WildFire – Closing the Loop on Advanced Cyberattacks

Presented by

Scott Simkin, Sr. Cyber Analyst at Palo Alto Networks

About this talk

Cyberattacks are frequenting the headline news, highlighting the increased sophistication, persistence, and evasiveness of attack methods, and the deepening impact to businesses and their most valuable assets. Advanced threats are the motivation behind the development of our enterprise security platform - a new breed of network security to detect and defend against known and unknown threats. View this on-Demand webcast and learn how you can inform your cybersecurity strategy and better protect your network. See a snapshot of changes in the attack lifecycle and real threat data from 2,400+ networks contributing to the WildFire™ intelligence cloud. You will also learn how WildFire applies a closed-loop approach to cybersecurity: detecting and preventing unknown threats across all common file types, including Android APKs, irrespective of port, protocol or encryption.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13383)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more