Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.
“Trust is always a vulnerability in a digital system,” - John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks
Much has been written about the topic of Zero Trust. Is it a security buzz word or a true effective security strategy?
High-profile breaches involving “trusted” insiders have given industry-wide visibility to the fact that trust represents a vulnerability for digital systems. It’s something malicious actors can and do exploit for their advantage.
Zero Trust was first introduced around the principles of “never trust, always verify” as a means for enterprises to implement effective network segmentation. As the model has been embraced, Zero Trust evolved to become a strategic Cybersecurity initiative that major enterprises align to in order to prevent successful cyberattacks.
Watch as our Palo Alto Networks® expert John Kindervag discusses the “whys and hows” of building a Zero Trust architecture. In this webcast, you will:
• Learn specific outcomes of implementing a Zero Trust architecture
• Hear recommendations on where to start when planning and implementing a Zero Trust framework
• See how Palo Alto Networks performed in an independent evaluation on Zero Trust Networks
• Get your questions answered in our Live Q&A
Greg Day, Chief Security Officer EMEA at Palo Alto Networks; James Brown, Head of EMEA Public Cloud at Palo Alto NetworksRecorded: Feb 12 201943 mins
On average, organizations fail 43% of CIS Foundations best practices, 36% of NIST CSF best practices, 32% of GDPR requirements and 24% of SOC 2 requirements, according to the Unit 42 cloud research team. Still, for most organizations, the speed and agility the cloud provides is undeniable, despite new risks as well as security and compliances challenges that come along with them.
Join Palo Alto Networks EMEA’s Greg Day, regional CSO, and James Brown, head of public cloud, discuss the impact cloud has had on security and compliance, highlighting top cloud security predictions and technology trends in Europe, the Middle East and Africa. They will also provide some practical advice on how to secure your organization when moving to the AWS® cloud.
Together, Greg Day and James Brown bring nearly 40 years of public cloud security knowledge and expertise to the table.
Augustin Montano, Jamian Mason, and Pablo Armas; System Engineers for Palo Alto NetworksRecorded: Feb 7 201930 mins
Which threats are the ones affecting my industry and my organization? How am I proactively protecting the organization against them? Is there any evidence of malicious activity as it relates to these specific campaigns? We will show you how to get the answers to this common questions that any cybersecurity professional is asking himself.
Jeff Gwathney, Marty Lee and Sharjeel Khan, Systems Engineers for Palo Alto NetworksRecorded: Feb 6 201918 mins
IT environments today are adopting BYOD initiatives and allowing employees to pick their own devices. How do you ensure your security posture is reaching all of your platforms? Join us to learn how Palo Alto Networks secures the Apple ecosystem and how we can help you enable your users.
Dinah Barrett, Specialist Solutions Architect, AWS Marketplace & David Maclean, Cloud Engineer, Palo Alto NetworksRecorded: Feb 6 201952 mins
Today, AWS provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world with customers across all industries are taking advantage of low cost, agile computing.
In this webinar, Dinah Barrett, Specialist Solutions Architect | Management Tools, AWS
and David Maclean, Special Cloud Engineer, Palo Alto Networks will dive into the need for additional security, over and above native security to protect AWS workloads and developer environments, examining the shared responsibility model for cloud security & diving into specific use cases.
Brad Cochran, Systems Engineer; John Fults, System Engineer; and Jon Hayot, Systems EngineerRecorded: Feb 5 201923 mins
Credential theft is one of the first steps in common attack chains. How can you prevent credential theft with the infrastructure you have today? If credentials have already been leaked out, how can you stop their abuse? We will show you how Palo Alto Networks can help you bring peace of mind when it comes to credential theft and abuse.
Dave Shackleford, Ronald Dodge & Arun KumarRecorded: Feb 5 201949 mins
The growth in SSL/TLS encrypted traffic traversing the internet is on an explosive upturn. Given the primary benefits associated with encryption, the private and secure exchange of information over the internet, compliance with certain privacy and security regulations – such as the Health Insurance Portability and Accountability Act and Payment Card Industry Data Security Standard, or HIPAA and PCI DSS – the trend in SSL adoption is expected to continue to rise.
Watch as our Palo Alto Networks® team of experts presents the “hows and whys” of SSL decryption. In this webcast, you will:
-Learn why you need to enable decryption and the key metrics to support your case
-Find out how to address internal logistics and legal considerations
-Discover how to effectively plan and deploy decryption
Jack Farrell & Ruben RuizRecorded: Jan 30 201958 mins
Palo Alto Networks® provides advanced protection for consistent security across all major clouds – Amazon®Web Services, Microsoft® Azure® and Google® Cloud Platform – and our automation features minimize the friction of app development and security. You can protect and segment applications, deliver, continuous security and compliance, and achieve zero-day prevention.
Join us to learn how RedLock, now part of Palo Alto Networks, can help you solve:
Visibility
Compliance Assurance
Security Governance
Anomaly Detection and Remediation
Brian Tokuyoshi, Pradeep Singh, Ron Dodge, with host Karin ShopenRecorded: Jan 24 201957 mins
There’s a shift underway in branch networking. Backhauling branch office traffic to HQ made sense when accessing data center application, but does this approach still make sense? SaaS and Cloud have fundamentally changed how we use applications and access data. With the high cost of maintaining MPLS and the need to access applications in the cloud, organizations are looking for options to use SD-WAN or access the internet directly from the branch. But how do you do that safely, without watering down the protection?
Join our Palo Alto Networks experts and learn how you can safely route branch traffic directly to the internet while ensuring the same levels of security that you expect for all your users. You will:
•Get details on the scenarios for branch security
•Learn about what does and doesn’t work
•Find out how to deploy a flexible set of security options to cover your requirements
John Kindervag, Field CTO, Palo Alto NetworksRecorded: Jan 17 201961 mins
“Trust is always a vulnerability in a digital system,” - John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks
Much has been written about the topic of Zero Trust. Is it a security buzz word or a true effective security strategy?
High-profile breaches involving “trusted” insiders have given industry-wide visibility to the fact that trust represents a vulnerability for digital systems. It’s something malicious actors can and do exploit for their advantage.
Zero Trust was first introduced around the principles of “never trust, always verify” as a means for enterprises to implement effective network segmentation. As the model has been embraced, Zero Trust evolved to become a strategic Cybersecurity initiative that major enterprises align to in order to prevent successful cyberattacks.
Watch as our Palo Alto Networks® expert John Kindervag discusses the “whys and hows” of building a Zero Trust architecture. In this webcast, you will:
• Learn specific outcomes of implementing a Zero Trust architecture
• Hear recommendations on where to start when planning and implementing a Zero Trust framework
• See how Palo Alto Networks performed in an independent evaluation on Zero Trust Networks
Konstantin Rychkov, IDC, Senior Research AnalystRecorded: Dec 13 201837 mins
The typical enterprise uses an average of 30 security products, most of which from variety of vendors and typically do not integrate well and offer little information sharing…if any. Using a portfolio of integrated products from fewer vendors means greater synergies and efficiencies. This is especially true of endpoint security software, where many organizations have long and established relationships with a favorite vendor. This can lead to a sense of complacency, and there may also exist a disincentive to replace software on all of an organization’s endpoint devices, leaving organizations potentially exposed to an evolving threat landscape.
Join us for this informative webinar where IDC analyst Konstantin Rychkov will:
• Introduce the concept of endpoint protection integrated with network security components
• Demonstrate how the two together provide greater effectiveness and efficiency in security
• Detail how an integrated security stack is instrumental to holistic enterprise-wide security