Hi [[ session.user.profile.firstName ]]

Advanced Endpoint Protection, Evolved

We are excited to announce the availability of Traps v3.3, the latest release of our revolutionary advanced endpoint protection product.

During this webinar where you’ll learn how Traps v3.3 brings a wealth of new functionality with its 26 new features and numerous enhancements, including:
•Extended virtualized desktop infrastructure (VDI) support, including automatic licensing elasticity and support for additional VDI environments
•Advanced execution restrictions and policy conditions for fine-grain process control
•Extended OS support, including additional versions of the Windows operating system
•New role-based access control (RBAC) to enforce administrative separation of duties
•Enhanced SIEM support, audit logging, and e-mail alerting
Recorded Dec 2 2015 44 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Yiftach Keshet and Steve Gerrard
Presentation preview: Advanced Endpoint Protection, Evolved
  • Channel
  • Channel profile
  • LIVE demo - Safely Enable SaaS Applications with Aperture Feb 13 2018 2:00 pm UTC 45 mins
    Omar Amarin, Systems Engineer
    The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.

    Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:

    •Gain visibility and granular, context-based control of SaaS applications.
    •Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
    •Protect against new insertion and distribution points for malware.
    •Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

    The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
  • Best Practices in Preventing Credential Phishing in Healthcare Feb 12 2018 6:00 pm UTC 60 mins
    Chris Sherman, Forrester Senior Analyst & Matt Mellen, Healthcare Security Architect, Palo Alto Networks
    Email attacks and phishing attacks are not going away any time soon.

    According to the 2017 HIMSS Healthcare IT Cybersecurity Study, almost 90% of all U.S. respondents report that phishing, and education about phishing, represent their top vulnerabilities and opportunities for improvement.

    Join us for a webinar hosted by Matt Mellen, a healthcare specialist at Palo Alto Networks and featuring guest speaker Chris Sherman, Forrester Senior Analyst, serving Security and Risk professionals.

    Matt is Palo Alto Networks healthcare specialist who is a former IT Security Manager at a world-renowned hospital. Chris leads Forrester’s healthcare infosecurity coverage and has published multiple reports on best practices within the areas of healthcare and medical device security.

    Register for the webinar and learn:
    * The current – and future – state of healthcare security.
    * Successful approaches your healthcare IT peers have followed to lower risks from phishing.
    * How to prepare your healthcare organization for credential phishing attacks.
  • Automating VM-Series deployments on AWS and Azure with Terraform and Ansible Jan 31 2018 2:00 pm UTC 60 mins
    Vinay Venkataraghavan - Senior Solution Architect, Technical Business Development
    Join us for our new cloud webinar, in which cloud automation experts will show you how customers have successfully automated their VM-Series next-gen firewall deployments and effectively protected their DevOps environments in AWS®.

    You’ll learn how to:

    - Implement touchless deployment for your fully configured firewalls with native and third-party automation tools, such as Terraform® and Ansible®

    - Consume tags to execute your commitless policy updates

    - Automate VM-Series deployments across your multi-cloud environment
  • [Breach Prevention] The Ransomware Epidemic Continues Jan 25 2018 6:00 pm UTC 60 mins
    Bryan Lee, Threat Intelligence Analyst, Unit 42, the Palo Alto Networks threat research team
    Let’s face it, ransomware is everywhere. Every few months it seems there’s another new variant ripping across the world’s networks – snarling business and leaving chaos in its wake.

    And because it’s become such a reliably lucrative business model, with ever-lower barriers to entry, ransomware won’t be going away anytime soon.

    Outdated technology and poor cybersecurity hygiene help attackers to spread ransomware quickly and effectively. But it doesn’t have to be that way.

    Watch this webinar to learn:

    · About the rise of the ransomware business model

    · How adversaries are honing their tactics

    · What you can do to better protect your organization against ransomware attacks
  • [Breach Prevention] The Year We Reject "Good Enough" Security in the Cloud Jan 24 2018 5:30 pm UTC 45 mins
    Matt Keil, Director of Product Marketing, Public Cloud
    Join this webinar to hear 2018 predictions and recommendations on rejecting “good enough” security in the cloud and balancing the need for agility while improving the security of applications and securing the data as it moves the public cloud.
  • [Breach Prevention] Public Cloud Security Considerations Jan 23 2018 6:00 pm UTC 60 mins
    Matt Keil, Director of Product Marketing, Public Cloud
    Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivaled only by that of the early days of the Internet era. With the underlying premise that the public cloud is someone else’s computer, and an extension of your network this session will cover public cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public cloud workloads and data.
  • Cyber Security Webinar: The Journey Towards GDPR Compliance Jan 23 2018 10:30 am UTC 60 mins
    Fred Streefland, senior product marketing manager at Palo Alto Networks and Mark Child, managing director at Xcina Consulting
    Learn the pragmatic and simple approach to deal with GDPR

    Join Fred Streefland, senior product marketing manager at Palo Alto Networks and guest speaker Mark Child, managing director at Xcina Consulting, for an informative webinar about taking a pragmatic approach to the GDPR and compliance.

    Attend this event to understand:

    - New cybersecurity legislation and the main elements of the GDPR
    - What’s in the GDPR and what’s not
    - Security-specific recitals and articles
    - The U.K. Data Protection Bill and modifications to the GDPR
    - How Palo Alto Networks can help you become GDPR-compliant

    We do hope you can join us for this exclusive webinar.
  • [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations Jan 22 2018 6:00 pm UTC 60 mins
    Palo Alto Networks Cybersecurity Experts
    Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.

    Here’s a sampling of some of the predictions our cybersecurity experts will review:

    •Ransomware Prevention more important than ever
    •The Internet of Things blurs the line between personal and corporate security
    •The era of Software Supply-Chain attacks has begun
    •The Cloud will accelerate channel partner migration to next-generation security innovators
    •Advances in Machine Learning will improve both patient care and cybersecurity
    •Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls
  • Data Driven Security: Improve Your Security Posture To Defeat Your Adversary Jan 18 2018 10:00 am UTC 45 mins
    Jamie Brummell, EMEA Systems Engineer, Palo Alto Networks and Paul Davies, EMEA Senior Alliances SE, Splunk
    Today’s complex, multi-faceted infosec challenges can cause IT and security teams to spend unnecessary cycles trying to perform the fundamentals – basic hygiene, assessing posture, and validating security “readiness”. With most organizations getting attacked weekly, ensuring these functions are efficient and effective is more important than ever.

    In this session you’ll learn how end-to-end security visibility is a critical first step to improving your security posture. By combining endpoint, network, user activity, and threat intelligence you can be truly data-driven and:

    - Identify malicious activity and gain key context to help prevent similar threats
    - Apply methods to help improve accuracy and further mitigate risk
    - Automate context gathering and response actions to accelerate investigations, and to more effectively contain and prevent threats

    Join us and get the inside view into the latest technological advancements powering today’s cybersecurity solutions.
  • Win the Battle To Secure Your Endpoints Recorded: Jan 18 2018 40 mins
    Arthur Luo & Dennis Lin
    How the recent advanced threats execute on your endpoints and the Palo Alto Networks prevention advisory

    Traps replaces legacy antivirus and secures endpoints with a multi-method prevention approach that blocks malware and exploits, both known and unknown, before they compromise endpoints, such as laptops, desktops and servers.
    •Challenges with AV today
    •Difference between exploits and malware
    What is malware? What is an exploit? How to prevent against both attack vectors
    •Prevention is better than a cure
    Having a multiple method approach against APTs
    •Automated Prevention Platform via Palo Alto Networks
    Demo of live hack against Traps 4.1
  • Securing K-12 modern learning environments using E-rate funding Recorded: Jan 17 2018 47 mins
    David Cumbow, Systems Engineering Manager, and Greg Herbold, Director of the SLED Segment, Palo Alto Networks
    Protecting student and district data, privacy, and safety with their limited IT resources is a tall order for K-12 institutions. This no-cost webinar is for districts and their consultants considering the E-rate program for funding firewall services. Join our education and E-rate experts to learn:

    •About Palo Alto Networks and how we uniquely protect students, data, and networks
    •How your peers have successfully leveraged E-rate funding to create safe learning environments
    •Which Palo Alto Networks products are eligible
    •Where to find E-rate resources

    SPEAKERS:

    David Cumbow is a Systems Engineering Manager with Palo Alto Networks. Prior to coming to Palo Alto Networks, David spent 13 years in the public sector working for the third-largest K-12 school district in Riverside County. Having worked jobs from Database Administration to Virtualization, David found a passion for Networking and Security. With eight years in the security field, David has led many K-12 Districts in California to a better security posture through guidance and peer-to-peer consulting. David holds a Bachelor of Science in Computer Science from California State University.

    Greg Herbold is Director of the U.S. State/Local Government and Education (SLED) segment at Palo Alto Networks, where he is responsible for creating solutions and programs to protect our way of life in the digital age by preventing successful cyberattacks. In this capacity, he leads strategy and planning, marketing, solution development, sales programs, channel partner development, contracts, compliance and industry relations for the segment. Greg holds a Master of Arts from Georgetown University and an HP-Stanford Innovation and Entrepreneurship Certificate from the Stanford Graduate School of Business.
  • Government Matters Technology Leadership Series, Cloud Special Recorded: Jan 17 2018 60 mins
    Francis Rose and Rep. Will Hurd (R-TX), Chairman of the Subcommittee on I.T.
    This video goes into the key issues facing federal cloud computing
  • LIVE demo - Safely Enable SaaS Applications with Aperture Recorded: Jan 17 2018 45 mins
    Omar Amarin, Systems Engineer
    The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.

    Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:

    •Gain visibility and granular, context-based control of SaaS applications.
    •Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
    •Protect against new insertion and distribution points for malware.
    •Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

    The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
  • 10 Things to Test Before Buying Your Next-Generation Firewall Recorded: Jan 10 2018 54 mins
    Navneet Singh, Director of Product Marketing and Zoltan Deak, Sr. Product Marketing Manager
    How do you ensure that you buy the right next-generation firewall today to meet your organization’s networking, performance and security needs for the present and the future? The best approach is to test it before you buy it. Your next-generation firewall should enable more than just application and user based security policies. In this webinar, we will share the 10 capabilities to test before you buy your next-generation firewall, and the top 5 mistakes to avoid.
  • Veterans in Cybersecurity: Harness the Talent of our Transitioning Warriors Recorded: Jan 9 2018 29 mins
    Congressman Mike Gallagher & John Davis, VP, Federal CSO, Palo Alto Networks
    Congressman Mike Gallagher, House Homeland Security Committee & House Armed Services Committee & John Davis, VP, Federal Chief Security Officer, Palo Alto Networks discuss the public and private initiatives to harness the talent of our transitioning warriors.
  • A Look into the Administration's Key Cyber Priorities and Efforts Recorded: Jan 9 2018 49 mins
    Thomas P. Bossert and Mark McLaughlin
    Fireside chat as presented during Palo Alto Networks inaugural Federal Ignite 2017 conference. Speakers Thomas P. Bossert, Assistant to the President for Homeland Security and Counterterrorism & Mark McLaughlin Chairman and CEO, Palo Alto Networks discuss the administration's key cyber priorities and efforts.
  • NGFW Health Checks, Services and Reports Recorded: Jan 5 2018 27 mins
    Jesse Ebel, Systems Engineering Manager and Nate Bitting, Sr Mgr, Customer Success Automation & Analytics
    Join us to learn how you can shorten your time to productivity and ensure quick & proper adoption of the functionality in your Palo Alto Networks Next Generation firewalls.

    In this webinar, you will learn about our Next Generation Firewall Best Practice tools, including the automated Feature Adoption Heat Map, Prevention Posture Assessment (PPA) and Best Practice Assessment (BPA) tools. These tools provide you with insights into how you’re leveraging built-in features within your network, and suggest specific configuration recommendations for improving your security posture. We’ll also show you how to pull the data, review the reports, and will answer any questions you may have about these Health Check tools.
  • Government Panel: Moving Targets: Securing Dynamic Cloud Environments Recorded: Jan 3 2018 45 mins
    Government Panel of Experts
    Multi-cloud architectures and shared services give Federal agencies new opportunities to transform and modernize, but also introduce new risks. Agencies need to shift cyber strategy beyond a traditional perimeter approach. This session will explore best practices to deploy consistent and flexible security protections across physical and virtual environments. How can agencies meet growing demands and unleash the benefits of cloud without compromising data integrity? How do you lock down mission-critical applications in a highly-connected environment? What inconsistencies should agencies eliminate in their security policies? Join us to explore options for managing emerging risks and achieving new levels of cyber protection for public, private, and hybrid cloud infrastructure.

    Speakers: Lee Klarich, Chief Product Officer, Palo Alto Networks & Panelists: Peter Kim, Chief Information Security Officer, United States Air Force, Jay Huie, TTS Secure Cloud Portfolio Director, U.S. General Services Administration, Donald Freese, Deputy Assistant
    Director, Information Technology Branch, FBI, Christopher Wlaschin, Chief Information Security Officer and Executive Director, Information Security Office of the Chief Information Officer, Department of Health and Human Services

    Presented during Palo Alto Networks inaugural Federal Ignite 2017 conference.
  • Security Cyberspace - A National Priority Recorded: Jan 3 2018 21 mins
    Congressman John Ratcliffe, Chairman, House Homeland Security Subcommittee
    Congressman John Ratcliffe, Chairman, House Homeland Security Subcommittee on Cybersecurity & Infrastructure Protection as presented during Palo Alto Networks inaugural Federal Ignite 2017.
  • 2018 Predictions & Recommendations: EMEA Recorded: Dec 22 2017 7 mins
    Greg Day, CSO EMEA, Palo Alto Networks
    Hear from the Chief Security Officer of Palo Alto Networks as he gives his personal Predictions and Recommendations for 2018. Greg looks at the changing impact of cyberattacks, and how Cyber adversaries will extend further into ransomware, OT systems and cryptocurrencies.

    Discover more by reading the blog in the attachments.
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Advanced Endpoint Protection, Evolved
  • Live at: Dec 2 2015 11:15 am
  • Presented by: Yiftach Keshet and Steve Gerrard
  • From:
Your email has been sent.
or close