Hi [[ session.user.profile.firstName ]]

Why Forrester named WildFire the leader, and the market agreed!

15 minutes is all you need in order to understand why Forrester chose WildFire to be the leading Automated Malware Analysis environment out there, and how you benefit from our largest global customer base, and in house research teams.
Recorded Jun 10 2016 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Karin Shopen, Product Marketing Director
Presentation preview: Why Forrester named WildFire the leader, and the market agreed!

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Attacks Happen—Breaches Don't Have To. Learn about the Security Lifecycle Review Apr 25 2017 12:00 pm UTC 60 mins
    tbd
    Excuses stop. Answers start.

    Strict policies and solid security measures can’t eliminate hidden threats in your systems. Learn how our Security Lifecycle Review (SLR) examines your network traffic and then generates a comprehensive report unique to your organization.

    In this webinar, you’ll discover some of the types of applications and threats exposing vulnerabilities in your security’s posture.

    There’s no need for excuses. Register now and see what’s really happening on your network.
  • Prevention Week Pt. 5: High-Performance, Intelligent, Centralized Management Apr 6 2017 8:00 am UTC 60 mins
    Navneet Singh from Palo alto Networks
    Greater Visibility, Faster Access, Workflow Automation

    The most innovative, advanced technology loses value if not managed effectively. We will discuss how to get access to the richest, most comprehensive set of actionable data from the network as well as from the endpoints or other third-party sources. Combined with complete network visibility and increased automation, organizations are able to streamline management workflows and focus on the issues that matter most.
  • Prevention Week Pt. 5: High-Performance, Intelligent, Centralized Management Apr 6 2017 2:00 am UTC 60 mins
    Navneet Singh from Palo alto Networks
    Greater Visibility, Faster Access, Workflow Automation

    The most innovative, advanced technology loses value if not managed effectively. We will discuss how to get access to the richest, most comprehensive set of actionable data from the network as well as from the endpoints or other third-party sources. Combined with complete network visibility and increased automation, organizations are able to streamline management workflows and focus on the issues that matter most.
  • Prevention Week Pt 4: Use Breakthrough Performance HW to Secure your Network Apr 5 2017 8:00 am UTC 60 mins
    Navneet Singh and Sai Balabhadrapatruni from Palo alto Networks
    Secure Increasingly Encrypted Traffic and Enable Cloud Adoption

    The increasing use of encrypted traffic and rapid consumption of cloud-based applications, coupled with ever-increasing data center consolidation, are driving new processing power, performance and capacity requirements. We will discuss how high-performance hardware appliances help deliver next-generation security capabilities anywhere in the network, including data center cores and enterprise perimeters, as well as branch and remote offices.
  • Prevention Week Pt 4: Use Breakthrough Performance HW to Secure your Network Apr 5 2017 2:00 am UTC 60 mins
    Navneet Singh and Sai Balabhadrapatruni from Palo alto Networks
    Secure Increasingly Encrypted Traffic and Enable Cloud Adoption

    The increasing use of encrypted traffic and rapid consumption of cloud-based applications, coupled with ever-increasing data center consolidation, are driving new processing power, performance and capacity requirements. We will discuss how high-performance hardware appliances help deliver next-generation security capabilities anywhere in the network, including data center cores and enterprise perimeters, as well as branch and remote offices.
  • 2017 Cybersecurity Predictions Leadership Webinar Mar 30 2017 6:30 pm UTC 60 mins
    Rick Howard, CSO, and Ryan Olson, Unit 42 Intelligence Director, Palo Alto Networks
    Cybersecurity is in a state of constant change and evolution. Executive leaders have an opportunity to get ahead of cybercriminals by understanding existing and potential threats and how to mitigate against them.

    In this leadership webinar designed specifically for CSO’s and technical security executives, Palo Alto Networks CSO, Rick Howard, and Unit 42 Intelligence Director, Ryan Olson, will review the cybersecurity predictions and share best practices for achieving a more resilient posture in 2017. Join us to learn about “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity this year.

    Get the executive point of view on these top-of-mind CSO initiatives as we discuss:
    •Why automation and playbook models will take on key roles in threat intelligence sharing.
    •Why cybersecurity is extending beyond the IT department and what your can do about it.
    •Trends for ransomware and practical advice to protect your organization from attacks.
  • Prevention Week Pt 3: Use Automation to Prevent Evasive Threats and C2 Traffic Mar 30 2017 8:00 am UTC 60 mins
    Scott Simkin, Sr. Manager Threat Intelligence at Palo Alto Networks
    Turn Raw Threat Intelligence Into Context and Action

    Attackers don’t stand still; your defenses shouldn’t either. See how multi-method threat prevention can be used to detect and prevent the most evasive threats and command-and-control traffic, and open up any source of threat intelligence to be used for automated prevention. These capabilities drive up the cost of successful data breaches for attackers, making their efforts too expensive to consider.

    You will learn more about:

    •How an evasion-resistant analysis environment defeats whole classes of VM evasion techniques.
    •Threat prevention capabilities that automate the blocking of command-and-control traffic in a way that previously required teams of signature writers.
    •How to enable security teams to gain leverage from any source of threat intelligence and drive automated prevention.
  • Prevention Week Pt 3: Use Automation to Prevent Evasive Threats and C2 Traffic Mar 30 2017 2:00 am UTC 60 mins
    Scott Simkin, Sr. Manager Threat Intelligence at Palo Alto Networks
    Turn Raw Threat Intelligence Into Context and Action

    Attackers don’t stand still; your defenses shouldn’t either. See how multi-method threat prevention can be used to detect and prevent the most evasive threats and command-and-control traffic, and open up any source of threat intelligence to be used for automated prevention. These capabilities drive up the cost of successful data breaches for attackers, making their efforts too expensive to consider.

    You will learn more about:

    •How an evasion-resistant analysis environment defeats whole classes of VM evasion techniques.
    •Threat prevention capabilities that automate the blocking of command-and-control traffic in a way that previously required teams of signature writers.
    •How to enable security teams to gain leverage from any source of threat intelligence and drive automated prevention.
  • Prevention Week Pt 2: Accelerating Multi-Cloud Deployments Mar 29 2017 8:00 am UTC 60 mins
    Matt Keil, Director of Product Marketing, Public Cloud at Palo Alto Networks
    Organizations are rapidly embracing multi-cloud architectures that span software-defined data centers (private clouds) and public cloud environments. To help organizations protect their cloud-based applications and data from cyberattacks, PAN-OS® 8.0 expands the VM-Series with new models and optimized performance, making it the broadest, most powerful line of virtualized firewall appliances on the market. New scalability and resiliency features for Microsoft® Azure® and Amazon® Web Services enable organizations to build secure cloud-centric architectures. Workflow automation features for VMware® NSX® and KVM with OpenStack® help streamline VM-Series deployments.
  • Prevention Week Pt 2: Accelerating Multi-Cloud Deployments Mar 29 2017 2:00 am UTC 60 mins
    Matt Keil, Director of Product Marketing, Public Cloud at Palo Alto Networks
    Organizations are rapidly embracing multi-cloud architectures that span software-defined data centers (private clouds) and public cloud environments. To help organizations protect their cloud-based applications and data from cyberattacks, PAN-OS® 8.0 expands the VM-Series with new models and optimized performance, making it the broadest, most powerful line of virtualized firewall appliances on the market. New scalability and resiliency features for Microsoft® Azure® and Amazon® Web Services enable organizations to build secure cloud-centric architectures. Workflow automation features for VMware® NSX® and KVM with OpenStack® help streamline VM-Series deployments.
  • Attacks Happen—Breaches Don't Have To. Learn about the Security Lifecycle Review Mar 28 2017 5:00 pm UTC 60 mins
    Gomathy Kannan, Product Marketing Manager
    Excuses stop. Answers start.

    Strict policies and solid security measures can’t eliminate hidden threats in your systems. Learn how our Security Lifecycle Review (SLR) examines your network traffic and then generates a comprehensive report unique to your organization.

    In this webinar, you’ll discover some of the types of applications and threats exposing vulnerabilities in your security’s posture.

    There’s no need for excuses. Register now and see what’s really happening on your network.
  • Prevention Week Pt 1: Stop Credential Theft and Abuse Mar 28 2017 8:00 am UTC 60 mins
    Brian Tokuyoshi, Senior Solutions Analyst at Palo Alto Networks
    Prevent Phishing and the Abuse of Stolen Credentials

    In this session, we will present the unique attack life-cycle for credential-based attacks. Using real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse.
  • Prevention Week Pt 1: Stop Credential Theft and Abuse Mar 28 2017 2:00 am UTC 60 mins
    Brian Tokuyoshi, Senior Solutions Analyst at Palo Alto Networks
    Prevent Phishing and the Abuse of Stolen Credentials

    In this session, we will present the unique attack life-cycle for credential-based attacks. Using real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse.
  • Preventing Cyberattacks in Financial Services with Advanced Endpoint Protection Recorded: Mar 22 2017 60 mins
    Michael Moshiri, Director, Endpoint Protection & Lawrence Chin, Security Marketing Architect, Palo Alto Networks
    How effective are your legacy security solutions in protecting you from the latest cyberattacks targeting financial institutions? What are the most effective means for defending your organization from targeted attacks, ransomware, and unknown threats?

    In this event, we will discuss:
    - New cyberattacks in the financial sector that bypass your legacy security solutions
    - Why legacy antivirus and anti-malware solutions fail to protect your systems
    - How to predictably reduce the risks of cyberattacks in your organization
    - What capabilities you should require of any advanced endpoint protection product
    - How advanced endpoint protection prevents unknown threats from compromising your systems.
  • Software Defined Data Center starts at the perimeter Recorded: Mar 21 2017 42 mins
    Rob van der Wouw, Security Consultant at RedLogic
    Today’s enterprises are in to the Software Defined Data Centre (SDDC) for better way to utilize security, compute power, storage and networking. Security is not only about prevention, protection and defenses but also ensuring the enterprise that data and systems are safe.

    Where do you start? Learn from our partner Redlogic who supported several customers to accomplish this journey and started securing their SDDC at the perimeter.

    RedLogic is a young, professional IT infrastructure services company consisting of certified top professionals in security and ICT. Managing and deploying complex infrastructure and security.
  • Prevention Week Pt. 5: High-Performance, Intelligent, Centralized Management Recorded: Mar 17 2017 23 mins
    Navneet Singh from Palo alto Networks
    Greater Visibility, Faster Access, Workflow Automation

    The most innovative, advanced technology loses value if not managed effectively. We will discuss how to get access to the richest, most comprehensive set of actionable data from the network as well as from the endpoints or other third-party sources. Combined with complete network visibility and increased automation, organizations are able to streamline management workflows and focus on the issues that matter most.
  • Prevention Week Pt 4: Use Breakthrough Performance HW to Secure your Network Recorded: Mar 16 2017 29 mins
    Navneet Singh and Sai Balabhadrapatruni from Palo alto Networks
    Secure Increasingly Encrypted Traffic and Enable Cloud Adoption

    The increasing use of encrypted traffic and rapid consumption of cloud-based applications, coupled with ever-increasing data center consolidation, are driving new processing power, performance and capacity requirements. We will discuss how high-performance hardware appliances help deliver next-generation security capabilities anywhere in the network, including data center cores and enterprise perimeters, as well as branch and remote offices.
  • Prevention Week Pt 3: Use Automation to Prevent Evasive Threats and C2 Traffic Recorded: Mar 15 2017 45 mins
    Scott Simkin, Sr. Manager Threat Intelligence at Palo Alto Networks
    Turn Raw Threat Intelligence Into Context and Action

    Attackers don’t stand still; your defenses shouldn’t either. See how multi-method threat prevention can be used to detect and prevent the most evasive threats and command-and-control traffic, and open up any source of threat intelligence to be used for automated prevention. These capabilities drive up the cost of successful data breaches for attackers, making their efforts too expensive to consider.

    You will learn more about:

    •How an evasion-resistant analysis environment defeats whole classes of VM evasion techniques.
    •Threat prevention capabilities that automate the blocking of command-and-control traffic in a way that previously required teams of signature writers.
    •How to enable security teams to gain leverage from any source of threat intelligence and drive automated prevention.
  • Prevention Week Pt 2: Accelerating Multi-Cloud Deployments Recorded: Mar 14 2017 39 mins
    Matt Keil, Director of Product Marketing, Public Cloud at Palo Alto Networks
    Organizations are rapidly embracing multi-cloud architectures that span software-defined data centers (private clouds) and public cloud environments. To help organizations protect their cloud-based applications and data from cyberattacks, PAN-OS® 8.0 expands the VM-Series with new models and optimized performance, making it the broadest, most powerful line of virtualized firewall appliances on the market. New scalability and resiliency features for Microsoft® Azure® and Amazon® Web Services enable organizations to build secure cloud-centric architectures. Workflow automation features for VMware® NSX® and KVM with OpenStack® help streamline VM-Series deployments.
  • Demo: Safely Enable SaaS Applications with Aperture Recorded: Mar 14 2017 48 mins
    Christiaan Groenhof, Inside Sales Engineer at Palo Alto Networks
    The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.

    Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:

    •Gain visibility and granular, context-based control of SaaS applications.
    •Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
    •Protect against new insertion and distribution points for malware.
    •Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

    The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
Webcasts and Videos
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content — by user, not just by IP address. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control threats and applications — regardless of port, protocol, evasive tactic, or SSL encryption — and scan content to stop threats and prevent data leakage. Palo Alto Networks delivers proven threat prevention combining IPS, anti-malware, URL, file and content filtering in a single integrated engine supported by one of the industry’s most prolific vulnerability research teams.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Why Forrester named WildFire the leader, and the market agreed!
  • Live at: Jun 10 2016 2:00 am
  • Presented by: Karin Shopen, Product Marketing Director
  • From:
Your email has been sent.
or close