Hi [[ session.user.profile.firstName ]]

Palo Alto Networks

  • Date
  • Rating
  • Views
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you
    WanaCrypt0r Ransomware – How Palo Alto Networks protects you Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42 Recorded: May 26 2017 46 mins
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • Palo Alto Networks Next Generation Endpoint Solution Traps™
    Palo Alto Networks Next Generation Endpoint Solution Traps™ Paul Wilcox Recorded: May 26 2017 49 mins
    You are invited to join this live webinar for an overview of Palo Alto Networks® Traps™ advanced endpoint protection and learn about this market-leading solution that provides multi-method protection against known and unknown threats.

    Hosted by Paul Wilcox, APAC Sales Director for Palo Alto Networks Cybersecurity Solutions Group, you will learn why Traps is the most effective solution on the market today to address the current threat landscape, including:

    •How it effectively prevent attacks against exploits and malware – such as ransomware
    •An overview of the unique approach Traps takes to endpoint security
    •How legacy antivirus is no longer effective enough
    •How Traps can replace your existing legacy antivirus software
    Included in this live webinar will be a live demonstration of Traps in action.
  • SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention]
    SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention] Charles Woo, Systems Engineer, Palo Alto Networks Recorded: May 26 2017 35 mins
    The first step for many organizations migrating to the cloud is the adoption of SaaS applications, such as Office 365, Box, Salesforce and many more. As an IT professional, this means you are giving permission to your users to store data in the cloud with corporate-approved services, such as OneDrive or SharePoint Online. The decision to move to the cloud is usually supported by a long list of cost and operational benefits. Infrastructure cost reduction? Check. Increased productivity? Check. License cost reduction? Check. But, have you thought about data governance and compliance, malware protection, and collaboration with external vendors? These are great questions to ask as you make this transition.

    Organizations look to reduce the threat surface exposed by SaaS applications as their data is now hosted in data centers that are not managed by them. Join this webinar to learn more about the evolution of the data center landscape and how to redefine your security strategy to cover the unique risks surfacing from the adoption of SaaS applications.
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you
    WanaCrypt0r Ransomware – How Palo Alto Networks protects you Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42 Recorded: May 26 2017 47 mins
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • New Traps v4.0: Advancing Endpoint Security, Again!
    New Traps v4.0: Advancing Endpoint Security, Again! Michael Moshiri, Director, Endpoint Protection, Palo Alto Networks Recorded: May 25 2017 51 mins
    We’re excited to announce the availability of the new release of Traps™ advanced endpoint protection, version 4.0. This release is packed with new features and expanded multi-method prevention capabilities that deliver unsurpassed protection against known and unknown threats.

    Join us for a webinar to learn about these new capabilities and improvements in Traps v4.0, including:

    • Support for macOS™ and Android™
    • Protection from malicious macros
    • Prevention of script-based attacks
    • Exploit kit fingerprinting protection
    • Kernel privilege escalation protection

    Plus much more...
  • Next-generation Security for the Public Cloud
    Next-generation Security for the Public Cloud Matt Keil, Director of Product Marketing at Palo Alto Networks Recorded: May 25 2017 60 mins
    As more and more organizations move their workloads to the public cloud, security remains a top concern because cybercriminals do not care whether your applications and data reside in your datacenter or in the cloud. Their goal is to steal data or computing resources by gaining access to the network, then moving laterally, potentially to the cloud to execute their goal.

    Join us for this webinar to learn how the VM-Series protects your public cloud deployment with the same next-generation firewall and threat prevention features available in our physical appliances.

    The webinar will cover:
    • Overview of the VM-Series next-generation firewall
    • How the VM-Series prevents cyberattacks in the public cloud
    • Key differences between the VM-Series and other cloud security offerings
  • Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention]
    Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Charles Woo, Systems Engineer, Palo Alto Networks Recorded: May 25 2017 48 mins
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you
    WanaCrypt0r Ransomware – How Palo Alto Networks protects you Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42 Recorded: May 24 2017 46 mins
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention]
    Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Michael Lam, Systems Engineer, Palo Alto Networks Recorded: May 24 2017 53 mins
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • Credential Theft:  A Perspective From the FBI & Unit 42 Threat Intel Team
    Credential Theft: A Perspective From the FBI & Unit 42 Threat Intel Team SSA John Caruthers, FBI & Jen Miller-Osborn Palo Alto Networks Recorded: May 23 2017 62 mins
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join the FBI and our own Unit 42 threat intelligence team as they present their insightful perspective on the cyberthreat landscape in 2017, with an emphasis on credential-based attacks and phishing. In addition to presenting their unique attack lifecycle, they will:

    * Identify trends and techniques in methods used for credential theft and abuse.
    * Review how cybercriminals have changed their tactics to compromise networks.
    * Examine who is being targeted, and why.
    * Discuss techniques to stop credential leakage.
    * Review the FBI’s role in combating this destructive attack.

    Defending against cyberattacks is tough enough, especially when attackers pose as authenticated users on your network.

    Join the FBI and Palo Alto Networks® Unit 42 to learn what to do when you discover intruders on your network, and how to prevent their attacks from succeeding

Embed in website or blog