Hi [[ session.user.profile.firstName ]]

Actionable Threat Intelligence – The Power to Act Fast!

Today’s security deployments overwhelm security organizations with vast amounts of data. Presenting this data in a meaningful way and making it actionable is crucial in preventing successful cyber attacks.

Join Joerg Sieber, Sr. Product Marketing Manager, as he showcases how Palo Alto Networks makes sense of all the application and threat data surrounding you and presents it in an actionable format that is easy to understand. Specifically, you will learn:

• How a visual, interactive, and highly customizable user interface results in shorter response times to threats.
• How automatic correlation of network data across a distributed architecture surfaces critical events for a fast response.
• How visual displays of log data improve the user experience and add value to any security deployment.
Recorded Jan 14 2016 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Joerg Sieber, Sr Product Marketing Manager
Presentation preview: Actionable Threat Intelligence – The Power to Act Fast!
  • Channel
  • Channel profile
  • Interpreting the 2018 NSS Labs AEP 2.0 Test Jun 26 2018 5:00 pm UTC 60 mins
    Mike Spanbauer, Vice President of Research Strategy, NSS Labs & Danny Milrad, Dir. of Product Marketing, Palo Alto Networks
    *Registration information will be shared with both presenting parties (Palo Alto Networks and NSS Labs)

    NSS Labs® recently published the results of its 2018 Advanced Endpoint Protection (AEP) 2.0 Group Test, which examines vendors’ ability to protect endpoints from malware, ransomware and exploits.

    In the test, Palo Alto Networks® Traps™ advanced endpoint protection achieved both high Security Effectiveness and low Total Cost of Ownership, earning a Recommended rating.

    Join this webinar to hear vice president of Research Strategy at NSS Labs, Mike Spanbauer, and director of Product Marketing at Palo Alto Networks, Danny Milrad, discuss:

    - Advanced endpoint protection must-haves
    - Understanding the AEP 2.0 test results
    - What a Recommended rating means to you
    - How Palo Alto Networks performed on the test
  • Deploying applications in a more secured and automated environment Recorded: Jun 15 2018 8 mins
    Trevor Dearing, Product Marketing Manager, EMEA, Palo Alto Networks, with Amar Singh, CEO, CMA
    Interview with Palo Alto Network's Trevor Dearing on deploying applications in a more secure environment.
  • Palo Alto Networks and BrightTALK Recorded: Jun 15 2018 1 min
    Greg Day, VP & CSO, EMEA, Palo Alto Networks
    Live from Infosecurity Europe 2018
  • How to enable a secured operating platform Recorded: Jun 15 2018 5 mins
    Greg Day, VP & CSO EMEA, Palo Alto Networks
    Interview with Palo Alto Network's Greg Day on enabling a secured operating platform.
  • Is your Office 365 data protected? Recorded: Jun 14 2018 50 mins
    Anuj Sawani, Sr. Product Marketing Manager
    SaaS applications like Microsoft® Office 365® are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as:

    • Accidental data exposure with SharePoint®
    • Uncontrolled use of personal OneDrive® accounts
    • Data security violations in Exchange

    Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance.

    Our Security Operating Platform can help. Sign up for our webinar and learn what you need to meet your CASB needs as well as secure your cloud-based data against malware and accidental exposure.

    You’ll also find out how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.
  • Realize the Promise of the SWIFT Customer Security Controls Recorded: Jun 13 2018 54 mins
    Lawrence Chin, Financial Services Security Architect, Palo Alto Networks
    Improve Your Cyber Hygiene

    Members of the Society for Worldwide Interbank Financial Telecommunications (SWIFT) cooperative had to self-attest to new mandatory security controls at the end of 2017. The next self-attestation will be required by year end 2018. After that point, SWIFT reserves the right to report non-compliance to counterparties and appropriate local regulators.

    How did your institution fare in its initial self-attestation to SWIFT’s security controls? If there was room for improvement,

    •Join this webinar to learn how to meet and/or exceed SWIFT mandatory and advisory security controls with Palo Alto Networks products
    •Hear about additional best practices that can further improve your cybersecurity posture.

    In the big picture, the SWIFT security controls and further best practices from Palo Alto Networks contribute to overall cyber hygiene, and should prove to be beneficial to all financial institutions - regardless of whether they are SWIFT members or not.
  • Network Security Consolidation In the Federal Government Recorded: Jun 12 2018 42 mins
    Joe Kim, Squadra Solutions, and Tighe Schlottog, Palo Alto Networks
    As organizations have grown so have their security requirements. Where basic firewalling and URL filtering were fine before, now organizations have added in IPS and Sandboxing technologies. This product sprawl has led to fragmentation in management and security coverage.

    Attackers are employing more advanced techniques to infiltrate networks and systems. In order to prevent these attacks, an agency's security must operate in a tightly knit and automated fashion. One in which building new protections against these attacks must occur automatically while ensuring continuous operations of services.

    Join Tighe Schlottog, Security Architect for Palo Alto Networks, and Joe Kim, VP of Engineering at Squadra Solutions, as they discuss how to increase security and efficacy of Network Security by consolidating point products into the Palo Alto Networks Security Operating Platform.

    Register for the webinar and learn:
    •The security gaps and risks posed by security point products.
    •How Network Security Consolidation can simplify management and increase responsiveness of Security Operations teams.
    •Best Practices for Network Security Consolidation.

    Speakers:
    -Joe Kim, VP of Engineering, Squadra Solutions
    -Tighe Schlottog, Security Architect, Palo Alto Networks
  • Securing the Internet of Things Recorded: Jun 5 2018 53 mins
    Joseph Carson (Thycotic) | Chris Morales (Vectra Networks) | Simon Crocker (Palo Alto Networks) | Matt Butler (ForeScout)
    The Internet of Things is everywhere - and it's an easy and frequent target of cyber attackers, as evidenced by the recent attacks on cities, industrial control systems, transportation systems, utilities and other infrastructure.

    IoT devices are built for convenience, efficiency and cost, and are riddled with vulnerabilities attackers are eager to exploit. So, who is in charge of securing the IoT? Does the responsibility lie with the manufacturer, seller, app developer, security team, or end user?

    Join the industry experts for this interactive Q&A discussion on:
    - The top IoT trends in 2018
    - Threats targeting the IoT
    - What's needed to secure connected devices
    - How to better defend our critical infrastructure from cyber warfare

    Speakers:
    - Joseph Carson, Chief Security Scientist, Thycotic
    - Matt Buller, CTO – Financial Services, ForeScout Technologies
    - Simon Crocker, Systems Engineering Director, Palo Alto Networks
    - Christopher Morales, Head of Security Analytics, Vectra Networks

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • Accelerate your move to Microsoft® Azure® Recorded: May 31 2018 50 mins
    Matt Keil, Director of Product Marketing, Public Cloud
    Microsoft® Azure® can change the way your organization does business by increasing agility, scalability and storage. Although the benefits of Azure – and the public cloud – are well-documented, questions about security, potential data loss and business interruption remain, potentially slowing cloud adoption.

    Join us for a webinar focused on accelerating your move to Azure and securing your data, apps and DevOps environments once there by delivering consistent, automated security across all your environments.

    You’ll learn:

    - Common public cloud security challenges
    - How the Palo Alto Networks® cloud security portfolio protects you
    - How automation enables app developers to operate at cloud speed
  • Medical Grade Security for your Unpatchable Medical Devices Recorded: May 30 2018 60 mins
    Mick Coady, PwC, and Matt Mellen, Palo Alto Networks
    Because security is often an afterthought when medical devices are designed and maintained by the manufacturer, they are the most vulnerable devices in a hospital’s network.

    The medical device community is beginning to improve the security of their products, but it will take years for legacy devices to be upgraded or replaced. Until then, healthcare organizations need to develop strategies for mitigating the cybersecurity risks these unpatchable devices pose to their patients and the organizations themselves.

    Join Matt Mellen, a healthcare security architect and former security lead for a hospital network, and Mick Coady, a partner in the Health Information Privacy and Security Practice at PricewaterhouseCoopers, as they discuss how to approach and mitigate the challenges associated with securing medical devices in hospital environments.

    In this webinar, you will discover:
    •The cybersecurity risks posed by unpatchable and hard-to-patch medical devices
    •How to successfully mitigate medical device security risks
    •Strategies you can implement today to secure medical devices
  • Medical Grade Security for your Unpatchable Medical Devices Recorded: May 30 2018 60 mins
    Mick Coady, PwC, and Matt Mellen, Palo Alto Networks
    Because security is often an afterthought when medical devices are designed and maintained by the manufacturer, they are the most vulnerable devices in a hospital’s network.

    The medical device community is beginning to improve the security of their products, but it will take years for legacy devices to be upgraded or replaced. Until then, healthcare organizations need to develop strategies for mitigating the cybersecurity risks these unpatchable devices pose to their patients and the organizations themselves.

    Join Matt Mellen, a healthcare security architect and former security lead for a hospital network, and Mick Coady, a partner in the Health Information Privacy and Security Practice at PricewaterhouseCoopers, as they discuss how to approach and mitigate the challenges associated with securing medical devices in hospital environments.

    In this webinar, you will discover:
    •The cybersecurity risks posed by unpatchable and hard-to-patch medical devices
    •How to successfully mitigate medical device security risks
    •Strategies you can implement today to secure medical devices
  • Automating VM-Series deployments on AWS and Azure with Terraform and Ansible Recorded: May 29 2018 47 mins
    Vinay Venkataraghavan - Senior Solution Architect, Technical Business Development
    Join us for our new cloud webinar, in which cloud automation experts will show you how customers have successfully automated their VM-Series next-gen firewall deployments and effectively protected their DevOps environments in AWS®.

    You’ll learn how to:

    - Implement touchless deployment for your fully configured firewalls with native and third-party automation tools, such as Terraform® and Ansible®

    - Consume tags to execute your commitless policy updates

    - Automate VM-Series deployments across your multi-cloud environment
  • Automating VM-Series deployments on AWS and Azure with Terraform and Ansible Recorded: May 29 2018 47 mins
    Vinay Venkataraghavan - Senior Solution Architect, Technical Business Development
    Join us for our new cloud webinar, in which cloud automation experts will show you how customers have successfully automated their VM-Series next-gen firewall deployments and effectively protected their DevOps environments in AWS®.

    You’ll learn how to:

    - Implement touchless deployment for your fully configured firewalls with native and third-party automation tools, such as Terraform® and Ansible®

    - Consume tags to execute your commitless policy updates

    - Automate VM-Series deployments across your multi-cloud environment
  • [APAC BPW] Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks Recorded: May 25 2018 48 mins
    Kasey Cross, Senior Product Marketing Manager and Yoni Allon, Manager, Behavioral Research
    Fileless attacks are estimated to account for 35 percent of all attacks in 2018, according to Ponemon Institute. Threat actors can use a combination of exploits, scripts, and “living off the land” to stay under the radar. They can even carry out sophisticated attacks without ever installing malware on compromised endpoints. They can also use common networking and admin tools together with traditional malware to maintain persistence while locating and stealing valuable data.

    By monitoring user and device behavior, organizations can detect anomalies that indicate an attack is under way. Because most fileless attacks start with a vulnerability exploit, advanced endpoint protection can block the initial step of an attack from succeeding in the first place. Join us as we discuss how organizations can detect and stop all stages of fileless attacks.

    Attend this webinar to:
    •Find out how fileless attacks occur with a demo of an attack
    •Learn how Magnifier behavioral analytics, the first app of the Palo Alto Networks Application Framework, can detect the network behaviors associated with fileless attacks.
    •Understand how Traps advanced endpoint protection can block the exploits that lead to endpoint compromise.
  • [APAC BPW] Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks Recorded: May 25 2018 47 mins
    Kasey Cross, Senior Product Marketing Manager and Yoni Allon, Manager, Behavioral Research
    Fileless attacks are estimated to account for 35 percent of all attacks in 2018, according to Ponemon Institute. Threat actors can use a combination of exploits, scripts, and “living off the land” to stay under the radar. They can even carry out sophisticated attacks without ever installing malware on compromised endpoints. They can also use common networking and admin tools together with traditional malware to maintain persistence while locating and stealing valuable data.

    By monitoring user and device behavior, organizations can detect anomalies that indicate an attack is under way. Because most fileless attacks start with a vulnerability exploit, advanced endpoint protection can block the initial step of an attack from succeeding in the first place. Join us as we discuss how organizations can detect and stop all stages of fileless attacks.

    Attend this webinar to:
    •Find out how fileless attacks occur with a demo of an attack
    •Learn how Magnifier behavioral analytics, the first app of the Palo Alto Networks Application Framework, can detect the network behaviors associated with fileless attacks.
    •Understand how Traps advanced endpoint protection can block the exploits that lead to endpoint compromise.
  • Cybersecurty Webinar – Solving the challenges of SSL decryption in Education Recorded: May 24 2018 32 mins
    Jamie Jennrich Regional Manager for Education and Jon Wood, Systems Engineer at Palo Alto Networks
    Secure Sockets Layer (SSL) (and its successor Transport Layer Security (TLS)) is an encryption protocol that is designed to protect the privacy and security of sensitive communications across a network, such as the Internet.

    The use of SSL encryption is rapidly increasing. In 2017, approximately 50% of web traffic was secured by the protocol and this is expected to rise to 80% by 2019 according to Gartner. Currently most major websites including Google, Facebook and Wikipedia, enforce encryption and are using SSL across their sites (HTTPS sites).

    Join Jamie Jennrich, Regional Manager for Education and Jon Wood, Systems Engineer at Palo Alto Networks for an exclusive Cybersecurity Webinar ‘Solving the challenges of SSL decryption in Education’ on May 24th at 3.30 p.m. (BST) During this event they will discuss the difficult tension in education today between allowing students and staff easy and open access to information while ensuring their working environment is secure and safe, protected from growing cyber threats.

    Attend this webinar to understand:

    - SSL, its benefits and growth
    - Challenges of encryption in Education
    - How Palo Alto Networks can provide visibility and control across encrypted SSL channels
  • [APAC Breach Prevention Week] Best Practices for Effective Endpoint Security Recorded: May 24 2018 63 mins
    Joel Boyd, Sr. Product Marketing Manager
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • [APAC Breach Prevention Week] Best Practices for Effective Endpoint Security Recorded: May 24 2018 63 mins
    Joel Boyd, Sr. Product Marketing Manager
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • [APAC Breach Prevention Week] Driving Innovations in Securing the Public Cloud Recorded: May 23 2018 48 mins
    Anuj Sawani, Product Marketing Manager
    Organizations are rapidly adopting the public cloud to keep pace with growing business demands. Risk management is a top concern, as legacy security tools and techniques designed for the traditional datacenter cannot adapt to the continuous deployment model in the cloud. The tools for securing public cloud services infrastructure are manual and fragmented, making operations time-consuming and error-prone. Security, DevOps, and compliance teams need a frictionless approach to securing public cloud workloads.

    In this session, learn about recent Palo Alto Networks innovations that are changing how organizations secure the public cloud. We will cover:

    •Understand the several options available today to secure the public cloud
    •Build a strategy to manage and reduce your public cloud risks
    •Deploy security with a frictionless approach in a multi-cloud environment
  • [APAC Breach Prevention Week] Driving Innovations in Securing the Public Cloud Recorded: May 23 2018 47 mins
    Anuj Sawani, Product Marketing Manager
    Organizations are rapidly adopting the public cloud to keep pace with growing business demands. Risk management is a top concern, as legacy security tools and techniques designed for the traditional datacenter cannot adapt to the continuous deployment model in the cloud. The tools for securing public cloud services infrastructure are manual and fragmented, making operations time-consuming and error-prone. Security, DevOps, and compliance teams need a frictionless approach to securing public cloud workloads.

    In this session, learn about recent Palo Alto Networks innovations that are changing how organizations secure the public cloud. We will cover:

    •Understand the several options available today to secure the public cloud
    •Build a strategy to manage and reduce your public cloud risks
    •Deploy security with a frictionless approach in a multi-cloud environment
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Actionable Threat Intelligence – The Power to Act Fast!
  • Live at: Jan 14 2016 7:00 pm
  • Presented by: Joerg Sieber, Sr Product Marketing Manager
  • From:
Your email has been sent.
or close