Hi [[ session.user.profile.firstName ]]

Live-Demo für einen erweiterten Endpunkt-Schutz

Angreifer agieren immer zielgerichteter und ausgeklügelter. Sie verwenden unbekannte Exploits und spezifische Malware, die die herkömmlichen Endpunkt-Sicherheitslösungen von heute weder verhindern noch entdecken können.

Gegen diese fortschrittlichen Angriffe versagen die bestehenden Ansätze aus mehreren Gründen: Es gibt keine bekannte Signatur, keine bekannten Strings und in vielen Fällen ist auch das Verhalten nicht bekannt. Ein Angreifer erhält also ohne Widerstand Zugriff auf das komplette System, eine Tatsache, die in kompromittierten Endpunkten resultiert. Dort greifen dann Maßnahmen der Eindringungserkennung und Schadensbehebung – meistens jedoch nicht umfangreich und schnell genug.

Die Advanced Endpoint Protection von Palo Alto Networks stellt einen vollständigen Paradigmenwechsel dar, weg von konventionellen Sicherheitssystemen mit Erkennungs- und Schadensbehebungsmodellen für Endpunkte hin zur reinen Prävention.

Nehmen Sie an der Live-Demo von Palo Alto Networks teil und sehen Sie selbst, wie die fortschrittliche Endpunkt-Schutztechnologie die Sicherheit, wie wir sie heute kennen, revolutioniert.
Recorded May 24 2016 74 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bastian Schwittay
Presentation preview: Live-Demo für einen erweiterten Endpunkt-Schutz

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Attacks Happen—Breaches Don't Have To. Learn about the Security Lifecycle Review Apr 25 2017 12:00 pm UTC 60 mins
    tbd
    Excuses stop. Answers start.

    Strict policies and solid security measures can’t eliminate hidden threats in your systems. Learn how our Security Lifecycle Review (SLR) examines your network traffic and then generates a comprehensive report unique to your organization.

    In this webinar, you’ll discover some of the types of applications and threats exposing vulnerabilities in your security’s posture.

    There’s no need for excuses. Register now and see what’s really happening on your network.
  • Prevention Week Pt. 5: High-Performance, Intelligent, Centralized Management Apr 6 2017 8:00 am UTC 60 mins
    Navneet Singh from Palo alto Networks
    Greater Visibility, Faster Access, Workflow Automation

    The most innovative, advanced technology loses value if not managed effectively. We will discuss how to get access to the richest, most comprehensive set of actionable data from the network as well as from the endpoints or other third-party sources. Combined with complete network visibility and increased automation, organizations are able to streamline management workflows and focus on the issues that matter most.
  • Prevention Week Pt. 5: High-Performance, Intelligent, Centralized Management Apr 6 2017 2:00 am UTC 60 mins
    Navneet Singh from Palo alto Networks
    Greater Visibility, Faster Access, Workflow Automation

    The most innovative, advanced technology loses value if not managed effectively. We will discuss how to get access to the richest, most comprehensive set of actionable data from the network as well as from the endpoints or other third-party sources. Combined with complete network visibility and increased automation, organizations are able to streamline management workflows and focus on the issues that matter most.
  • Prevention Week Pt 4: Use Breakthrough Performance HW to Secure your Network Apr 5 2017 8:00 am UTC 60 mins
    Navneet Singh and Sai Balabhadrapatruni from Palo alto Networks
    Secure Increasingly Encrypted Traffic and Enable Cloud Adoption

    The increasing use of encrypted traffic and rapid consumption of cloud-based applications, coupled with ever-increasing data center consolidation, are driving new processing power, performance and capacity requirements. We will discuss how high-performance hardware appliances help deliver next-generation security capabilities anywhere in the network, including data center cores and enterprise perimeters, as well as branch and remote offices.
  • Prevention Week Pt 4: Use Breakthrough Performance HW to Secure your Network Apr 5 2017 2:00 am UTC 60 mins
    Navneet Singh and Sai Balabhadrapatruni from Palo alto Networks
    Secure Increasingly Encrypted Traffic and Enable Cloud Adoption

    The increasing use of encrypted traffic and rapid consumption of cloud-based applications, coupled with ever-increasing data center consolidation, are driving new processing power, performance and capacity requirements. We will discuss how high-performance hardware appliances help deliver next-generation security capabilities anywhere in the network, including data center cores and enterprise perimeters, as well as branch and remote offices.
  • 2017 Cybersecurity Predictions Leadership Webinar Mar 30 2017 6:30 pm UTC 60 mins
    Rick Howard, CSO, and Ryan Olson, Unit 42 Intelligence Director, Palo Alto Networks
    Cybersecurity is in a state of constant change and evolution. Executive leaders have an opportunity to get ahead of cybercriminals by understanding existing and potential threats and how to mitigate against them.

    In this leadership webinar designed specifically for CSO’s and technical security executives, Palo Alto Networks CSO, Rick Howard, and Unit 42 Intelligence Director, Ryan Olson, will review the cybersecurity predictions and share best practices for achieving a more resilient posture in 2017. Join us to learn about “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity this year.

    Get the executive point of view on these top-of-mind CSO initiatives as we discuss:
    •Why automation and playbook models will take on key roles in threat intelligence sharing.
    •Why cybersecurity is extending beyond the IT department and what your can do about it.
    •Trends for ransomware and practical advice to protect your organization from attacks.
  • Prevention Week Pt 3: Use Automation to Prevent Evasive Threats and C2 Traffic Mar 30 2017 8:00 am UTC 60 mins
    Scott Simkin, Sr. Manager Threat Intelligence at Palo Alto Networks
    Turn Raw Threat Intelligence Into Context and Action

    Attackers don’t stand still; your defenses shouldn’t either. See how multi-method threat prevention can be used to detect and prevent the most evasive threats and command-and-control traffic, and open up any source of threat intelligence to be used for automated prevention. These capabilities drive up the cost of successful data breaches for attackers, making their efforts too expensive to consider.

    You will learn more about:

    •How an evasion-resistant analysis environment defeats whole classes of VM evasion techniques.
    •Threat prevention capabilities that automate the blocking of command-and-control traffic in a way that previously required teams of signature writers.
    •How to enable security teams to gain leverage from any source of threat intelligence and drive automated prevention.
  • Prevention Week Pt 3: Use Automation to Prevent Evasive Threats and C2 Traffic Mar 30 2017 2:00 am UTC 60 mins
    Scott Simkin, Sr. Manager Threat Intelligence at Palo Alto Networks
    Turn Raw Threat Intelligence Into Context and Action

    Attackers don’t stand still; your defenses shouldn’t either. See how multi-method threat prevention can be used to detect and prevent the most evasive threats and command-and-control traffic, and open up any source of threat intelligence to be used for automated prevention. These capabilities drive up the cost of successful data breaches for attackers, making their efforts too expensive to consider.

    You will learn more about:

    •How an evasion-resistant analysis environment defeats whole classes of VM evasion techniques.
    •Threat prevention capabilities that automate the blocking of command-and-control traffic in a way that previously required teams of signature writers.
    •How to enable security teams to gain leverage from any source of threat intelligence and drive automated prevention.
  • Prevention Week Pt 2: Accelerating Multi-Cloud Deployments Mar 29 2017 8:00 am UTC 60 mins
    Matt Keil, Director of Product Marketing, Public Cloud at Palo Alto Networks
    Organizations are rapidly embracing multi-cloud architectures that span software-defined data centers (private clouds) and public cloud environments. To help organizations protect their cloud-based applications and data from cyberattacks, PAN-OS® 8.0 expands the VM-Series with new models and optimized performance, making it the broadest, most powerful line of virtualized firewall appliances on the market. New scalability and resiliency features for Microsoft® Azure® and Amazon® Web Services enable organizations to build secure cloud-centric architectures. Workflow automation features for VMware® NSX® and KVM with OpenStack® help streamline VM-Series deployments.
  • Prevention Week Pt 2: Accelerating Multi-Cloud Deployments Mar 29 2017 2:00 am UTC 60 mins
    Matt Keil, Director of Product Marketing, Public Cloud at Palo Alto Networks
    Organizations are rapidly embracing multi-cloud architectures that span software-defined data centers (private clouds) and public cloud environments. To help organizations protect their cloud-based applications and data from cyberattacks, PAN-OS® 8.0 expands the VM-Series with new models and optimized performance, making it the broadest, most powerful line of virtualized firewall appliances on the market. New scalability and resiliency features for Microsoft® Azure® and Amazon® Web Services enable organizations to build secure cloud-centric architectures. Workflow automation features for VMware® NSX® and KVM with OpenStack® help streamline VM-Series deployments.
  • Attacks Happen—Breaches Don't Have To. Learn about the Security Lifecycle Review Mar 28 2017 5:00 pm UTC 60 mins
    Gomathy Kannan, Product Marketing Manager
    Excuses stop. Answers start.

    Strict policies and solid security measures can’t eliminate hidden threats in your systems. Learn how our Security Lifecycle Review (SLR) examines your network traffic and then generates a comprehensive report unique to your organization.

    In this webinar, you’ll discover some of the types of applications and threats exposing vulnerabilities in your security’s posture.

    There’s no need for excuses. Register now and see what’s really happening on your network.
  • Prevention Week Pt 1: Stop Credential Theft and Abuse Mar 28 2017 8:00 am UTC 60 mins
    Brian Tokuyoshi, Senior Solutions Analyst at Palo Alto Networks
    Prevent Phishing and the Abuse of Stolen Credentials

    In this session, we will present the unique attack life-cycle for credential-based attacks. Using real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse.
  • Prevention Week Pt 1: Stop Credential Theft and Abuse Mar 28 2017 2:00 am UTC 60 mins
    Brian Tokuyoshi, Senior Solutions Analyst at Palo Alto Networks
    Prevent Phishing and the Abuse of Stolen Credentials

    In this session, we will present the unique attack life-cycle for credential-based attacks. Using real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse.
  • Prevent, Detect, and Respond – Securing Government and Education Onsite and in t Recorded: Mar 23 2017 72 mins
    Panel of 11 experts moderated by PSTE
    The Public Sector Technology Exchange (PSTE), an independent venue that hosts national thought leadership forums on the challenges of government, education, and technology, hosts a webinar entitled “Prevent, Detect, and Respond – Securing Government and Education Onsite and in the Cloud.”

    Hear this leadership forum on demand to gain insights on:
    •Security best practices for government and education
    •Strategies for rapid response to breaches
    •Reducing your departmental cyber attack surface
    •Preparing for the “powder keg” situation in your organization
    •What hackers love about the cloud
    •Threat research trends on the future of cyber warfare

    Webinar Panelists:

    Chris Hill - Acting Deputy Chief Information Security Officer
    State of Illinois

    John Matelski - Chief Innovation and Information Officer
    DeKalb County, Georgia

    Rick Howard - Chief Security Officer
    Palo Alto Networks

    Matt Morton - Chief Information Security Officer and Assistant Chief Information Officer
    University of Nebraska Omaha

    Elayne Starkey - Chief Security Officer
    State of Delaware

    Lars Schmekel - Chief Security Officer
    Miami Dade County, Florida

    Gary Hayslip - Chief Information Security Officer
    City of San Diego, California

    Walter Tong - Director, Cyber Intelligence
    State of Georgia

    Duane Kuroda - Sr. Manager, Advanced Technologies
    Proofpoint

    Bob Leek - Deputy Chief Information Officer
    Multnomah County, Oregon

    Palo Alto Networks and Proofpoint are the sponsors of this leadership forum.
  • Preventing Cyberattacks in Financial Services with Advanced Endpoint Protection Recorded: Mar 22 2017 60 mins
    Michael Moshiri, Director, Endpoint Protection & Lawrence Chin, Security Marketing Architect, Palo Alto Networks
    How effective are your legacy security solutions in protecting you from the latest cyberattacks targeting financial institutions? What are the most effective means for defending your organization from targeted attacks, ransomware, and unknown threats?

    In this event, we will discuss:
    - New cyberattacks in the financial sector that bypass your legacy security solutions
    - Why legacy antivirus and anti-malware solutions fail to protect your systems
    - How to predictably reduce the risks of cyberattacks in your organization
    - What capabilities you should require of any advanced endpoint protection product
    - How advanced endpoint protection prevents unknown threats from compromising your systems.
  • Software Defined Data Center starts at the perimeter Recorded: Mar 21 2017 42 mins
    Rob van der Wouw, Security Consultant at RedLogic
    Today’s enterprises are in to the Software Defined Data Centre (SDDC) for better way to utilize security, compute power, storage and networking. Security is not only about prevention, protection and defenses but also ensuring the enterprise that data and systems are safe.

    Where do you start? Learn from our partner Redlogic who supported several customers to accomplish this journey and started securing their SDDC at the perimeter.

    RedLogic is a young, professional IT infrastructure services company consisting of certified top professionals in security and ICT. Managing and deploying complex infrastructure and security.
  • Prevention Week Pt. 5: High-Performance, Intelligent, Centralized Management Recorded: Mar 17 2017 23 mins
    Navneet Singh from Palo alto Networks
    Greater Visibility, Faster Access, Workflow Automation

    The most innovative, advanced technology loses value if not managed effectively. We will discuss how to get access to the richest, most comprehensive set of actionable data from the network as well as from the endpoints or other third-party sources. Combined with complete network visibility and increased automation, organizations are able to streamline management workflows and focus on the issues that matter most.
  • Prevention Week Pt 4: Use Breakthrough Performance HW to Secure your Network Recorded: Mar 16 2017 29 mins
    Navneet Singh and Sai Balabhadrapatruni from Palo alto Networks
    Secure Increasingly Encrypted Traffic and Enable Cloud Adoption

    The increasing use of encrypted traffic and rapid consumption of cloud-based applications, coupled with ever-increasing data center consolidation, are driving new processing power, performance and capacity requirements. We will discuss how high-performance hardware appliances help deliver next-generation security capabilities anywhere in the network, including data center cores and enterprise perimeters, as well as branch and remote offices.
  • Prevention Week Pt 3: Use Automation to Prevent Evasive Threats and C2 Traffic Recorded: Mar 15 2017 45 mins
    Scott Simkin, Sr. Manager Threat Intelligence at Palo Alto Networks
    Turn Raw Threat Intelligence Into Context and Action

    Attackers don’t stand still; your defenses shouldn’t either. See how multi-method threat prevention can be used to detect and prevent the most evasive threats and command-and-control traffic, and open up any source of threat intelligence to be used for automated prevention. These capabilities drive up the cost of successful data breaches for attackers, making their efforts too expensive to consider.

    You will learn more about:

    •How an evasion-resistant analysis environment defeats whole classes of VM evasion techniques.
    •Threat prevention capabilities that automate the blocking of command-and-control traffic in a way that previously required teams of signature writers.
    •How to enable security teams to gain leverage from any source of threat intelligence and drive automated prevention.
  • Prevention Week Pt 2: Accelerating Multi-Cloud Deployments Recorded: Mar 14 2017 39 mins
    Matt Keil, Director of Product Marketing, Public Cloud at Palo Alto Networks
    Organizations are rapidly embracing multi-cloud architectures that span software-defined data centers (private clouds) and public cloud environments. To help organizations protect their cloud-based applications and data from cyberattacks, PAN-OS® 8.0 expands the VM-Series with new models and optimized performance, making it the broadest, most powerful line of virtualized firewall appliances on the market. New scalability and resiliency features for Microsoft® Azure® and Amazon® Web Services enable organizations to build secure cloud-centric architectures. Workflow automation features for VMware® NSX® and KVM with OpenStack® help streamline VM-Series deployments.
Webcasts and Videos
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content — by user, not just by IP address. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control threats and applications — regardless of port, protocol, evasive tactic, or SSL encryption — and scan content to stop threats and prevent data leakage. Palo Alto Networks delivers proven threat prevention combining IPS, anti-malware, URL, file and content filtering in a single integrated engine supported by one of the industry’s most prolific vulnerability research teams.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Live-Demo für einen erweiterten Endpunkt-Schutz
  • Live at: May 24 2016 1:05 pm
  • Presented by: Bastian Schwittay
  • From:
Your email has been sent.
or close