Hi [[ session.user.profile.firstName ]]

Announcing Traps v3.3: Advanced Endpoint Protection, Evolved.

We are excited to announce the availability of Traps v3.3, the latest release of our revolutionary advanced endpoint protection product.

Join us for a webinar where you’ll learn how Traps v3.3 brings a wealth of new functionality with its 26 new features and numerous enhancements, including:

•Extended virtualized desktop infrastructure (VDI) support, including automatic licensing elasticity and support for additional VDI environments
•Advanced execution restrictions and policy conditions for fine-grain process control
•Extended OS support, including additional versions of the Windows operating system
•New role-based access control (RBAC) to enforce administrative separation of duties
•Enhanced SIEM support, audit logging, and e-mail alerting
Recorded Nov 18 2015 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michael Moshiri - Director, Advanced Endpoint Protection
Presentation preview: Announcing Traps v3.3: Advanced Endpoint Protection, Evolved.
  • Channel
  • Channel profile
  • PLACEHOLDER: Securing Office 365 Jun 14 2018 5:00 pm UTC 60 mins
    Anuj Sawani, Sr. Product Marketing Manager
    PLACEHOLDER: Securing Office 365
  • Cybersecurty Webinar – Securing SSL in Education May 24 2018 2:30 pm UTC 60 mins
    Jamie Jennrich Regional Manager for Education and Jon Wood, Systems Engineer at Palo Alto Networks
    The encryption of web traffic is increasing at an exponential rate. With all major web services and applications being encrypted as standard, HTTPS is no longer the exception.

    With the increasing requirements to prevent radicalisation, safeguard students online, as well as keep cyber-threats at bay, schools and colleges are being asked to tread an increasingly narrow line between providing open access to the web, and keeping students safe from it. Join Palo Alto Networks for an exclusive webinar for education where we will show how you can gain visibility and control across encrypted channels

    Jamie Jennrich Region Manager for Education and Jon Wood, Systems Engineer at Palo Alto Networks will explore the challenges and discuss Palo Alto Networks Next-Generation Platform, the approach to SSL and the inspection of encrypted data.

    Attend this webinar to understand:
    - SSL, its benefits and growth
    - Challenges with encryption in education establishments
    - How SSL decryption can help provide security and safety
  • Strengthening Your Security Posture With a Transit VPC May 3 2018 5:00 pm UTC 60 mins
    Matt Keil, Director of Product Marketing, Palo Alto Networks & John Plishker, Solution Architect, REAN Cloud
    As your AWS deployment scales, the web of connectivity to VPCs, the web, or resources on the corporate network can create a complex sprawl and an expanded threat footprint. Managing the many individual connections while ensuring your workloads and data are secure can become cumbersome and costly, slowing deployments and increasing risk.

    Please join Palo Alto Networks and REAN Cloud to learn how a Transit VPC coupled with the VM-Series firewall can solve these challenges using a shared services approach that centralizes security and connectivity, resulting in an improved security posture by simplified management and lowering costs.

    This webinar will discuss how the Transit VPC solution jointly built with REAN Cloud was implemented using AWS capabilities and the Palo Alto Networks VM-Series next generation firewall.
  • Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks Recorded: Apr 26 2018 47 mins
    Kasey Cross, Senior Product Marketing Manager and Yoni Allon, Manager, Behavioral Research
    Fileless attacks are estimated to account for 35 percent of all attacks in 2018, according to Ponemon Institute. Threat actors can use a combination of exploits, scripts, and “living off the land” to stay under the radar. They can even carry out sophisticated attacks without ever installing malware on compromised endpoints. They can also use common networking and admin tools together with traditional malware to maintain persistence while locating and stealing valuable data.

    By monitoring user and device behavior, organizations can detect anomalies that indicate an attack is under way. Because most fileless attacks start with a vulnerability exploit, advanced endpoint protection can block the initial step of an attack from succeeding in the first place. Join us on April 26 as we discuss how organizations can detect and stop all stages of fileless attacks.

    Attend this webinar to:
    •Find out how fileless attacks occur with a demo of an attack
    •Learn how Magnifier behavioral analytics, the first app of the Palo Alto Networks Application Framework, can detect the network behaviors associated with fileless attacks.
    •Understand how Traps advanced endpoint protection can block the exploits that lead to endpoint compromise.
  • [Breach Prevention Week] Best Practices for Effective Endpoint Security Recorded: Apr 25 2018 63 mins
    Joel Boyd, Sr. Product Marketing Manager
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • Cybersecurity Webinar: Behavioural Analytics with Magnifier Recorded: Apr 25 2018 47 mins
    Bertrand Le Bail, Cybersecurity Systems Engineer, Palo Alto Networks Magnifier, Logging Service, Application Framework
    Join Palo Alto Networks for an exclusive Cybersecurity Webinar ‘Behavioural Analytics with Magnifier’ on April 25th at 10.30 a.m. (BST)

    During this event Bertrand Le Bail, Cybersecurity Systems Engineer for Palo Alto Networks Magnifier, Logging Service and Application Framework will introduce the concept of behavioural analytics and show how to rapidly identify and defeat targeted attacks with cloud-delivered analytics and machine learning.

    Attend this webinar to find out:

    - How to win back control of your security events using unique machine learning functionality

    - Discover how Magnifier from Palo Alto Networks can help you expose the stealthiest attacker during advanced cyberattacks
  • [Breach Prevention Week] Driving Innovations in Securing the Public Cloud Recorded: Apr 24 2018 47 mins
    Anuj Sawani, Product Marketing Manager
    Organizations are rapidly adopting the public cloud to keep pace with growing business demands. Risk management is a top concern, as legacy security tools and techniques designed for the traditional datacenter cannot adapt to the continuous deployment model in the cloud. The tools for securing public cloud services infrastructure are manual and fragmented, making operations time-consuming and error-prone. Security, DevOps, and compliance teams need a frictionless approach to securing public cloud workloads.

    In this session, learn about recent Palo Alto Networks innovations that are changing how organizations secure the public cloud. We will cover:

    •Understand the several options available today to secure the public cloud
    •Build a strategy to manage and reduce your public cloud risks
    •Deploy security with a frictionless approach in a multi-cloud environment
  • Medical Grade Security for your Unpatchable Medical Devices Recorded: Apr 24 2018 59 mins
    Mick Coady, PwC, and Matt Mellen, Palo Alto Networks
    Because security is often an afterthought when medical devices are designed and maintained by the manufacturer, they are the most vulnerable devices in a hospital’s network.

    The medical device community is beginning to improve the security of their products, but it will take years for legacy devices to be upgraded or replaced. Until then, healthcare organizations need to develop strategies for mitigating the cybersecurity risks these unpatchable devices pose to their patients and the organizations themselves.

    Join Matt Mellen, a healthcare security architect and former security lead for a hospital network, and Mick Coady, a partner in the Health Information Privacy and Security Practice at PricewaterhouseCoopers, as they discuss how to approach and mitigate the challenges associated with securing medical devices in hospital environments.

    In this webinar, you will discover:
    •The cybersecurity risks posed by unpatchable and hard-to-patch medical devices
    •How to successfully mitigate medical device security risks
    •Strategies you can implement today to secure medical devices
  • Best Practices for Effective Endpoint Security Recorded: Apr 24 2018 63 mins
    Joel Boyd, Senior Product Marketing Manager, Palo Alto Networks & Chris Kisselburgh, Security Engineer, Cloud Harmonics
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • Best Practices for Effective Endpoint Security Recorded: Apr 24 2018 63 mins
    Joel Boyd, senior product marketing manager, Palo Alto Networks & Chris Kisselburgh, security engineer, Cloud Harmonics
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • [Breach Prevention Week] Beyond Layered Approach Recorded: Apr 23 2018 50 mins
    Navneet Singh, Product Marketing Director, Palo Alto Networks
    Maintaining and troubleshooting disparate, layered security technologies is complex and time-consuming. What’s even more troubling is that these technologies don’t work together effectively to protect you against sophisticated cyberattacks.

    It’s time to rethink IT security with a strategic, architectural approach – preventing successful cyberattacks from getting to your data, apps and users.

    In this webinar, you’ll learn:
    •Why a layered security approach doesn’t work.
    •Why a strategic approach to evaluating security technologies is the way to go.
    •How the security architecture of our next-gen firewalls prevents successful cyber breaches.
  • Protecting your Digital Way of Life and 2018 Security Trends Recorded: Apr 20 2018 50 mins
    Greg Day, VP & CSO, EMEA, Palo Alto Networks
    The way we consume IT is changing in a big way and this is being driven, in no small part, by the continued prevalence of cloud computing.

    How are these changes transforming your business and the landscape you operate in? What do these changes mean for the future?

    Join Greg Day, VP and Chief Security Officer for Palo Alto Networks EMEA as he takes us through the transforming world of IT consumption and what the impacts are for Digital Way of Life and cybersecurity.

    Greg will take us through what trends we have witnessed in recent years, as well as what we can expect in the future - focusing on the fast-changing world of IT consumption, digital transformation and of course what these mean for cybersecurity.
  • Panel: IoT Empowering Digital Transformation with Cloud Security Recorded: Apr 20 2018 50 mins
    Stuart Davis, Kelvin Rorive, Romain Fourchereau, Markus Handte & Andrew Shepherd
    To catalyse digital transformation, business and IT leaders are embracing the Internet of Things (IoT). The IoT is empowering businesses and consumers to connect to the Cloud, applications, and services. Most importantly - to handle the deluge of data they collect, consume, and analyse. In this context, the role of Cloud security and actionable intelligence is highly significant.

    Take a virtual seat on this cross-industry panel discussion covering the Internet of Things as one of driving forces behind Digital Transformation. The panellists will exchange their experiences and how their organizations approach cloud security and have changed their security strategy to actionable intelligence.

    Panellists;
    * Romain Fouchereau, IOT Analyst IDC
    * Markus Handte, Director of Systems Engineering EMEA ForeScout Technologies
    * Kelvin Rorive, Manager IT Security operations & Threat at Rabobank
    * Stuart Davis, Director of Global Services & Intelligence

    Moderated by;
    * Andrew Shepherd, Palo Alto Networks
  • Best Practices for Effective Endpoint Security Recorded: Apr 19 2018 63 mins
    Chris Kisselburgh, security engineer, Cloud Harmonics & Joel Boyd, senior product marketing manager, Palo Alto Networks
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • Securing Business-Critical Applications on Google Cloud Platform Recorded: Apr 19 2018 57 mins
    Jigar Shah, Product Line Manager, Public Cloud
    Organizations are adopting Google® Cloud Platform to take advantage of the same technologies that drive common Google services. The power behind GCP, combined with agility and a global footprint, enables you to use the Google Cloud as the sole route to market for new application deployment. The benefits of cloud adoption are well-known, but so too are the challenges of security, possible data loss and business interruption, potentially slowing cloud adoption.

    Join Palo Alto Networks® for a webinar focused on how organizations can securely move to GCP by delivering consistent workload protections that prevent data loss and business interruption.

    During this webinar, we will cover:

    •Security challenges that migrating to the cloud introduces
    •How the Palo Alto Networks cloud security portfolio protects your data and prevents business interruption
    •The role automation plays in ensuring application developers can operate at the speed of the cloud
  • Cybersecurity as Code: Build a secure-by-default Cloud Recorded: Apr 19 2018 59 mins
    Jesse White, Account Principal, Contino
    In this session, you’ll learn the key principles of building “secure-by-default” cloud infrastructure. We will;

    • Dive into the core concepts of system safety and reliability
    • Discuss how to leverage Infrastructure as Code to build fully automated and continuously converging systems
    • Show you how to use encoded compliance frameworks to build self-validating and healing systems
    • Explore how strategic investment in Cloud Native Services can help build defence-in-depth
  • Automating Next-Gen Firewall Deployments with Terraform and Ansible Recorded: Apr 19 2018 38 mins
    Justin Harris, Consulting Engineer, Palo Alto Networks
    Join us for our new cloud webinar, in which cloud automation experts will show you how customers have successfully automated their VM-Series next-gen firewall deployments and effectively protected their DevOps environments in AWS® and Microsoft Azure.

    In this webinar you’ll learn how to:

    * Implement touchless deployment for your fully configured firewalls with native and third-party automation tools, such as Terraform® and Ansible®
    * Consume tags to execute your commit-less policy updates
    * Automate VM-Series deployments across your multi-cloud environment
  • Securing Digital Transformation with Microsoft Azure Recorded: Apr 18 2018 55 mins
    Sean Dastouri, Security ISV Developer, Microsoft
    Many organisations are utilizing Microsoft Azure to power their Digital Transformation and discovering how cybersecurity can enable the journey to the Cloud.

    In this session, Sean Dastouri, Security ISV Developer at Microsoft, will deliver real-life examples of how organisations are adopting this solution.

    With Microsoft Azure, you can turn your idea into a new app, reimagine an existing system or create a hybrid cloud application with confidence, no matter the platform or where you are on the journey to the Cloud.
  • Top 10 Public Cloud Security Recommendations Recorded: Apr 17 2018 44 mins
    Matt Keil, Dir. Product Marketing, Public Cloud, Palo Alto Networks
    Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivalled only by that of the early days of the Internet era. As was the case then, the speed of adoption often means that “good enough” security is viewed as acceptable.

    With the underlying premise that the public cloud is someone else’s computer, and an extension of your network, this session will cover public Cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public Cloud workloads and data.
  • Securing Digital Transformation with Amazon Web Services Recorded: Apr 17 2018 46 mins
    Dinah Barrett, Specialist Solution Architect, AWS Marketplace
    It’s essential that organisations Digital Transformation strategies are enabled securely in order for them to be fully effective.

    Palo Alto Networks, in partnership with Amazon Web Services (AWS), have devised a solution to this challenge. Dinah Barret Specialist Solution Architect from AWS and Justin Harris Consulting Engineer at Palo Alto Networks, will walk you through how you can enable your Digital Transformation strategy securely with Palo Alto Networks.

    Today, AWS provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world. With data center locations in the U.S., Europe, Brazil, Singapore, Japan, and Australia, customers across all industries are taking advantage of low cost, agile computing.
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Announcing Traps v3.3: Advanced Endpoint Protection, Evolved.
  • Live at: Nov 18 2015 7:00 pm
  • Presented by: Michael Moshiri - Director, Advanced Endpoint Protection
  • From:
Your email has been sent.
or close