Hi [[ session.user.profile.firstName ]]

Palo Alto Networks

  • Date
  • Rating
  • Views
  • Realize the Promise of the SWIFT Customer Security Controls
    Realize the Promise of the SWIFT Customer Security Controls Lawrence Chin, Financial Services Security Architect, Palo Alto Networks Recorded: Aug 7 2018 56 mins
    Improve Your Cyber Hygiene

    Members of the Society for Worldwide Interbank Financial Telecommunications (SWIFT) cooperative had to self-attest to new mandatory security controls at the end of 2017. The next self-attestation will be required by year end 2018. After that point, SWIFT reserves the right to report non-compliance to counterparties and appropriate local regulators.

    How did your institution fare in its initial self-attestation to SWIFT’s security controls? If there was room for improvement,

    • Join this webinar to learn how to meet and/or exceed SWIFT mandatory and advisory security controls with Palo Alto Networks products
    • Hear about additional best practices that can further improve your cybersecurity posture.

    In the big picture, the SWIFT security controls and further best practices from Palo Alto Networks contribute to overall cyber hygiene, and should prove to be beneficial to all financial institutions - regardless of whether they are SWIFT members or not.
  • Forrester Total Economic Impact Study on Security Operating Platform
    Forrester Total Economic Impact Study on Security Operating Platform Scott Simkin, director of threat intelligence from Palo Alto Networks and Henry Huang, principal consultant from Forrester Recorded: Aug 2 2018 57 mins
    Our customers tell us that in addition to minimizing their risk, our Security Operating Platform – made up of integrated network, cloud and endpoint security technologies – actually decreases their incident response time while increasing the reach and efficiency of their security teams.

    Intrigued, we commissioned Forrester® Consulting to examine the overall benefits, including ROI, that enterprise customers would likely realize after deploying the Security Operating Platform.

    The study, generated after extensive interviews with longstanding Palo Alto Networks® customers, focuses on the quantifiable savings of both time and money that a hypothetical organization would realize. The study found that, over a three-year period, this organization would:

    •Realize security operation efficiencies of $4.75M
    •Avoid alternative security purchases of $3.5M
    •Generate an ROI of 65%


    Join Palo Alto Networks and guest speaker Henry Huang, principal consultant from Forrester, as we discuss the study’s findings. We encourage you to use this research to help guide your cybersecurity investment strategy and make the right security choices.

    ***The Total Economic Impact™ Of Palo Alto Networks, a March 2018 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks
  • Extending Zero Trust to the Endpoint
    Extending Zero Trust to the Endpoint John Kindervag, Field CTO, Palo Alto Networks & Lieuwe Jan Koning, CTO, ON2IT B.V. Recorded: Aug 2 2018 48 mins
    Zero Trust is a familiar concept when speaking about network architecture. The terms "never trust, always verify" rings a familiar tune to those focused on securing the network. However, as security technologies have advanced to cross-communicate between network and endpoints, Zero Trust principles should also extend from the network to the endpoints.

    Join John Kindervag, the creator of the Zero Trust model, former Forrester analyst and current Field CTO at Palo Alto Networks, as he:

    - Discusses why endpoints need to talk to and integrate with other security technologies
    - Maps Zero Trust to the five critical points of the security architecture
    - Provides a framework as to why and how to extend Zero Trust to the endpoint

    We'll also be hearing from, Lieuwe Jan Koning, CTO and Co-Founder of ON2IT, for an actual use case on endpoint Zero Trust adoption. Lieuwe will discuss:

    - Why ON2IT chose to focus on the endpoint
    - How they adopted Zero Trust
    - And, the reason why they chose Palo Alto Networks Traps advanced endpoint protection to secure their endpoints
  • Accelerate your move to Microsoft® Azure®
    Accelerate your move to Microsoft® Azure® Matt Keil, Director of Product Marketing, Public Cloud Recorded: Aug 1 2018 51 mins
    Microsoft® Azure® can change the way your organization does business by increasing agility, scalability and storage. Although the benefits of Azure – and the public cloud – are well-documented, questions about security, potential data loss and business interruption remain, potentially slowing cloud adoption.

    Join us for a webinar focused on accelerating your move to Azure and securing your data, apps and DevOps environments once there by delivering consistent, automated security across all your environments.

    You’ll learn:

    - Common public cloud security challenges
    - How the Palo Alto Networks® cloud security portfolio protects you
    - How automation enables app developers to operate at cloud speed
  • Accelerate your move to Microsoft® Azure®
    Accelerate your move to Microsoft® Azure® Matt Keil, Director of Product Marketing, Public Cloud Recorded: Aug 1 2018 50 mins
    Microsoft® Azure® can change the way your organization does business by increasing agility, scalability and storage. Although the benefits of Azure – and the public cloud – are well-documented, questions about security, potential data loss and business interruption remain, potentially slowing cloud adoption.

    Join us for a webinar focused on accelerating your move to Azure and securing your data, apps and DevOps environments once there by delivering consistent, automated security across all your environments.

    You’ll learn:

    - Common public cloud security challenges
    - How the Palo Alto Networks® cloud security portfolio protects you
    - How automation enables app developers to operate at cloud speed
  • Endpoint and Network Security: Better Together
    Endpoint and Network Security: Better Together Danny Milrad, Director of Endpoint Products, and Scott Simkin, Director of Threat Intelligence, Palo Alto Networks Recorded: Jul 31 2018 55 mins
    Threats are evolving far too quickly for point products to keep up. Security point products that operate and analyze in silos have led to security gaps and fragmented policies that fail to prevent successful cyberattacks. With more than 9 million new instances of malware each month, deploying disparate point products is no longer enough.

    Join Danny Milrad, Director of Endpoint Product Marketing, and Scott Simkin, Director of Threat Intelligence Product Marketing, as they discuss:

    - The need for endpoint security to augment perimeter protections
    - The value of threat intelligence collected, analyzed and shared across the security architecture
    - 3 requirements for effective endpoint protection
    - How Traps, Palo Alto Networks advanced endpoint protection, extends protections from the firewall throughout the organization
  • Advanced & Frictionless Security in a Multi-Cloud Environment
    Advanced & Frictionless Security in a Multi-Cloud Environment Anuj Sawani, Product Marketing Manager Recorded: Jul 31 2018 62 mins
    Today, organizations need higher performance and faster access to the latest innovative technologies in order to grab whatever competitive edge they can. This almost always means going to the cloud.

    Unfortunately, in the rush to get there, enterprises can find themselves with data and applications scattered across private and public clouds – often multiple public clouds – spanning IaaS, PaaS and SaaS.

    Without the appropriate security and compliance strategy in place, this often results in poor visibility and increased risk. The simple truth is that multi-cloud security isn’t intuitive.

    We can make it easier. This webinar will cover:

    •Common speed bumps your security and DevOps teams face
    •Innovative security strategies to tackle a wide range of cloud risks
    •Security automation and integration within the development lifecycle
    •Achieving consistent and advanced multi-cloud protections

    Register now and learn how to secure your multi-cloud environment with advanced, frictionless protection.
  • Advanced & Frictionless Security in a Multi-Cloud Environment
    Advanced & Frictionless Security in a Multi-Cloud Environment Anuj Sawani, Product Marketing Manager Recorded: Jul 31 2018 62 mins
    Today, organizations need higher performance and faster access to the latest innovative technologies in order to grab whatever competitive edge they can. This almost always means going to the cloud.

    Unfortunately, in the rush to get there, enterprises can find themselves with data and applications scattered across private and public clouds – often multiple public clouds – spanning IaaS, PaaS and SaaS.

    Without the appropriate security and compliance strategy in place, this often results in poor visibility and increased risk. The simple truth is that multi-cloud security isn’t intuitive.

    We can make it easier. This webinar will cover:

    •Common speed bumps your security and DevOps teams face
    •Innovative security strategies to tackle a wide range of cloud risks
    •Security automation and integration within the development lifecycle
    •Achieving consistent and advanced multi-cloud protections

    Register now and learn how to secure your multi-cloud environment with advanced, frictionless protection.
  • Cyberattack Simulation Training with Cyber Range
    Cyberattack Simulation Training with Cyber Range Pamela Warren, Cyber Range Lead and Ken Alexander, Technical Trainer Recorded: Jul 27 2018 47 mins
    This session will dive deep into the skills and techniques mastered during Cyber Ranges such as preventing live attacks, responding to real-world threats, and building end-to-end prevention processes while battling other teams during full-on cyberattack scenarios.
  • Watch & Learn: Threat Intelligence with AutoFocus and MineMeld
    Watch & Learn: Threat Intelligence with AutoFocus and MineMeld Michael Breen, Consulting Engineer Recorded: Jul 26 2018 47 mins
    This is the “Best of Ignite” Week. Day 4 will be a deep dive on Threat Intelligence.

    Drive Action on Threat Intelligence with AutoFocus and MineMeld
    Learn how to bridge the gap between machine-generated threat data and security operations professionals with AutoFocus contextual threat intelligence and MineMeld syndication engine. Enriched with context from WildFire service, the Unit 42 threat research team and third-party feeds, AutoFocus enables you to identify and act against the most critical threats facing your organization. This industry-first threat operations approach allows native workflows between intelligence generation, verification and prevention enforcement through the Next-Generation Security Platform. You’ll learn:

    • How to use integrated threat intelligence to improve existing security workflows
    • The value of adding real-time context to security events
    • How to enable aggregation of any third-party threat intelligence feed with MineMeld
    • How to drive automated prevention enforcement for highly targeted attacks

Embed in website or blog