Hi [[ session.user.profile.firstName ]]

Protect Against New Threats to Safely Enable SaaS

The usage of SaaS applications continues to grow rapidly whether they are enabled by IT or your end users. SaaS-based application usage has grown 46 percent over the past three years as shown in the latest Application Usage and Threat Report from Palo Alto Networks. The attackers are now adapting to leverage these applications as a point of insertion and a medium for malware to proliferate.

Join us for this live webinar where you will hear from Unit 42, the Palo Alto Networks threat research team, on how malware is using SaaS applications. You will also learn how to:
• Protect against the new insertion and distribution points for malware
• Gain visibility and granular, context-based control of SaaS applications.
• Secure corporate data from malicious and inadvertent data exposure 
 
Recorded May 25 2016 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Anuj Sawani, Product Marketing Manager, Ryan Olson, Director, Intelligence
Presentation preview: Protect Against New Threats to Safely Enable SaaS

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [Breach Prevention] Security Embraces Cloud Adoption, a live panel Mar 6 2017 1:00 pm UTC 60 mins
    Industry Experts, hosted by Dharminder Debisarun
    Join us for a live, interactive session on March 6th during the cloud edition of our Breach Prevention Week.

    Palo Alto Network’s Dharminder Debisarun is joined by Industry experts from VMware, Exclusive Networks and a Palo Alto Networks customer to discuss factors influencing adoption of the cloud.

    You will be asked to share your input on some key questions and will have the opportunity to ask questions to our panelists.
  • [Breach Prevention] Public, Private, Hybrid: Embrace Any Cloud, Securely Mar 6 2017 9:00 am UTC 60 mins
    Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.

    This webinar will cover:

    • Visibility: Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management: Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention] Mar 3 2017 8:00 am UTC 60 mins
    Anuj Sawani, Product Marketing Manager, Palo Alto Networks
    The first step for many organizations migrating to the cloud is the adoption of SaaS applications, such as Office 365, Box, Salesforce and many more. As an IT professional, this means you are giving permission to your users to store data in the cloud with corporate-approved services, such as OneDrive or SharePoint Online. The decision to move to the cloud is usually supported by a long list of cost and operational benefits. Infrastructure cost reduction? Check. Increased productivity? Check. License cost reduction? Check. But, have you thought about data governance and compliance, malware protection, and collaboration with external vendors? These are great questions to ask as you make this transition.
     
    Organizations look to reduce the threat surface exposed by SaaS applications as their data is now hosted in data centers that are not managed by them. Join this webinar to learn more about the evolution of the data center landscape and how to redefine your security strategy to cover the unique risks surfacing from the adoption of SaaS applications. 
  • SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention] Mar 3 2017 2:00 am UTC 60 mins
    Anuj Sawani, Product Marketing Manager, Palo Alto Networks
    The first step for many organizations migrating to the cloud is the adoption of SaaS applications, such as Office 365, Box, Salesforce and many more. As an IT professional, this means you are giving permission to your users to store data in the cloud with corporate-approved services, such as OneDrive or SharePoint Online. The decision to move to the cloud is usually supported by a long list of cost and operational benefits. Infrastructure cost reduction? Check. Increased productivity? Check. License cost reduction? Check. But, have you thought about data governance and compliance, malware protection, and collaboration with external vendors? These are great questions to ask as you make this transition.
     
    Organizations look to reduce the threat surface exposed by SaaS applications as their data is now hosted in data centers that are not managed by them. Join this webinar to learn more about the evolution of the data center landscape and how to redefine your security strategy to cover the unique risks surfacing from the adoption of SaaS applications. 
  • How to Enable Zero Trust Security for Your Data Center Mar 2 2017 2:00 pm UTC 60 mins
    John Kindervag, Vice President and Principal Analyst at Forrester
    The rising tide of successful cyberattacks against organizations has made it clear that traditional approaches for defining trust levels, stopping lateral movement and enforcing advanced security controls within a data center are no longer effective. The Zero Trust approach advocated by Forrester provides guiding principles for achieving a robust and secure data center security architectures. However, choice of the security platform, design considerations and effective use of advanced security capabilities play a crucial role in implementing a successful Zero Trust enabled data center.

    In this webinar, guest speaker John Kindervag, Vice President and Principal Analyst at Forrester will talk about the steps to achieving a Zero Trust data center.

    Topics covered in this webinar will include:

    - 5 Steps to achieving Zero Trust enabled data centers.
    - Extending Zero Trust design principles across hybrid cloud deployments
    - Security policy considerations and guidelines for implementing Zero Trust enabled data centers.
  • Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Mar 2 2017 8:00 am UTC 60 mins
    Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Mar 2 2017 2:00 am UTC 60 mins
    Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Recorded: Mar 1 2017 49 mins
    Scott Simkin, Sr. Group Manager for Threat Intelligence Cloud, Palo Alto Networks
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Recorded: Mar 1 2017 48 mins
    Scott Simkin, Sr. Group Manager for Threat Intelligence Cloud, Palo Alto Networks
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Recorded: Feb 28 2017 61 mins
    Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.
     
    This webinar will cover:
     
    • Visibility:  Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management:  Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Recorded: Feb 28 2017 61 mins
    Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.
     
    This webinar will cover:
     
    • Visibility:  Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management:  Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automatio Recorded: Feb 23 2017 62 mins
    Paul Morris, Acting CISO/Acting Director, Cybersecurity Division, TSA and Pamela Warren, Director, Palo Alto Networks
    Cyber security is front and center like never before, and cyber leaders are working to speed cyber response times for threat prevention, detection, and mitigation for known, and more importantly, unknown threats.

    A recent study shows Feds are losing the race against hackers– with 85% of security operations professionals taking hours, even days, to create protections against newly discovered cyber threats.

    View the on-demand “Pedal to the Metal” webinar and hear from Federal and industry cyber experts as they discuss MeriTalk’s newest cyber study findings, including:
    •How much time and manpower is expended analyzing threat intelligence?
    •What advanced automatic capabilities can Feds utilize to act rapidly and decisively against advanced threats?
    •Is threat intelligence is helping Feds prevent attacks – from never-before-seen threat actors and tactics – faster?

    Featured Speakers Include:
    •Paul Morris, Acting CISO/Acting Director, Information Assurance and Cybersecurity Division, TSA
    •Pamela Warren, Director, Government and Industry Initiatives, Palo Alto Networks
  • Cybersecurity Threats for Education - A New Global Frontier Recorded: Feb 23 2017 60 mins
    Center for Digital Education, University of Wisconsin-Madison, Palo Alto Networks
    On a daily basis, organizations are targeted by cybersecurity threats. While these threats occur throughout the world, half of ransomware detections occur in the U.S. Today, the internet of everything, mobile devices, underfunded/staffed IT organizations and a critical lack of trained cybersecurity professionals are combining to make things more difficult. As ransomware attacks become more prevalent and the effectiveness of phishing attempts become more sophisticated, all but the largest IT organizations are fortunate if they can keep pace.

    We know cyber attackers are becoming more refined and are searching for new ways to make a profit. Thanks to advances in attack distribution, anonymous payments, reliably encrypting and decrypting data, ransomware attacks are rising dramatically. Understanding the dangers of ransomware, and how to prevent them, has never has been more important.

    SPEAKERS:
    Bob Turner, Chief Information Security Officer, Office of the CIO & Vice Provost for Information Technology, University of Wisconsin-Madison

    Brad Duncan, Unit 42 Threat Expert, Palo Alto Networks

    MODERATOR:
    Jim Jorstad, Senior Fellow, Center for Digital Education


    Please join the Center for Digital Education, the University of Wisconsin-Madison, and Palo Alto Networks for this informative on demand webinar to learn more about these challenges and to gain focused advice to help you combat one of the biggest obstacles every IT organization is facing.

    Topics will include:
    •The three key steps to protect against ransomware: preparation, prevention, and response
    •New attack strategies and what to do about them
    •Combatting new forms of cryptolocker and other ransomware
    •Myths of ransomware
  • How to Implement User-based Controls for CybersecurityVisibility and policy cont Recorded: Feb 2 2017 29 mins
    Navneet Singh, Product Marketing Director, Next-Generation Firewall
    Visibility and policy control based on users is critical for cybersecurity. User-based policies readily show their business relevance, are more secure, easier to manage, and allow better forensics. In this webinar you will:

    •Learn the value of user-based controls using real-life data breach examples
    •Discover a step-by-step approach for implementing User-IDTM on your Palo Alto Networks Next-Generation Firewall
  • Live chat - Ransomware Survey findings Recorded: Jan 31 2017 33 mins
    Alex Hinchliffe, EMEA Threat Intelligence Analyst, Unit 42, & Ramon de Boer, Sales Lead, EMEA, Palo Alto Networks
    A 30 minute interactive discussion based on the findings and outcome of the EMEA Ransomware Survey run by Palo Alto Networks in December 2016.
  • SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention] Recorded: Jan 26 2017 54 mins
    Anuj Sawani, Product Marketing Manager, Palo Alto Networks
    The first step for many organizations migrating to the cloud is the adoption of SaaS applications, such as Office 365, Box, Salesforce and many more. As an IT professional, this means you are giving permission to your users to store data in the cloud with corporate-approved services, such as OneDrive or SharePoint Online. The decision to move to the cloud is usually supported by a long list of cost and operational benefits. Infrastructure cost reduction? Check. Increased productivity? Check. License cost reduction? Check. But, have you thought about data governance and compliance, malware protection, and collaboration with external vendors? These are great questions to ask as you make this transition.
     
    Organizations look to reduce the threat surface exposed by SaaS applications as their data is now hosted in data centers that are not managed by them. Join this webinar to learn more about the evolution of the data center landscape and how to redefine your security strategy to cover the unique risks surfacing from the adoption of SaaS applications. 
  • Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Recorded: Jan 25 2017 60 mins
    Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • Exploit kits: getting in by any means necessary Recorded: Jan 25 2017 50 mins
    Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Exploit kits: getting in by any means necessary Recorded: Jan 25 2017 50 mins
    Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • The Power of the Platform Recorded: Jan 24 2017 28 mins
    Zoltan Deak, Sr. Product Marketing Manager
    Protection. Delivered.

    Our next-gen security platform brings network, cloud and endpoint security into a common architecture providing greater visibility and control - making prevention possible.

    Traditional security methods focus on the detection of known threats, but as new threats emerge, our platform routes suspicious files and URLs to WildFireTM for threat analysis.

    In this webinar, you will learn how you can prevent never-before seen threats and protect your data through:

    •Prevention of unknown threats: Identify and block newly discovered threats in 5 minutes.
    •Shared global threat intelligence: Threat intelligence from more than 12,500 other WildFireTM users.
    •Automated security response and visibility: Reduce security workflow with automated prevention and get detailed analysis reports for threat events.
Webcasts and Videos
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content — by user, not just by IP address. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control threats and applications — regardless of port, protocol, evasive tactic, or SSL encryption — and scan content to stop threats and prevent data leakage. Palo Alto Networks delivers proven threat prevention combining IPS, anti-malware, URL, file and content filtering in a single integrated engine supported by one of the industry’s most prolific vulnerability research teams.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Protect Against New Threats to Safely Enable SaaS
  • Live at: May 25 2016 5:00 pm
  • Presented by: Anuj Sawani, Product Marketing Manager, Ryan Olson, Director, Intelligence
  • From:
Your email has been sent.
or close