Hi [[ session.user.profile.firstName ]]
Sort by:
    • One Firewall to Rule them All!
      One Firewall to Rule them All! Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Nov 8 2016 10:00 am UTC 27 mins
    • The firewall wars have caused nothing but confusion in the market. Lines have been drawn between UTM and NGFW; are they different or are they the same thing? Unfortunately that confusion has led to introducing complexity and vulnerability in enterprise networks. There is a better way. Rather than fighting through a sea of acronyms, focus on what’s really important - How can I simplify my security infrastructure and improve my ability to fight off advanced attacks, no matter where they occur in the network?

      This session will present a new way of thinking about firewalls, one without the confusion, acronyms and complexity.

      Read more >
    • Best Practics for Automating Next Generation Firewall Change Processes
      Best Practics for Automating Next Generation Firewall Change Processes Mosh Itah, Product Line Manager at Palo Alto Networks and Edy Almer, VP Product at AlgoSec Recorded: May 18 2016 3:00 pm UTC 45 mins
    • Palo Alto Networks’ next generation firewalls (NGFW) enable security to be managed with extensive policy granularity. However, replacing or migrating traditional firewall policies to next-generation firewall policies is a complex task that often involves thousands of rules and definitions.

      AlgoSec seamlessly integrates with Palo Alto Networks NGFWs to simply and intelligently automate App-ID and User-ID security policy change workflows, business application connectivity mapping and compliance reporting across on-premise and cloud environments.

      Hear Mosh Itah, Product Line Manager at Palo Alto Networks and Edy Almer, VP Product at AlgoSec discuss how to:


      •Centrally manage security policies across multiple devices through Palo Alto Networks Panorama
      •Automate policy changes, including hands-free policy push directly to Palo Alto Networks' devices
      •View and manage your security policies holistically across a mix of traditional and Next Gen firewalls and cloud security controls
      •Allow large geographically-dispersed teams to cooperatively manage security policy changes

      Read more >
    • Why Next-Gen Firewalls & Sandboxes Are Not Enough
      Why Next-Gen Firewalls & Sandboxes Are Not Enough Barry Fisher, Sr. Product Marketing Manager OpenDNS, now part of Cisco Recorded: Oct 13 2015 5:00 pm UTC 33 mins
    • Next-generation firewalls and sandboxes stop attacks at various steps, but they only react to malicious communications and code after attacks have launched.

      There’s another way—observing where attacks are ‘staged’.

      We’re going to demonstrate how we can visualize Internet infrastructures for visibility into where attacks will emerge. Then, we’ll know where advanced malware will be downloaded and where compromised systems will callback—before attacks launch.

      In this live session, you’ll learn:

      7 steps of an attack and how you can use this data to get ahead of new security events.
      3 ways to uncover malicious activity by looking at domain names, IP addresses, and autonomous system numbers (ASNs).
      How to apply this intelligence to your current defenses.

      Read more >
    • Why Your Firewall Strategy Isn’t Working: All About Internal Network Firewalls
      Why Your Firewall Strategy Isn’t Working: All About Internal Network Firewalls John Maddison, VP of Marketing, Fortinet Recorded: Jul 9 2015 6:00 pm UTC 44 mins
    • No one is trying to reinvent the wheel here, but lets call a spade a spade. The level of threats are increasing, they are advanced, they are persistent and they are costly, so its no surprise traditional firewalls that focus on borders are just not working like they used to. The truth is the internal network is no longer a “trusted” environment, whether a malicious outsider, evil insider or unknowing participant, once inside, threats can spread and do maximum damage. Internal firewalls, while not a new concept, are finally taking hold and the results are a game changer for network protection.

      Fortinet is proud to present, Why Your Firewall Strategy Isn’t Working, Let’s Talk About Internal Network Firewalls, a deep dive into why INFW is the new “must have” in the ever shifting threat landscape.

      - Discover how multiple layers of defense are the new standard for highly-sophisticated attacks that are getting past border defenses.
      - Learn how INFW is different as a compliment to existing Firewalls and various deployment scenarios
      - Understand how a single device can work efficiently in multiple segments

      Don’t Miss, Why Your Firewall Strategy Isn’t Working, Let’s Talk About Internal Network Firewalls, and learn how an Internal Network Firewall can provide the necessary inside-out network protection you need to protect your critical data against advanced threats.

      Read more >
    • DNS Firewall: Securing Networks In a Rapidly Changing Landscape
      DNS Firewall: Securing Networks In a Rapidly Changing Landscape Michael Kaczmarek Sr. Director, Product Management, Verisign Recorded: Aug 12 2015 2:00 pm UTC 35 mins
    • Cyber threats are at an all-time high, presenting numerous challenges to organizations and end users. Additionally, with the increasing importance of mobile devices and Bring Your Own Device (BYOD) initiatives, endpoint management and security is becoming more critical. In light of these trends, proactively protecting against threats is a constant and ever-changing battle. Verisign DNS Firewall is a cloud-based network security and threat intelligence service built upon our global recursive DNS platform that offers robust protection from unwanted content and malware as well as customizable filtering down to the individual DNS level. Verisign DNS Firewall provides organizations with the opportunity to secure the rapidly growing landscape of devices on their networks with a single, simple modification – an update of the recursive DNS settings.

      Read more >
    • Gartner MQ for Web App Firewall
      Gartner MQ for Web App Firewall Terry Ray, Imperva Chief Product Strategist at Imperva Recorded: Sep 7 2016 3:00 pm UTC 66 mins
    • The new 2016 Gartner Magic Quadrant for Web Application Firewalls (WAF) is based on detailed responses to questionnaires from experienced Web App Firewall customers. Attend the webinar and hear the experiences of major customers who participated in the Gartner MQ for WAF research and how they implemented web app firewall to protect their applications and critical data.

      This webinar will discuss:

      - Detailed results and considerations of the report
      - Effective deployment options to meet enterprise demands
      - Success stories and implementation options you can leverage within your own environment
      - Sign up for this webinar today to hear Terry Ray, Imperva Chief Product - - - Strategist at Imperva, discuss the Gartner MQ for WAF.

      Read more >
    • Security Policy Orchestration for Next-Generation Firewalls & Cloud
      Security Policy Orchestration for Next-Generation Firewalls & Cloud Joerg Sieber, Sr. Product Marketing Manager, Palo Alto Networks & Maya Malevich, Product Marketing Director, Tufin Recorded: Feb 24 2016 3:55 am UTC 57 mins
    • Enterprise IT and security experts are under increasing pressure to respond to complex network changes to keep up with growing business demands. Lack of network visibility hinders the ability to deliver services and applications with security, speed and accuracy.

      Together, the Tufin Orchestration Suite and Palo Alto Networks Next-Generation Firewall provide enterprises with a Security Policy Orchestration solution to maximize agility and cybersecurity to provide customers with visibility and control across legacy and next generation firewalls, and private and public cloud platforms from a single pane of glass.

      Join us in this session as experts from Palo Alto Networks and Tufin show how security and network teams of joint customers are already working together to achieve:

      •End-to-end network security change automation with automated design and provisioning based on App-ID
      •A central security and compliance baseline across heterogeneous environments
      •Continuous regulatory compliance and auditability with industry standards
      •Policy optimization for Palo Alto Networks next-generation rules and objects, including uses and Apps
      •Visibility and control of hybrid networks‹across on-premise infrastructure and hybrid cloud environments

      Read more >
    • Security Policy Orchestration for Next-Generation Firewalls & Cloud
      Security Policy Orchestration for Next-Generation Firewalls & Cloud Joerg Sieber, Sr. Product Marketing Manager - Palo Alto Networks & Maya Malevich, Product Marketing Director Recorded: Feb 23 2016 5:00 pm UTC 57 mins
    • Enterprise IT and security experts are under increasing pressure to respond to complex network changes to keep up with growing business demands. Lack of network visibility hinders the ability to deliver services and applications with the security, speed and accuracy required for today’s heterogeneous IT environments. Add to this, the demand to mitigate cyber threats by reducing attack surface and improving overall security posture.

      Together, the Tufin Orchestration Suite and Palo Alto Networks Next-Generation Firewall provide enterprises with a Security Policy Orchestration solution to maximize agility and cybersecurity. The integration provides joint customers with visibility and control across legacy and next generation Firewalls, and private and public cloud platforms from a single pane of glass. This central console enables enforcing a security and compliance baseline, that strengthens the network security posture.
      In this session, experts from Palo Alto Networks and Tufin will show how security and network teams of joint customers are already working together to achieve:
      •End-to-end network security change automation with automated design and provisioning based on App-ID
      •Defining and enforcing a central security and compliance baseline across heterogeneous environments
      •Continuous regulatory compliance and auditability with industry standards
      •Policy optimization for Palo Alto Networks next-generation rules and objects, including uses and Apps
      •Visibility and control of hybrid networks—across on-premise infrastructure and hybrid cloud environments

      Read more >
    • Why you should consider of a managed firewall service
      Why you should consider of a managed firewall service Dan Sell Recorded: Jun 16 2016 3:00 pm UTC 11 mins
    • Learn how Dell SonicWALL can handle your network security for you. Outsource your network security with Dell SonicWALL Security-as-a-Service (SECaaS). This flexible, affordable subscription-based service lets you detect and block a wide range of advanced and emerging threats, including intrusions, viruses, spyware, worms, Trojans, key loggers, rootkits, botnets and “zero-day” malware.

      SECaaS bundles a next-generation firewall (NGFW) with a comprehensive security suite, mobile and wireless security, management and reporting, and 24x7 support — all at an affordable monthly rate.

      Find out how you can benefit from:
      •Anti-virus, anti-spyware, intrusion prevention, content filtering, application control, VPN and more
      •Weekly security reports and firewall backup
      •Configuration and security analysis by certified engineers
      •Proactive monitoring and alerting
      •Software, hardware and security signature updates

      Read more >
    • 5 Ways to Boost Network Security with a DNS Firewall
      5 Ways to Boost Network Security with a DNS Firewall Frank Lung, Director of Product Management Recorded: Feb 23 2016 6:00 pm UTC 60 mins
    • Learn how DNS firewalls enable better network protection from 1) malware, 2) spear phishing, 3) DDoS attacks, and 4) data exfiltration. Also learn how by leveraging threat intelligence, DNS firewalls can 5) mitigate threats in an even more automated, informed way.

      For example, you’ll learn that to protect from malware and data exfiltration, a DNS firewall is used to stop communication between malicious software or infected host and the malware command and control (C2) server. Without an outside connection or instructions, the malware is stopped in its tracks and ready for clean up. Or, that by adding a DNS firewall to your existing infrastructure, you can close the dangerous gap when NGFWs allow the TCP handshake to complete prior to enforcing policy. If you find these examples compelling, join us. You’ll never look at network security in the same way again.

      Read more >
    • Security Policy Orchestration for Next-Generation Firewalls & Cloud
      Security Policy Orchestration for Next-Generation Firewalls & Cloud Joerg Sieber, Senior Product Marketing Manager - Palo Alto Networks & Rick Rutledge, Senior Sales Engineer - Tufin Recorded: Jul 22 2015 6:00 pm UTC 52 mins
    • Enterprise IT and security experts are under increasing pressure to respond to complex network changes to keep up with growing business demands. Lack of network visibility hinders the ability to deliver services and applications with the security, speed and accuracy required for today’s heterogeneous IT environments. Add to this, the demand to mitigate cyber threats by reducing attack surface and improving overall security posture.
      Together, the Tufin Orchestration Suite and Palo Alto Networks Next-Generation Firewall provide enterprises with a comprehensive application-aware Security Policy Orchestration solution. This change management and automation platform enables secure and compliant environments—from on-premise networks across hybrid cloud.
      In this session, experts from Palo Alto Networks and Tufin will show how security and network teams are already working together to achieve:
      •Automated change design and verification based on App-ID
      •Optimization of next-generation firewall policies
      •Visibility and control of complex networks—from on-premise networks across hybrid cloud environments
      •Proactive risk analysis and impact simulation
      •Unified security policy across heterogeneous platforms
      •Continuous regulatory compliance and auditability with industry standards

      Read more >