Hi [[ session.user.profile.firstName ]]

Palo Alto Networks

  • Date
  • Rating
  • Views
  • 2019 Cloud Security Predictions (EMEA)
    2019 Cloud Security Predictions (EMEA)
    Greg Day, Chief Security Officer EMEA at Palo Alto Networks; James Brown, Head of EMEA Public Cloud at Palo Alto Networks Recorded: Feb 12 2019 43 mins
    On average, organizations fail 43% of CIS Foundations best practices, 36% of NIST CSF best practices, 32% of GDPR requirements and 24% of SOC 2 requirements, according to the Unit 42 cloud research team. Still, for most organizations, the speed and agility the cloud provides is undeniable, despite new risks as well as security and compliances challenges that come along with them.

    Join Palo Alto Networks EMEA’s Greg Day, regional CSO, and James Brown, head of public cloud, discuss the impact cloud has had on security and compliance, highlighting top cloud security predictions and technology trends in Europe, the Middle East and Africa. They will also provide some practical advice on how to secure your organization when moving to the AWS® cloud.

    Together, Greg Day and James Brown bring nearly 40 years of public cloud security knowledge and expertise to the table.

    Sponsored by AWS Marketplace
  • See a 360 view of YOUR threat landscape
    See a 360 view of YOUR threat landscape
    Augustin Montano, Jamian Mason, and Pablo Armas; System Engineers for Palo Alto Networks Recorded: Feb 7 2019 30 mins
    Which threats are the ones affecting my industry and my organization? How am I proactively protecting the organization against them? Is there any evidence of malicious activity as it relates to these specific campaigns? We will show you how to get the answers to this common questions that any cybersecurity professional is asking himself.
  • Leveraging a Security Platform for the Apple Ecosystem
    Leveraging a Security Platform for the Apple Ecosystem
    Jeff Gwathney, Marty Lee and Sharjeel Khan, Systems Engineers for Palo Alto Networks Recorded: Feb 6 2019 18 mins
    IT environments today are adopting BYOD initiatives and allowing employees to pick their own devices. How do you ensure your security posture is reaching all of your platforms? Join us to learn how Palo Alto Networks secures the Apple ecosystem and how we can help you enable your users.
  • AWS Security: Securing AWS Workloads with Palo Alto Networks
    AWS Security: Securing AWS Workloads with Palo Alto Networks
    Dinah Barrett, Specialist Solutions Architect, AWS Marketplace & David Maclean, Cloud Engineer, Palo Alto Networks Recorded: Feb 6 2019 52 mins
    Today, AWS provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world with customers across all industries are taking advantage of low cost, agile computing.

    In this webinar, Dinah Barrett, Specialist Solutions Architect | Management Tools, AWS
    and David Maclean, Special Cloud Engineer, Palo Alto Networks will dive into the need for additional security, over and above native security to protect AWS workloads and developer environments, examining the shared responsibility model for cloud security & diving into specific use cases.
  • Protecting against credential-based attacks
    Protecting against credential-based attacks
    Brad Cochran, Systems Engineer; John Fults, System Engineer; and Jon Hayot, Systems Engineer Recorded: Feb 5 2019 23 mins
    Credential theft is one of the first steps in common attack chains. How can you prevent credential theft with the infrastructure you have today? If credentials have already been leaked out, how can you stop their abuse? We will show you how Palo Alto Networks can help you bring peace of mind when it comes to credential theft and abuse.
  • SSL Decryption - Why, Where and How
    SSL Decryption - Why, Where and How
    Dave Shackleford, Ronald Dodge & Arun Kumar Recorded: Feb 5 2019 49 mins
    The growth in SSL/TLS encrypted traffic traversing the internet is on an explosive upturn. Given the primary benefits associated with encryption, the private and secure exchange of information over the internet, compliance with certain privacy and security regulations – such as the Health Insurance Portability and Accountability Act and Payment Card Industry Data Security Standard, or HIPAA and PCI DSS – the trend in SSL adoption is expected to continue to rise.
    Watch as our Palo Alto Networks® team of experts presents the “hows and whys” of SSL decryption. In this webcast, you will:

    -Learn why you need to enable decryption and the key metrics to support your case
    -Find out how to address internal logistics and legal considerations
    -Discover how to effectively plan and deploy decryption
  • Securing Public Cloud Workloads
    Securing Public Cloud Workloads
    Jack Farrell & Ruben Ruiz Recorded: Jan 30 2019 58 mins
    Palo Alto Networks® provides advanced protection for consistent security across all major clouds – Amazon®Web Services, Microsoft® Azure® and Google® Cloud Platform – and our automation features minimize the friction of app development and security. You can protect and segment applications, deliver, continuous security and compliance, and achieve zero-day prevention.

    Join us to learn how RedLock, now part of Palo Alto Networks, can help you solve:

    Visibility
    Compliance Assurance
    Security Governance
    Anomaly Detection and Remediation
  • Secure Your Branch
    Secure Your Branch
    Brian Tokuyoshi, Pradeep Singh, Ron Dodge, with host Karin Shopen Recorded: Jan 24 2019 57 mins
    There’s a shift underway in branch networking. Backhauling branch office traffic to HQ made sense when accessing data center application, but does this approach still make sense? SaaS and Cloud have fundamentally changed how we use applications and access data. With the high cost of maintaining MPLS and the need to access applications in the cloud, organizations are looking for options to use SD-WAN or access the internet directly from the branch. But how do you do that safely, without watering down the protection?

    Join our Palo Alto Networks experts and learn how you can safely route branch traffic directly to the internet while ensuring the same levels of security that you expect for all your users. You will:

    •Get details on the scenarios for branch security
    •Learn about what does and doesn’t work
    •Find out how to deploy a flexible set of security options to cover your requirements
  • How to Build a Zero Trust Network
    How to Build a Zero Trust Network
    John Kindervag, Field CTO, Palo Alto Networks Recorded: Jan 17 2019 61 mins
    “Trust is always a vulnerability in a digital system,” - John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks

    Much has been written about the topic of Zero Trust. Is it a security buzz word or a true effective security strategy?

    High-profile breaches involving “trusted” insiders have given industry-wide visibility to the fact that trust represents a vulnerability for digital systems. It’s something malicious actors can and do exploit for their advantage.

    Zero Trust was first introduced around the principles of “never trust, always verify” as a means for enterprises to implement effective network segmentation. As the model has been embraced, Zero Trust evolved to become a strategic Cybersecurity initiative that major enterprises align to in order to prevent successful cyberattacks.

    Watch as our Palo Alto Networks® expert John Kindervag discusses the “whys and hows” of building a Zero Trust architecture. In this webcast, you will:

    • Learn specific outcomes of implementing a Zero Trust architecture
    • Hear recommendations on where to start when planning and implementing a Zero Trust framework
    • See how Palo Alto Networks performed in an independent evaluation on Zero Trust Networks
  • Bridging Security Gaps with Networks-to-Endpoint Integration
    Bridging Security Gaps with Networks-to-Endpoint Integration
    Konstantin Rychkov, IDC, Senior Research Analyst Recorded: Dec 13 2018 37 mins
    The typical enterprise uses an average of 30 security products, most of which from variety of vendors and typically do not integrate well and offer little information sharing…if any. Using a portfolio of integrated products from fewer vendors means greater synergies and efficiencies. This is especially true of endpoint security software, where many organizations have long and established relationships with a favorite vendor. This can lead to a sense of complacency, and there may also exist a disincentive to replace software on all of an organization’s endpoint devices, leaving organizations potentially exposed to an evolving threat landscape.

    Join us for this informative webinar where IDC analyst Konstantin Rychkov will:

    • Introduce the concept of endpoint protection integrated with network security components
    • Demonstrate how the two together provide greater effectiveness and efficiency in security
    • Detail how an integrated security stack is instrumental to holistic enterprise-wide security

Embed in website or blog