Hi [[ session.user.profile.firstName ]]

An Enterprise Security Platform Approach to APT's

Today’s advanced persistent threats (APTs) evade traditional security controls with techniques such as SSL encryption and require an integrated, simple and automated approach that can detect and defend at each stage of an attack. Watch this demonstration of how the Palo Alto Networks enterprise security platform protects organizations from known threats, zero-day exploits, unknown malware, and the complete spectrum of APTs.

Learn How To:

- Simply deploy Threat Prevention, URL Filtering, WildFire and next-generation firewall policy from your Palo Alto Networks enterprise security platform.
- Get up and running quickly with real-world policy recommendations, including integrated logging and reporting of all key threat events.
- Turn on automated discovery and protection for unknown, zero-day malware and exploits with WildFire.
Recorded Dec 9 2014 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Scott Simkin, Sr. Cyber Analyst at Palo Alto Networks
Presentation preview: An Enterprise Security Platform Approach to APT's
  • Channel
  • Channel profile
  • LIVE demo - Safely Enable SaaS Applications with Aperture Feb 13 2018 2:00 pm UTC 45 mins
    Omar Amarin, Systems Engineer
    The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.

    Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:

    •Gain visibility and granular, context-based control of SaaS applications.
    •Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
    •Protect against new insertion and distribution points for malware.
    •Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

    The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
  • Best Practices in Preventing Credential Phishing in Healthcare Feb 12 2018 6:00 pm UTC 60 mins
    Chris Sherman, Forrester Senior Analyst & Matt Mellen, Healthcare Security Architect, Palo Alto Networks
    It turns out email and phishing attacks are NOT going away any time soon …

    According to the 2017 HIMSS Healthcare IT Cybersecurity Study, almost 90 percent of all U.S. respondents report that phishing, and education about phishing, represent their top vulnerabilities AND opportunities for improvement.

    Join us for a webinar hosted by Matt Mellen, healthcare specialist at Palo Alto Networks and Chris Sherman, Forrester senior analyst serving security and risk professionals. Chris leads Forrester’s healthcare infosecurity coverage and has published multiple reports on best practices within the areas of healthcare and medical device security.

    Register for the webinar and learn:
    •The current – and future – state of healthcare security.
    •Successful approaches your healthcare IT peers have followed to lower risks from phishing
    •How to prepare your healthcare organization for credential phishing attacks

    Presenters:
    •Chris Sherman: Senior Analyst - Security & Risk Professionals, Forrester
    •Matt Mellen: Healthcare Security Architect, Palo Alto Networks
  • Automating VM-Series deployments on AWS and Azure with Terraform and Ansible Jan 31 2018 2:00 pm UTC 60 mins
    Vinay Venkataraghavan - Senior Solution Architect, Technical Business Development
    Join us for our new cloud webinar, in which cloud automation experts will show you how customers have successfully automated their VM-Series next-gen firewall deployments and effectively protected their DevOps environments in AWS®.

    You’ll learn how to:

    - Implement touchless deployment for your fully configured firewalls with native and third-party automation tools, such as Terraform® and Ansible®

    - Consume tags to execute your commitless policy updates

    - Automate VM-Series deployments across your multi-cloud environment
  • [Breach Prevention] The Ransomware Epidemic Continues Jan 25 2018 6:00 pm UTC 60 mins
    Bryan Lee, Threat Intelligence Analyst, Unit 42, the Palo Alto Networks threat research team
    Let’s face it, ransomware is everywhere. Every few months it seems there’s another new variant ripping across the world’s networks – snarling business and leaving chaos in its wake.

    And because it’s become such a reliably lucrative business model, with ever-lower barriers to entry, ransomware won’t be going away anytime soon.

    Outdated technology and poor cybersecurity hygiene help attackers to spread ransomware quickly and effectively. But it doesn’t have to be that way.

    Watch this webinar to learn:

    · About the rise of the ransomware business model

    · How adversaries are honing their tactics

    · What you can do to better protect your organization against ransomware attacks
  • [Breach Prevention] The Year We Reject "Good Enough" Security in the Cloud Jan 24 2018 5:30 pm UTC 45 mins
    Matt Keil, Director of Product Marketing, Public Cloud
    Join this webinar to hear 2018 predictions and recommendations on rejecting “good enough” security in the cloud and balancing the need for agility while improving the security of applications and securing the data as it moves the public cloud.
  • [Breach Prevention] Cloud will Accelerate Channel Partner Migration in 2018 Jan 23 2018 6:00 pm UTC 60 mins
    Palo Alto Networks
    In this webinar we will discuss topics on how to accelerate channel partner migration in 2018. With a clear understanding of the customer’s cloud security priorities, risks and need for a platform, channel partners have realized they must strengthen their value proposition and differentiate themselves by accelerating their migration to becoming next-generation security innovators.
  • Cyber Security Webinar: The Journey Towards GDPR Compliance Jan 23 2018 10:30 am UTC 60 mins
    Fred Streefland, senior product marketing manager at Palo Alto Networks and Mark Child, managing director at Xcina Consulting
    Learn the pragmatic and simple approach to deal with GDPR

    Join Fred Streefland, senior product marketing manager at Palo Alto Networks and guest speaker Mark Child, managing director at Xcina Consulting, for an informative webinar about taking a pragmatic approach to the GDPR and compliance.

    Attend this event to understand:

    - New cybersecurity legislation and the main elements of the GDPR
    - What’s in the GDPR and what’s not
    - Security-specific recitals and articles
    - The U.K. Data Protection Bill and modifications to the GDPR
    - How Palo Alto Networks can help you become GDPR-compliant

    We do hope you can join us for this exclusive webinar.
  • [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations Jan 22 2018 6:00 pm UTC 60 mins
    Palo Alto Networks Cybersecurity Experts
    Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.

    Here’s a sampling of some of the predictions our cybersecurity experts will review:

    •Ransomware Prevention more important than ever
    •The Internet of Things blurs the line between personal and corporate security
    •The era of Software Supply-Chain attacks has begun
    •The Cloud will accelerate channel partner migration to next-generation security innovators
    •Advances in Machine Learning will improve both patient care and cybersecurity
    •Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls
  • Data Driven Security: Improve Your Security Posture To Defeat Your Adversary Jan 18 2018 10:00 am UTC 45 mins
    Jamie Brummell, EMEA Systems Engineer, Palo Alto Networks and Paul Davies, EMEA Senior Alliances SE, Splunk
    Today’s complex, multi-faceted infosec challenges can cause IT and security teams to spend unnecessary cycles trying to perform the fundamentals – basic hygiene, assessing posture, and validating security “readiness”. With most organizations getting attacked weekly, ensuring these functions are efficient and effective is more important than ever.

    In this session you’ll learn how end-to-end security visibility is a critical first step to improving your security posture. By combining endpoint, network, user activity, and threat intelligence you can be truly data-driven and:

    - Identify malicious activity and gain key context to help prevent similar threats
    - Apply methods to help improve accuracy and further mitigate risk
    - Automate context gathering and response actions to accelerate investigations, and to more effectively contain and prevent threats

    Join us and get the inside view into the latest technological advancements powering today’s cybersecurity solutions.
  • Win the Battle To Secure Your Endpoints Jan 18 2018 2:00 am UTC 60 mins
    Arthur Luo & Dennis Lin
    How the recent advanced threats execute on your endpoints and the Palo Alto Networks prevention advisory

    Traps replaces legacy antivirus and secures endpoints with a multi-method prevention approach that blocks malware and exploits, both known and unknown, before they compromise endpoints, such as laptops, desktops and servers.
    •Challenges with AV today
    •Difference between exploits and malware
    What is malware? What is an exploit? How to prevent against both attack vectors
    •Prevention is better than a cure
    Having a multiple method approach against APTs
    •Automated Prevention Platform via Palo Alto Networks
    Demo of live hack against Traps 4.1
  • Securing K-12 modern learning environments using E-rate funding Jan 17 2018 6:00 pm UTC 60 mins
    David Cumbow, Systems Engineering Manager, and Greg Herbold, Director of the SLED Segment, Palo Alto Networks
    Protecting student and district data, privacy, and safety with their limited IT resources is a tall order for K-12 institutions. This no-cost webinar is for districts and their consultants considering the E-rate program for funding firewall services. Join our education and E-rate experts to learn:

    •About Palo Alto Networks and how we uniquely protect students, data, and networks
    •How your peers have successfully leveraged E-rate funding to create safe learning environments
    •Which Palo Alto Networks products are eligible
    •Where to find E-rate resources

    SPEAKERS:

    David Cumbow is a Systems Engineering Manager with Palo Alto Networks. Prior to coming to Palo Alto Networks, David spent 13 years in the public sector working for the third-largest K-12 school district in Riverside County. Having worked jobs from Database Administration to Virtualization, David found a passion for Networking and Security. With eight years in the security field, David has led many K-12 Districts in California to a better security posture through guidance and peer-to-peer consulting. David holds a Bachelor of Science in Computer Science from California State University.

    Greg Herbold is Director of the U.S. State/Local Government and Education (SLED) segment at Palo Alto Networks, where he is responsible for creating solutions and programs to protect our way of life in the digital age by preventing successful cyberattacks. In this capacity, he leads strategy and planning, marketing, solution development, sales programs, channel partner development, contracts, compliance and industry relations for the segment. Greg holds a Master of Arts from Georgetown University and an HP-Stanford Innovation and Entrepreneurship Certificate from the Stanford Graduate School of Business.
  • LIVE demo - Safely Enable SaaS Applications with Aperture Jan 17 2018 2:00 pm UTC 45 mins
    Omar Amarin, Systems Engineer
    The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.

    Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:

    •Gain visibility and granular, context-based control of SaaS applications.
    •Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
    •Protect against new insertion and distribution points for malware.
    •Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

    The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
  • 10 Things to Test Before Buying Your Next-Generation Firewall Recorded: Jan 10 2018 54 mins
    Navneet Singh, Director of Product Marketing and Zoltan Deak, Sr. Product Marketing Manager
    How do you ensure that you buy the right next-generation firewall today to meet your organization’s networking, performance and security needs for the present and the future? The best approach is to test it before you buy it. Your next-generation firewall should enable more than just application and user based security policies. In this webinar, we will share the 10 capabilities to test before you buy your next-generation firewall, and the top 5 mistakes to avoid.
  • Veterans in Cybersecurity: Harness the Talent of our Transitioning Warriors Recorded: Jan 9 2018 29 mins
    Congressman Mike Gallagher & John Davis, VP, Federal CSO, Palo Alto Networks
    Congressman Mike Gallagher, House Homeland Security Committee & House Armed Services Committee & John Davis, VP, Federal Chief Security Officer, Palo Alto Networks discuss the public and private initiatives to harness the talent of our transitioning warriors.
  • A Look into the Administration's Key Cyber Priorities and Efforts Recorded: Jan 9 2018 49 mins
    Thomas P. Bossert and Mark McLaughlin
    Fireside chat as presented during Palo Alto Networks inaugural Federal Ignite 2017 conference. Speakers Thomas P. Bossert, Assistant to the President for Homeland Security and Counterterrorism & Mark McLaughlin Chairman and CEO, Palo Alto Networks discuss the administration's key cyber priorities and efforts.
  • NGFW Health Checks, Services and Reports Recorded: Jan 5 2018 27 mins
    Jesse Ebel, Systems Engineering Manager and Nate Bitting, Sr Mgr, Customer Success Automation & Analytics
    Join us to learn how you can shorten your time to productivity and ensure quick & proper adoption of the functionality in your Palo Alto Networks Next Generation firewalls.

    In this webinar, you will learn about our Next Generation Firewall Best Practice tools, including the automated Feature Adoption Heat Map, Prevention Posture Assessment (PPA) and Best Practice Assessment (BPA) tools. These tools provide you with insights into how you’re leveraging built-in features within your network, and suggest specific configuration recommendations for improving your security posture. We’ll also show you how to pull the data, review the reports, and will answer any questions you may have about these Health Check tools.
  • Government Panel: Moving Targets: Securing Dynamic Cloud Environments Recorded: Jan 3 2018 45 mins
    Government Panel of Experts
    Multi-cloud architectures and shared services give Federal agencies new opportunities to transform and modernize, but also introduce new risks. Agencies need to shift cyber strategy beyond a traditional perimeter approach. This session will explore best practices to deploy consistent and flexible security protections across physical and virtual environments. How can agencies meet growing demands and unleash the benefits of cloud without compromising data integrity? How do you lock down mission-critical applications in a highly-connected environment? What inconsistencies should agencies eliminate in their security policies? Join us to explore options for managing emerging risks and achieving new levels of cyber protection for public, private, and hybrid cloud infrastructure.

    Speakers: Lee Klarich, Chief Product Officer, Palo Alto Networks & Panelists: Peter Kim, Chief Information Security Officer, United States Air Force, Jay Huie, TTS Secure Cloud Portfolio Director, U.S. General Services Administration, Donald Freese, Deputy Assistant
    Director, Information Technology Branch, FBI, Christopher Wlaschin, Chief Information Security Officer and Executive Director, Information Security Office of the Chief Information Officer, Department of Health and Human Services

    Presented during Palo Alto Networks inaugural Federal Ignite 2017 conference.
  • Security Cyberspace - A National Priority Recorded: Jan 3 2018 21 mins
    Congressman John Ratcliffe, Chairman, House Homeland Security Subcommittee
    Congressman John Ratcliffe, Chairman, House Homeland Security Subcommittee on Cybersecurity & Infrastructure Protection as presented during Palo Alto Networks inaugural Federal Ignite 2017.
  • 2018 Predictions & Recommendations: EMEA Recorded: Dec 22 2017 7 mins
    Greg Day, CSO EMEA, Palo Alto Networks
    Hear from the Chief Security Officer of Palo Alto Networks as he gives his personal Predictions and Recommendations for 2018. Greg looks at the changing impact of cyberattacks, and how Cyber adversaries will extend further into ransomware, OT systems and cryptocurrencies.

    Discover more by reading the blog in the attachments.
  • The Keys to Service Provider Network Security Recorded: Dec 21 2017 56 mins
    Peter Margaris, Head of Service Provider Product Marketing, Palo Alto Networks
    How to win a battle against an army of cybercriminals, armed with inexpensive off-the shelf tools designed to create major disruption in your network and your customer’s operations?

    The answer: Through a comprehensive approach that harnesses that same power – security automation, scalability, and collaboration across the broader security ecosystem.

    In this webinar, you will learn:

    • Why every minute counts in stopping malware from spreading
    • Why leveraging comprehensive cloud-based threat intelligence is an essential and powerful element of securing next-generation service provider networks
    • How to regain security operations efficiencies through a comprehensive platform that leverages integrated intelligence.
    • How service providers can transform their network security posture to prevent next-generation attacks, enhance their brand, and secure their expansion into new revenue sources.
    • Our new vision for shared security intelligence and seamless application integration
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: An Enterprise Security Platform Approach to APT's
  • Live at: Dec 9 2014 5:00 pm
  • Presented by: Scott Simkin, Sr. Cyber Analyst at Palo Alto Networks
  • From:
Your email has been sent.
or close