Hi [[ session.user.profile.firstName ]]

NEXT GEN YOU, Webinaria: Czwartek z Prewencją – GlobalProtect Demo

Jak zapewnienić bezpieczny zdalny dostępu do kluczowych zasobów i skutecznie egzekwować politykę bezpieczeństwa niezależnie od lokalizacji użytkownika?
Podczas sesji omówiona zostanie architektura oraz sekwencja połączeń dla rozwiązania SSL VPN realizowanego za pomocą urządzeń Palo Alto Networks. Przedstawione zostaną również zaawansowane funkcje takie jak sprawdzanie stanu stacji końcowej (HIP Checking), split tunnel i zarządzanie ruchem do sieci lokalnej przy uruchomionym VPN, a także uwierzytelnienie za pomocą certyfikatów.
Recorded Apr 28 2016 70 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Radoslaw Wal
Presentation preview: NEXT GEN YOU, Webinaria: Czwartek z Prewencją – GlobalProtect Demo
  • Channel
  • Channel profile
  • Endpoint and Network Security: Better Together Aug 21 2018 9:00 am UTC 60 mins
    Danny Milrad, Director of Endpoint Products, and Scott Simkin, Director of Threat Intelligence, Palo Alto Networks
    Threats are evolving far too quickly for point products to keep up. Security point products that operate and analyze in silos have led to security gaps and fragmented policies that fail to prevent successful cyberattacks. With more than 9 million new instances of malware each month, deploying disparate point products is no longer enough.

    Join Danny Milrad, Director of Endpoint Product Marketing, and Scott Simkin, Director of Threat Intelligence Product Marketing, as they discuss:

    - The need for endpoint security to augment perimeter protections
    - The value of threat intelligence collected, analyzed and shared across the security architecture
    - 3 requirements for effective endpoint protection
    - How Traps, Palo Alto Networks advanced endpoint protection, extends protections from the firewall throughout the organization
  • Endpoint and Network Security: Better Together Aug 21 2018 2:00 am UTC 60 mins
    Danny Milrad, Director of Endpoint Products, and Scott Simkin, Director of Threat Intelligence, Palo Alto Networks
    Threats are evolving far too quickly for point products to keep up. Security point products that operate and analyze in silos have led to security gaps and fragmented policies that fail to prevent successful cyberattacks. With more than 9 million new instances of malware each month, deploying disparate point products is no longer enough.

    Join Danny Milrad, Director of Endpoint Product Marketing, and Scott Simkin, Director of Threat Intelligence Product Marketing, as they discuss:

    - The need for endpoint security to augment perimeter protections
    - The value of threat intelligence collected, analyzed and shared across the security architecture
    - 3 requirements for effective endpoint protection
    - How Traps, Palo Alto Networks advanced endpoint protection, extends protections from the firewall throughout the organization
  • Realize the Promise of the SWIFT Customer Security Controls Recorded: Aug 7 2018 56 mins
    Lawrence Chin, Financial Services Security Architect, Palo Alto Networks
    Improve Your Cyber Hygiene

    Members of the Society for Worldwide Interbank Financial Telecommunications (SWIFT) cooperative had to self-attest to new mandatory security controls at the end of 2017. The next self-attestation will be required by year end 2018. After that point, SWIFT reserves the right to report non-compliance to counterparties and appropriate local regulators.

    How did your institution fare in its initial self-attestation to SWIFT’s security controls? If there was room for improvement,

    • Join this webinar to learn how to meet and/or exceed SWIFT mandatory and advisory security controls with Palo Alto Networks products
    • Hear about additional best practices that can further improve your cybersecurity posture.

    In the big picture, the SWIFT security controls and further best practices from Palo Alto Networks contribute to overall cyber hygiene, and should prove to be beneficial to all financial institutions - regardless of whether they are SWIFT members or not.
  • Forrester Total Economic Impact Study on Security Operating Platform Recorded: Aug 2 2018 57 mins
    Scott Simkin, director of threat intelligence from Palo Alto Networks and Henry Huang, principal consultant from Forrester
    Our customers tell us that in addition to minimizing their risk, our Security Operating Platform – made up of integrated network, cloud and endpoint security technologies – actually decreases their incident response time while increasing the reach and efficiency of their security teams.

    Intrigued, we commissioned Forrester® Consulting to examine the overall benefits, including ROI, that enterprise customers would likely realize after deploying the Security Operating Platform.

    The study, generated after extensive interviews with longstanding Palo Alto Networks® customers, focuses on the quantifiable savings of both time and money that a hypothetical organization would realize. The study found that, over a three-year period, this organization would:

    •Realize security operation efficiencies of $4.75M
    •Avoid alternative security purchases of $3.5M
    •Generate an ROI of 65%


    Join Palo Alto Networks and guest speaker Henry Huang, principal consultant from Forrester, as we discuss the study’s findings. We encourage you to use this research to help guide your cybersecurity investment strategy and make the right security choices.

    ***The Total Economic Impact™ Of Palo Alto Networks, a March 2018 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks
  • Extending Zero Trust to the Endpoint Recorded: Aug 2 2018 48 mins
    John Kindervag, Field CTO, Palo Alto Networks & Lieuwe Jan Koning, CTO, ON2IT B.V.
    Zero Trust is a familiar concept when speaking about network architecture. The terms "never trust, always verify" rings a familiar tune to those focused on securing the network. However, as security technologies have advanced to cross-communicate between network and endpoints, Zero Trust principles should also extend from the network to the endpoints.

    Join John Kindervag, the creator of the Zero Trust model, former Forrester analyst and current Field CTO at Palo Alto Networks, as he:

    - Discusses why endpoints need to talk to and integrate with other security technologies
    - Maps Zero Trust to the five critical points of the security architecture
    - Provides a framework as to why and how to extend Zero Trust to the endpoint

    We'll also be hearing from, Lieuwe Jan Koning, CTO and Co-Founder of ON2IT, for an actual use case on endpoint Zero Trust adoption. Lieuwe will discuss:

    - Why ON2IT chose to focus on the endpoint
    - How they adopted Zero Trust
    - And, the reason why they chose Palo Alto Networks Traps advanced endpoint protection to secure their endpoints
  • Accelerate your move to Microsoft® Azure® Recorded: Aug 1 2018 51 mins
    Matt Keil, Director of Product Marketing, Public Cloud
    Microsoft® Azure® can change the way your organization does business by increasing agility, scalability and storage. Although the benefits of Azure – and the public cloud – are well-documented, questions about security, potential data loss and business interruption remain, potentially slowing cloud adoption.

    Join us for a webinar focused on accelerating your move to Azure and securing your data, apps and DevOps environments once there by delivering consistent, automated security across all your environments.

    You’ll learn:

    - Common public cloud security challenges
    - How the Palo Alto Networks® cloud security portfolio protects you
    - How automation enables app developers to operate at cloud speed
  • Accelerate your move to Microsoft® Azure® Recorded: Aug 1 2018 50 mins
    Matt Keil, Director of Product Marketing, Public Cloud
    Microsoft® Azure® can change the way your organization does business by increasing agility, scalability and storage. Although the benefits of Azure – and the public cloud – are well-documented, questions about security, potential data loss and business interruption remain, potentially slowing cloud adoption.

    Join us for a webinar focused on accelerating your move to Azure and securing your data, apps and DevOps environments once there by delivering consistent, automated security across all your environments.

    You’ll learn:

    - Common public cloud security challenges
    - How the Palo Alto Networks® cloud security portfolio protects you
    - How automation enables app developers to operate at cloud speed
  • Endpoint and Network Security: Better Together Recorded: Jul 31 2018 55 mins
    Danny Milrad, Director of Endpoint Products, and Scott Simkin, Director of Threat Intelligence, Palo Alto Networks
    Threats are evolving far too quickly for point products to keep up. Security point products that operate and analyze in silos have led to security gaps and fragmented policies that fail to prevent successful cyberattacks. With more than 9 million new instances of malware each month, deploying disparate point products is no longer enough.

    Join Danny Milrad, Director of Endpoint Product Marketing, and Scott Simkin, Director of Threat Intelligence Product Marketing, as they discuss:

    - The need for endpoint security to augment perimeter protections
    - The value of threat intelligence collected, analyzed and shared across the security architecture
    - 3 requirements for effective endpoint protection
    - How Traps, Palo Alto Networks advanced endpoint protection, extends protections from the firewall throughout the organization
  • Advanced & Frictionless Security in a Multi-Cloud Environment Recorded: Jul 31 2018 62 mins
    Anuj Sawani, Product Marketing Manager
    Today, organizations need higher performance and faster access to the latest innovative technologies in order to grab whatever competitive edge they can. This almost always means going to the cloud.

    Unfortunately, in the rush to get there, enterprises can find themselves with data and applications scattered across private and public clouds – often multiple public clouds – spanning IaaS, PaaS and SaaS.

    Without the appropriate security and compliance strategy in place, this often results in poor visibility and increased risk. The simple truth is that multi-cloud security isn’t intuitive.

    We can make it easier. This webinar will cover:

    •Common speed bumps your security and DevOps teams face
    •Innovative security strategies to tackle a wide range of cloud risks
    •Security automation and integration within the development lifecycle
    •Achieving consistent and advanced multi-cloud protections

    Register now and learn how to secure your multi-cloud environment with advanced, frictionless protection.
  • Advanced & Frictionless Security in a Multi-Cloud Environment Recorded: Jul 31 2018 62 mins
    Anuj Sawani, Product Marketing Manager
    Today, organizations need higher performance and faster access to the latest innovative technologies in order to grab whatever competitive edge they can. This almost always means going to the cloud.

    Unfortunately, in the rush to get there, enterprises can find themselves with data and applications scattered across private and public clouds – often multiple public clouds – spanning IaaS, PaaS and SaaS.

    Without the appropriate security and compliance strategy in place, this often results in poor visibility and increased risk. The simple truth is that multi-cloud security isn’t intuitive.

    We can make it easier. This webinar will cover:

    •Common speed bumps your security and DevOps teams face
    •Innovative security strategies to tackle a wide range of cloud risks
    •Security automation and integration within the development lifecycle
    •Achieving consistent and advanced multi-cloud protections

    Register now and learn how to secure your multi-cloud environment with advanced, frictionless protection.
  • Cyberattack Simulation Training with Cyber Range Recorded: Jul 27 2018 47 mins
    Pamela Warren, Cyber Range Lead and Ken Alexander, Technical Trainer
    This session will dive deep into the skills and techniques mastered during Cyber Ranges such as preventing live attacks, responding to real-world threats, and building end-to-end prevention processes while battling other teams during full-on cyberattack scenarios.
  • Watch & Learn: Threat Intelligence with AutoFocus and MineMeld Recorded: Jul 26 2018 47 mins
    Michael Breen, Consulting Engineer
    This is the “Best of Ignite” Week. Day 4 will be a deep dive on Threat Intelligence.

    Drive Action on Threat Intelligence with AutoFocus and MineMeld
    Learn how to bridge the gap between machine-generated threat data and security operations professionals with AutoFocus contextual threat intelligence and MineMeld syndication engine. Enriched with context from WildFire service, the Unit 42 threat research team and third-party feeds, AutoFocus enables you to identify and act against the most critical threats facing your organization. This industry-first threat operations approach allows native workflows between intelligence generation, verification and prevention enforcement through the Next-Generation Security Platform. You’ll learn:

    • How to use integrated threat intelligence to improve existing security workflows
    • The value of adding real-time context to security events
    • How to enable aggregation of any third-party threat intelligence feed with MineMeld
    • How to drive automated prevention enforcement for highly targeted attacks
  • Crossing the IT/OT chasm Recorded: Jul 26 2018 43 mins
    Alexander Hinchliffe, Threat Intelligence Analyst, Unit 42, Palo Alto Networks
    IT meets OT.

    In modern asset-based businesses, data is key to making smart, real-time decisions and creating a foundation for the innovative new products and services that will allow you to greater serve customers in the future. As a result, Information Technology (IT) and Operational Technology (OT) systems must be converged to truly enable data driven businesses.

    This direction of travel directly challenges the traditional ‘Air Gap’ security models that have existed between IT and OT systems for decades. Not only does this approach hinder the required flow of telemetry data between sensory networks, data lakes and machine learning environments, but as a trusted construct it also introduces new and unknown risks from insider threat.

    This presentation provides an example of the types of threats targeting such environments together with examples of how they are delivered and spread through compromised networks as well as how they perform their actions on objective against the targets. Building upon the information and indicators shared by the US CERT in their TA18-074A alert, Unit 42 shares insights into how this attack operated.
  • Extending Zero Trust to the Endpoint Recorded: Jul 26 2018 48 mins
    John Kindervag, Field CTO, Palo Alto Networks & Lieuwe Jan Koning, CTO, ON2IT B.V.
    Zero Trust is a familiar concept when speaking about network architecture. The terms "never trust, always verify" rings a familiar tune to those focused on securing the network. However, as security technologies have advanced to cross-communicate between network and endpoints, Zero Trust principles should also extend from the network to the endpoints.

    Join John Kindervag, the creator of the Zero Trust model, former Forrester analyst and current Field CTO at Palo Alto Networks, as he:

    - Discusses why endpoints need to talk to and integrate with other security technologies
    - Maps Zero Trust to the five critical points of the security architecture
    - Provides a framework as to why and how to extend Zero Trust to the endpoint

    We'll also be hearing from, Lieuwe Jan Koning, CTO and Co-Founder of ON2IT, for an actual use case on endpoint Zero Trust adoption. Lieuwe will discuss:

    - Why ON2IT chose to focus on the endpoint
    - How they adopted Zero Trust
    - And, the reason why they chose Palo Alto Networks Traps advanced endpoint protection to secure their endpoints
  • Cryptocurrency (In)Security Recorded: Jul 26 2018 61 mins
    Alex Hinchliffe Threat Intelligence Analyst, Palo Alto Networks® Unit 42 and Jamie Brummell, Systems Engineer
    Join Alex Hinchliffe Threat Intelligence Analyst, Palo Alto Networks Unit 42 & Jamie Brummell, Systems Engineer for this exciting Cybersecurity Webinar focusing on Cryptocurrencies.

    Over the past 6 months there has been a notable decline in ransomware with a comparable uptick in Cryptocurrency threats, such as Cryptomining Trojans. With a more direct model and the number and value, of Cryptocurrencies increasing, it’s fast becoming the popular choice for cybercriminals.

    During this webinar, Alex Hinchliffe and Jamie Brummell will discuss the basics of cryptocurrencies, their underlying technologies and then take an in-depth look into the security concerns around them including:

    •Android malware stealing cryptocurrency wallet credentials
    •IoT botnets used to mine cryptocurrency
    •Coinhive javascript being covertly loaded in users' browsers by websites to mine cryptocurrency
    •Unauthorized spinning up of AWS EC2 instances for crypto mining
    •How crypto miners are getting hacked remotely to divert funds

    Learn how this impacts you by Registering Now and joining us on Thursday July 26th at 09:30am.
  • Extending Zero Trust to the Endpoint Recorded: Jul 26 2018 48 mins
    John Kindervag, Field CTO, Palo Alto Networks & Lieuwe Jan Koning, CTO, ON2IT B.V.
    Zero Trust is a familiar concept when speaking about network architecture. The terms "never trust, always verify" rings a familiar tune to those focused on securing the network. However, as security technologies have advanced to cross-communicate between network and endpoints, Zero Trust principles should also extend from the network to the endpoints.

    Join John Kindervag, the creator of the Zero Trust model, former Forrester analyst and current Field CTO at Palo Alto Networks, as he:

    - Discusses why endpoints need to talk to and integrate with other security technologies
    - Maps Zero Trust to the five critical points of the security architecture
    - Provides a framework as to why and how to extend Zero Trust to the endpoint

    We'll also be hearing from, Lieuwe Jan Koning, CTO and Co-Founder of ON2IT, for an actual use case on endpoint Zero Trust adoption. Lieuwe will discuss:

    - Why ON2IT chose to focus on the endpoint
    - How they adopted Zero Trust
    - And, the reason why they chose Palo Alto Networks Traps advanced endpoint protection to secure their endpoints
  • Protecting and enabling 21st century industrial networks at scale Recorded: Jul 25 2018 62 mins
    Del Rodillas, Head of Industrial Cybersecurity Solutions & Lionel Jacobs, Senior ICS Security Architect, Palo Alto Networks
    Modernization initiatives such as "Industry 4.0" and "Industrial IoT" are pushing industrial networks to be more connected as well as more complex and challenging to protect. In this session we will demonstrate how you can establish granular visibility and consistent security policy to your SCADA deployment, IIoT and remote sites in even the harsh environments. In other words, we can show you how to protect all of your IT AND OT infrastructure.

    Join this webinar to learn about:

    - Consistent and integrated deployment securing traffic across the SCADA core, remote sites, controlled/harsh environments, IIoT and industrial cloud
    - Zero-trust segmentation using the PA-220R ruggedized Next-Gen Firewall across IT and OT environments
    - Leveraging central management to increase administrative efficiency and provide cybersecurity and ICS network traffic intelligence to OT and IT
  • ¿Están a salvo sus datos en Office 365? Recorded: Jul 25 2018 60 mins
    Carlos Corbacho, Systems Engineer
    Las aplicaciones de software como servicio (SaaS), como Microsoft® Office 365®, tienen mucho éxito y cada vez más empresas las utilizan. Sin embargo, también están aumentando los peligros que conllevan, como los siguientes:

    • Revelación accidental de datos con SharePoint®
    • Uso descontrolado de cuentas personales de OneDrive®
    • Violación de la seguridad de la información en Exchange

    Sí, incluso las aplicaciones SaaS de confianza como Office 365 pueden hacer que aumente el riesgo de sufrir fugas de datos y de incumplir las normativas de seguridad.

    Nuestra solución, Security Operating Platform, ayuda a combatir estos peligros. Inscríbase en nuestro seminario web e infórmese sobre el CASB que necesita para proteger sus datos en la nube frente al código dañino y las fugas fortuitas.

    Descubrirá cómo disfrutar de plena visibilidad y completas funciones de elaboración de informes y clasificación de datos, junto con la posibilidad de realizar ajustes detallados a nivel de usuarios, carpetas y operaciones de archivo, todo ello con el objetivo de proteger los datos cruciales alojados en Office 365.
  • Защищены ли ваши данные в Office 365? Recorded: Jul 25 2018 42 mins
    Denis Batrankov, Systems Engineer
    Приложения SaaS, например Microsoft® Office 365®, набирают популярность. Всё больше компаний используют их в своей работе. Однако такая модель предоставления приложений таит в себе определенные угрозы:

    • случайное раскрытие данных через SharePoint®
    • неконтролируемое использование личных учетных записей OneDrive®
    • нарушение безопасности данных в Exchange

    Даже надежные приложения SaaS, такие как Office 365, повышают риск нарушения безопасности и несоблюдения нормативных требований.

    Наша платформа Security Operating Platform поможет избежать таких проблем. Зарегистрируйтесь для участия в вебинаре и узнайте, как обеспечить соответствие требованиям брокеров CASB и защитить облачные данные от вредоносного ПО и случайного раскрытия.

    Вы также узнаете, как обеспечить полную визуализацию, создание отчетов, систематизацию данных и гибкое применение правил для всех пользователей, папок и действий с файлами, чтобы защитить важные для бизнеса данные в Office 365.
  • Protecting and enabling 21st century industrial networks at scale Recorded: Jul 25 2018 61 mins
    Del Rodillas, Head of Industrial Cybersecurity Solutions & Lionel Jacobs, Senior ICS Security Architect, Palo Alto Networks
    Modernization initiatives such as "Industry 4.0" and "Industrial IoT" are pushing industrial networks to be more connected as well as more complex and challenging to protect. In this session we will demonstrate how you can establish granular visibility and consistent security policy to your SCADA deployment, IIoT and remote sites in even the harsh environments. In other words, we can show you how to protect all of your IT AND OT infrastructure.

    Join this webinar to learn about:

    - Consistent and integrated deployment securing traffic across the SCADA core, remote sites, controlled/harsh environments, IIoT and industrial cloud
    - Zero-trust segmentation using the PA-220R ruggedized Next-Gen Firewall across IT and OT environments
    - Leveraging central management to increase administrative efficiency and provide cybersecurity and ICS network traffic intelligence to OT and IT
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: NEXT GEN YOU, Webinaria: Czwartek z Prewencją – GlobalProtect Demo
  • Live at: Apr 28 2016 10:00 am
  • Presented by: Radoslaw Wal
  • From:
Your email has been sent.
or close