Preventing Cyberattacks in Your Datacenter

Presented by

Matt Keil, Product Marketing, Palo Alto Networks

About this talk

Securing the datacenter has never been more challenging. Cyberattacks are on the rise and targeting critical datacenter assets. Attackers are using common applications to penetrate exterior defenses, and once inside a network, act like day-to-day traffic while stealing targeted data via applications such as FTP, webmail or veiled within SSL. Making your protection challenge more difficult is the fact that cyberattacks protection must be enabled without impacting performance and your business. Finally – you can have it all! An enterprise security platform that can keep pace with the speed of your virtualization initiatives, while protecting them from cyberattacks. Join us for this exclusive event where we will discuss how to: • Apply next-generation security across both virtualized and physical network environments • Isolate mission critical applications and data using Zero Trust principles • Stop cyberattacks from moving laterally from VM-to-VM

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13397)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. This BrightTALK channel is an extension of the group and the ISCN website (, featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more