Hi [[ session.user.profile.firstName ]]

Palo Alto Networks

  • Date
  • Rating
  • Views
  • Brisez les silos de sécurité. Découvrez Cortex XDR.
    Brisez les silos de sécurité. Découvrez Cortex XDR.
    Jean-Philippe Resca, directeur commercial France - Palo Alto Networks Recorded: Apr 18 2019 44 mins
    Ça y est ! La nouvelle génération de plateforme de détection et de réponse est enfin arrivée. Avec elle, vous allez enfin pouvoir maintenant intégrer l’ensemble des données des réseaux, terminaux et clouds pour stopper les attaques avancées.

    Jean-Philippe Resca, directeur commercial France, fera un point concret et sans filtre sur les fonctionnalités révolutionnaires de détection et de réponse de Cortex XDR™.

    Au sommaire de cette session :

    Comment utiliser toutes les sources de données combinées et quels en sont les avantages
    Le rôle de l'analyse comportementale dans la détection des menaces avancées
    Comment l'Intelligence Artificielle va considérablement simplifier la complexité des investigations

    Assistez à notre webinar pour une démo Cortex XDR™ en direct et posez vos questions à notre expert au cours d'une séance de questions-réponses.

    Vous ne pouvez pas assister au direct ? Inscrivez-vous quand même et nous vous enverrons l’enregistrement de l'évènement.
  • Debunking the Myth Around Implementing Zero Trust
    Debunking the Myth Around Implementing Zero Trust
    John Kindervag, Field CTO and Scott Stevens, SVP Global Systems Engineering, Palo Alto Networks Recorded: Apr 16 2019 64 mins
    One of the mythologies surrounding Zero Trust is that it is difficult and expensive to implement. Not true! In this webcast, John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks and Scott Stevens, SVP Global Systems Engineering at Palo Alto Networks debunk this myth.

    Join us for this webcast and learn:
    •How Zero Trust is easy to implement using an iterative approach designed to mitigate disruption or downtime
    •The five key steps to implementation
    •Why Zero Trust is easy to measure, including maturity metrics for Zero Trust

    You’ll also get your questions answered in our live Q&A.
  • Are You CloudFit? Twelve AWS Best Practices
    Are You CloudFit? Twelve AWS Best Practices
    John Martinez, Director of Technical Support at Palo Alto Networks Recorded: Apr 9 2019 61 mins
    As the cloud constantly evolves, how do you keep your cloud “in shape” as well as ensure long-term protection and success?

    By implementing best practices and identifying issues before they become costly problems, you’ll improve your cloud security and operations to handle any threat that comes through.

    In this webinar, our expert panel will highlight the critical cloud security and compliance “exercises” that will keep your organization’s data and systems secure in Amazon Web Services, so you can:

    * Improve your overall cloud security and health
    * Minimize the impact of human errors on your AWS® cloud
    * Encourage a more defensive mindset across your organization
  • Debunking the Myth Around Implementing Zero Trust
    Debunking the Myth Around Implementing Zero Trust
    John Kindervag, Field CTO and Scott Stevens, SVP Global Systems Engineering, Palo Alto Networks, with host Karin Shopen Recorded: Apr 4 2019 63 mins
    Zero Trust has become a global strategic initiative for preventing successful cyberattacks by eliminating the concept of “trust” from digital systems.

    Yet, when it comes to actually implementing a Zero Trust strategy within your organization, perceptions can be skewed, like thinking Zero Trust is challenging to set up and costly to implement – neither of which is true.

    In this webcast, John Kindervag, creator of Zero Trust and field CTO, and Scott Stevens, SVP of Global Systems Engineering, will debunk the myth and teach you:
    * What Zero Trust is and is not
    * A five-step methodology for implementing a Zero Trust network
    * How easy it is to achieve Zero Trust using a consistent approach

    Join our webcast with live Q&A and get insight into effectively implementing a Zero Trust strategy.
  • SD-WAN and Security at the Edge on Intel Architecture
    SD-WAN and Security at the Edge on Intel Architecture
    Ramnath D Shenai - VMware, Sam Rastogi - Palo Alto Networks, Goker Ozturk - Intel Recorded: Apr 4 2019 60 mins
    Enterprises are deploying SD-WAN, at an increasingly faster pace, as an important first step towards building optimized environments that are ready for multi-cloud world. As a platform, SD-WAN is a solid first step in deploying edge security applications and services with additional security functions like next-generation firewall (NGFW), intrusion prevention, SSL inspection, web filtering, DNS security, and malware analysis needed as well. In this webinar, we will discuss how VMware SD-WAN by Velocloud lays the foundation for SD-WAN and how Palo Alto Networks VM-Series and GlobalProtect security products complement and strengthen overall security to help organizations prevent successful cyberattacks. We will also discuss how Intel architecture, network and security specific hardware and software technologies help these workloads operate in a consistent, saleable and high performance way.
  • Take Back Control of Your DNS Traffic
    Take Back Control of Your DNS Traffic
    Bryan Lee and Martin Walter, with host Zoltan Deak Recorded: Apr 2 2019 44 mins
    DNS is wide open for attackers. Security teams are under pressure to enforce consistent protections for millions of new malicious domains while keeping up with advanced tactics like DNS tunneling. How can you take back control of your DNS traffic and prevent these threats?

    Join Palo Alto Networks experts to see:
    • How real-world threats found by Unit 42 use DNS for command-and-control and data theft.
    • A detailed demo of how the new DNS Security service disrupts attacks that use DNS.
    • Best practices for protecting DNS traffic to keep your organization safe.

    You’ll also get your questions answered in our live Q&A when you join us for this interactive session. Learn what you should be doing to protect your DNS traffic today—and how to stay ahead of emerging tactics.
  • Build Security In: Cloud Security at DevOps Speed
    Build Security In: Cloud Security at DevOps Speed
    Rick Collette, Cloud Architect at Palo Alto Networks; John Martinez, Director of Public Cloud R&D, Palo Alto Networks Recorded: Mar 22 2019 55 mins
    As DevSecOps adoption slowly goes mainstream among organizations, it is fundamentally changing the culture and collaboration semantics among security, development and operations teams.
    This webinar will explore whether SecOps and DevOps have been effective in fostering collaboration to align their different goals into a single effort or have they slipped into implementing primitive security models of the past. Is the union of DevOps and SecOps on rocky ground and in need of marriage counseling, or are they copacetic? In this webinar, we’ll explore the needs of DevOps, Security and IT and five principles that will help you move at the speed of cloud together without creating gaps in your security posture.
  • XDR - Neue Waffe im Kampf gegen Cyber-Angriffe
    XDR - Neue Waffe im Kampf gegen Cyber-Angriffe
    Chistian Doolmann, Systems Engieneer Specialist, Palo Alto Networks Recorded: Mar 22 2019 63 mins
    Cyber-Attacken erfolgen heutzutage häufig direkt über gezielt ausgewählte Endgeräte. Daher setzen viele Unternehmen auf EDR (Endpoint Detection and Response) als Lösung, um Cyberangriffe zu erkennen und darauf zu reagieren.

    Das Problem dabei: Die Sicht von EDR ist auf den jeweiligen Endpoint beschränkt, ergänzende Informationen fehlen und müssen mühsam und aufwändig ergänzt werden. Laut SANS Institute werden zudem nur 26% aller initialen Angriffsvektoren durch EDR-Lösungen erkannt.

    Eines wird dabei deutlich: Ein neuer Ansatz muss her! Und hier kommt XDR ins Spiel. Im Gegensatz zu EDR kombiniert es Daten aus verschiedenen Quellen wie zum Beispiel den Endpoints, dem Netz, der Cloud, Log-Daten mit allgemeinen Bedrohungsinformationen. Dadurch bringt es unterschiedliche Aspekte zusammen und liefert ein weitaus vollständigeres Bild eines Angriffs – der dank der integrierten Analysefunktionen schneller erkannt und besser abgeblockt werden kann.

    Wenn Sie erfahren wollen, wie Ihr Unternehmen dank XDR sicherer werden kann, dann sehen Sie sich dieses Webinar an.
  • Cloud Native Security: What’s Missing?
    Cloud Native Security: What’s Missing?
    Speaker: Tim Prendergast, Chief Cloud Officer at Palo Alto Networks Recorded: Mar 21 2019 43 mins
    As organizations adopt public cloud to accelerate development and reduce reliance on traditional datacenters, risk management remains a top concern. It’s well understood that legacy security tools designed for the datacenter cannot adapt to the distributed, dynamic nature of cloud environments, but what about the security tools offered by the cloud providers? Can they offer the visibility and control needed to effectively manage risk and mitigate vulnerabilities? We take a deep dive into native cloud security to see how these tools work and uncover if they can effectively support the differing security requirements across SecOps, DevOps, and compliance teams.
  • Don’t Get Jacked: 4 Steps to Protect Your Xaas in the Cloud
    Don’t Get Jacked: 4 Steps to Protect Your Xaas in the Cloud
    Speaker: Matt Chiodi, CSO, Palo Alto Networks Recorded: Mar 20 2019 50 mins
    The good news is that AWS, GCP and Azure provide better core security than your data center could ever provide. The bad news is that your users can also provision a complete stack with only a few clicks... without any security oversight. This session will dissect the latest cloud-based high-profile breaches and highlight four critical steps organizations of all sizes can take to prevent them.

Embed in website or blog