Hi [[ session.user.profile.firstName ]]

Palo Alto Networks

  • Date
  • Rating
  • Views
  • Cybersecurity Threats for Education - A New Global Frontier Cybersecurity Threats for Education - A New Global Frontier Center for Digital Education, University of Wisconsin-Madison, Palo Alto Networks Recorded: Feb 23 2017 60 mins
    On a daily basis, organizations are targeted by cybersecurity threats. While these threats occur throughout the world, half of ransomware detections occur in the U.S. Today, the internet of everything, mobile devices, underfunded/staffed IT organizations and a critical lack of trained cybersecurity professionals are combining to make things more difficult. As ransomware attacks become more prevalent and the effectiveness of phishing attempts become more sophisticated, all but the largest IT organizations are fortunate if they can keep pace.

    We know cyber attackers are becoming more refined and are searching for new ways to make a profit. Thanks to advances in attack distribution, anonymous payments, reliably encrypting and decrypting data, ransomware attacks are rising dramatically. Understanding the dangers of ransomware, and how to prevent them, has never has been more important.

    SPEAKERS:
    Bob Turner, Chief Information Security Officer, Office of the CIO & Vice Provost for Information Technology, University of Wisconsin-Madison

    Brad Duncan, Unit 42 Threat Expert, Palo Alto Networks

    MODERATOR:
    Jim Jorstad, Senior Fellow, Center for Digital Education


    Please join the Center for Digital Education, the University of Wisconsin-Madison, and Palo Alto Networks for this informative on demand webinar to learn more about these challenges and to gain focused advice to help you combat one of the biggest obstacles every IT organization is facing.

    Topics will include:
    •The three key steps to protect against ransomware: preparation, prevention, and response
    •New attack strategies and what to do about them
    •Combatting new forms of cryptolocker and other ransomware
    •Myths of ransomware
  • How to Implement User-based Controls for CybersecurityVisibility and policy cont How to Implement User-based Controls for CybersecurityVisibility and policy cont Navneet Singh, Product Marketing Director, Next-Generation Firewall Recorded: Feb 2 2017 29 mins
    Visibility and policy control based on users is critical for cybersecurity. User-based policies readily show their business relevance, are more secure, easier to manage, and allow better forensics. In this webinar you will:

    •Learn the value of user-based controls using real-life data breach examples
    •Discover a step-by-step approach for implementing User-IDTM on your Palo Alto Networks Next-Generation Firewall
  • Live chat - Ransomware Survey findings Live chat - Ransomware Survey findings Alex Hinchliffe, EMEA Threat Intelligence Analyst, Unit 42, & Ramon de Boer, Sales Lead, EMEA, Palo Alto Networks Recorded: Jan 31 2017 33 mins
    A 30 minute interactive discussion based on the findings and outcome of the EMEA Ransomware Survey run by Palo Alto Networks in December 2016.
  • SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention] SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention] Anuj Sawani, Product Marketing Manager, Palo Alto Networks Recorded: Jan 26 2017 54 mins
    The first step for many organizations migrating to the cloud is the adoption of SaaS applications, such as Office 365, Box, Salesforce and many more. As an IT professional, this means you are giving permission to your users to store data in the cloud with corporate-approved services, such as OneDrive or SharePoint Online. The decision to move to the cloud is usually supported by a long list of cost and operational benefits. Infrastructure cost reduction? Check. Increased productivity? Check. License cost reduction? Check. But, have you thought about data governance and compliance, malware protection, and collaboration with external vendors? These are great questions to ask as you make this transition.
     
    Organizations look to reduce the threat surface exposed by SaaS applications as their data is now hosted in data centers that are not managed by them. Join this webinar to learn more about the evolution of the data center landscape and how to redefine your security strategy to cover the unique risks surfacing from the adoption of SaaS applications. 
  • Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks Recorded: Jan 25 2017 60 mins
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • Exploit kits: getting in by any means necessary Exploit kits: getting in by any means necessary Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Recorded: Jan 25 2017 50 mins
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Exploit kits: getting in by any means necessary Exploit kits: getting in by any means necessary Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Recorded: Jan 25 2017 50 mins
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • The Power of the Platform The Power of the Platform Zoltan Deak, Sr. Product Marketing Manager Recorded: Jan 24 2017 28 mins
    Protection. Delivered.

    Our next-gen security platform brings network, cloud and endpoint security into a common architecture providing greater visibility and control - making prevention possible.

    Traditional security methods focus on the detection of known threats, but as new threats emerge, our platform routes suspicious files and URLs to WildFireTM for threat analysis.

    In this webinar, you will learn how you can prevent never-before seen threats and protect your data through:

    •Prevention of unknown threats: Identify and block newly discovered threats in 5 minutes.
    •Shared global threat intelligence: Threat intelligence from more than 12,500 other WildFireTM users.
    •Automated security response and visibility: Reduce security workflow with automated prevention and get detailed analysis reports for threat events.
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Scott Simkin, Sr. Group Manager for Threat Intelligence Cloud, Palo Alto Networks Recorded: Jan 24 2017 37 mins
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks Recorded: Jan 23 2017 61 mins
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.
     
    This webinar will cover:
     
    • Visibility:  Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management:  Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.

Embed in website or blog