleshooting disparate, layered security technologies is complex and time-consuming. What’s even more troubling is that these technologies don’t work together effectively to protect you against sophisticated cyberattacks.

    It’s time to rethink IT security with a strategic, architectural approach – preventing successful cyberattacks from getting to your data, apps and users.

    In this webinar, you’ll learn:
    •Why a layered security approach doesn’t work.
    •Why a strategic approach to evaluating security technologies is the way to go.
    •How the security architecture of our next-gen firewalls prevents successful cyber breaches.

Embed in website or blog