Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date URL Filtering Best Practices-- Making Your Web Security Policies Work for You John Harrison As attackers evolve and progress, organizations require increased flexibility that goes beyond the traditional binary categorization and policies for ... 3 years ago | 52 mins URL Filtering Best Practices - Las Políticas de Seguridad Web a tu Servicio Marçal Balasch A medida que los atacantes evolucionan, las organizaciones requieren una mayor flexibilidad que va más allá de la categorización binaria tradicional y... 3 years ago | 38 mins URL Filtering Best Practices – Mitarbeiter optimal vor Web-basierten Angriffen s Dirk Thelen und Sven Burkhardt Für Unternehmen wird es immer wichtiger, dass Mitarbeiter im Rahmen ihrer Tätigkeiten Internet Access haben. Gleichzeitig steigt das Risiko, dass dadu... 3 years ago | 60 mins URL Filtering Best Practices: Making Your Web Security Policies Work For You Kelvin Kwan and Suzanne VanPatten with Host Zoltan Deak As attackers evolve and progress, organizations require increased flexibility that goes beyond the traditional binary categorization and policies for ... 4 years ago | 61 mins Leverage Remote Browser Isolation (RBI) to Enhance Your Company’s DLP Strategy Sunil Ravi, Chief Security Architect at Versa Networks As enterprises adjust to a hybrid workforce, their remote users are exposed to threats on the open internet that put their corporate data at risk in w... 7 months ago | 61 mins URL Filtering Best Practice - Come Creare Web Security Policy Funzionali Pamela Ancel Juachon Data la rapida evoluzione degli hacker, le aziende necessitano di una maggiore flessibilità che va oltre la tradizionale categorizzazione e policy per... 3 years ago | 60 mins Leistungsstark und blitzschnell installiert: die VMware Distributed Firewall Holger Schmidt | Christian Schütze, Senior Solutions Engineers Wie lässt sich eine Firewall im Rechenzentrum unkompliziert implementieren und betreiben? Um eine Firewall im Rechenzentrum in Betrieb zu nehmen, sin... 2 years ago | 54 mins Case study -- How Check Point secures internet access for its remote employees Manish Upadhaya, Humza Ismaiel Learn how Check Point secures its own employees as they work remotely with Harmony Connect Internet Access. • 100% SaaS delivered – 15 mins setup • S... 2 years ago | 35 mins How to Safely & Reliably Enable Office 365 Keith Steller, System Engineer at Palo Alto Networks As enterprises continue adopting Microsoft® Office 365™, there is continued focus on safely and reliably enabling it. Join this webinar to learn how y... 6 years ago | 32 mins An Enterprise Security Platform Approach to APT's Scott Simkin, Sr. Cyber Analyst at Palo Alto Networks Today’s advanced persistent threats (APTs) evade traditional security controls with techniques such as SSL encryption and require an integrated, simpl... 8 years ago | 59 mins