Hi [[ session.user.profile.firstName ]]

Prevention Week: Securing Multi-Tenant Software Defined Data Center w/ VM-Series

Multi-Tenant architecture deployments are common within cloud environments and software defined data centers. Your security blueprint and its implementation needs to be multi-tenant aware for providing granular visibility into applications, data and protecting tenants from advanced cyber attacks.

In this webinar we will cover the security considerations to protect your multi-tenant infrastructure with Palo Alto Networks VM-Series and VMware NSX. Topics covered in this webinar will include:
· Design considerations for deploying VM-Series in NSX enabled multi-tenant SDDC
· Multi-tenant security use-cases
· Additional VM-Series for NSX deployment scenarios
Recorded Jul 18 2016 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sai Balabhadrapatruni | Sr. Product Marketing Manager at Palo Alto Networks
Presentation preview: Prevention Week: Securing Multi-Tenant Software Defined Data Center w/ VM-Series
  • Channel
  • Channel profile
  • 5 Endpoint Protection Best Practices Dec 11 2018 6:00 pm UTC 60 mins
    Danny Milrad
    Today’s threat landscape and motivation by adversaries have resulted in more sophisticated and automated attacks. Nearly every attack relies on compromising an endpoint. Although most organizations have deployed endpoint protection, infections are still common…a different approach is needed.

    To be effective, endpoint protection needs to evolve to a prevention-first approach that protects endpoints at each critical stage of the attack lifecycle.

    Join and Danny Milrad, Palo Alto Networks Director of Advanced Endpoint Protection, as they discuss the essential requirements for endpoint protection to stay ahead of tomorrow’s adversaries. From this webinar, you’ll learn why endpoint protection should:

    •Provide accurate protection against known and unknown threats
    •Protect against exploits and fileless attacks based on technique rather than signatures
    •And be simple to deploy and manage, and carry a lightweight agent for resource sensitive environments
  • The Hacker You Don’t Know – Uncovering Active Cyberattacks Dec 6 2018 6:30 pm UTC 60 mins
    Ahmed Hussein, Systems Engineer and Eric Kampling, Systems Engineer
    If an active attacker were operating inside your network right now, could you see them? IT security professionals today are challenged with detecting active attackers in addition to stopping malware & risky behavior. Learn how to leverage the power of machine learning to stop active cyberattacks before it’s too late.
  • Compliance is a Team Sport Dec 6 2018 9:00 am UTC 60 mins
    Tighe Schlottog, Security Architect - Cross Industries at Palo Alto Networks and Aaron Wilson, Founder, ScaleSec
    oo often, organizations make the move to the cloud without considerations for how it will be in compliance. Whether you need to maintain compliance for regulatory or business obligations it is best to go into the cloud with those requirements in mind.

    In this webinar, our experts will discuss some of the common misconceptions and mistakes that are made in working toward cloud compliance. They will provide practical advice about how to get your cloud compliance program in the best shape possible.

    -Where to start, whether you’re starting from scratch or modifying your existing program
    -Who to involve and when
    -How to manage reporting, audits, and communication

    Given the maturity of the cloud platforms, it isn’t hard to be compliant in the cloud --you just need to prepare appropriately and share the work across the organization to ensure you maintain compliance.
  • Compliance is a Team Sport Dec 6 2018 2:00 am UTC 60 mins
    Tighe Schlottog, Security Architect - Cross Industries at Palo Alto Networks and Aaron Wilson, Founder, ScaleSec
    Too often, organizations make the move to the cloud without considerations for how it will be in compliance. Whether you need to maintain compliance for regulatory or business obligations it is best to go into the cloud with those requirements in mind.

    In this webinar, our experts will discuss some of the common misconceptions and mistakes that are made in working toward cloud compliance. They will provide practical advice about how to get your cloud compliance program in the best shape possible.

    -Where to start, whether you’re starting from scratch or modifying your existing program
    -Who to involve and when
    -How to manage reporting, audits, and communication

    Given the maturity of the cloud platforms, it isn’t hard to be compliant in the cloud --you just need to prepare appropriately and share the work across the organization to ensure you maintain compliance.
  • Who Else is Viewing my One Drive? (Securing Public SaaS Applications) Dec 5 2018 5:00 pm UTC 60 mins
    Steven Hansen, Systems Engineer and Aymen Khan, Systems Engineer
    The appeal of SaaS applications, such as Office 365®, Google G Suite, Box and Salesforce is growing, but so are the hidden threats in SaaS offerings: accidental data exposure, malicious outsiders, promiscuous sharing and so on. Even sanctioned SaaS adoption can increase the risk of breaches and non-compliance.

    Attend this webinar to learn how Aperture SaaS security service helps eliminate the risks.
  • Protection for Advanced Malware in the Wild Dec 4 2018 5:30 pm UTC 60 mins
    Matt Elliott, Systems Engineer
    If an active sample of malware was executed in your environment right now, how would you block it? IT professionals today are challenged to sift through countless alerts and false positives to try to successfully prevent malware and risky behavior.

    Attend this webinar to learn how to leverage the power of machine learning to stop active cyberattacks.
  • Are your point of sale environments protected? Nov 28 2018 5:00 pm UTC 60 mins
    Lawrence Chin
    Point of Sale (POS) systems are the lifeblood of any industry that conducts in-person transactions with its customers. Retail, hospitality, accommodation, etc. rely on their POS environments to process purchases, support customer loyalty programs, update inventory, and drive the supply chain. However, the processing of customer payment card and collection of personally indentifiable information still makes POS systems a favorite target of cyberattackers. Media reports on data breaches stemming from compromised POS systems have become all too common. Although compliance with the PCI DSS is a expected, it’s only the bare minimum to conduct business.
    In this webinar you will:
    -Hear a customer case study on POS protection
    -Realize greater security controls over your CDE and customer PII
    -Exceed PCI DSS for greater cyber hygiene
    -Understand the capabilities of a security operating platform for POS
  • Securing Building Management Systems Nov 27 2018 6:00 pm UTC 60 mins
    Del Rodillas, Director of Industrial and IoT Cybersecurity Product Marketing, Palo Alto Networks
    An often-forgotten area in the enterprise network which poses a significant risk to your organization if compromised are Building Management/Automation Systems (BMS/BAS). These IoT and industrial control systems which are integral to realizing "smart" and efficient buildings and facilities include Heating, Ventilation and Air-conditioning (HVAC), energy management, surveillance, fire safety, physical access controls, electric car charging systems, and other connected systems. As these systems undergo digital transformation and become more connected, the risk associated with cyberattacks also increases. Organizations need to act today to learn more about this growing risk and to include securing BMS/BAS in their enterprise cybersecurity strategy.

    Listen to this webinar to learn about:
    •The rising threat landscape associated with smart buildings and facilities
    •Strategic tenets for protecting BMS/BAS
    •A reference blueprint and case study for BMS cybersecurity
  • Bridging Security Gaps with Networks-to-Endpoint Integration Nov 20 2018 6:00 pm UTC 60 mins
    Konstantin Rychkov, IDC, Senior Research Analyst
    The typical enterprise uses an average of 30 security products, most of which from variety of vendors and typically do not integrate well and offer little information sharing…if any. Using a portfolio of integrated products from fewer vendors means greater synergies and efficiencies. This is especially true of endpoint security software, where many organizations have long and established relationships with a favorite vendor. This can lead to a sense of complacency, and there may also exist a disincentive to replace software on all of an organization’s endpoint devices, leaving organizations potentially exposed to an evolving threat landscape.

    Join us for this informative webinar where IDC analyst Konstantin Rychkov will:

    • Introduce the concept of endpoint protection integrated with network security components
    • Demonstrate how the two together provide greater effectiveness and efficiency in security
    • Detail how an integrated security stack is instrumental to holistic enterprise-wide security
  • Securing connected vehicles Recorded: Oct 30 2018 36 mins
    Dharminder Debisarun : Cybersecurity strategist for automotive Moshe Shlisel : CEO GuardKnox
    The end-to-end cybersecurity strategy that protects connected vehicles.

    With the expected surge in connected vehicles, cloud security remains critically important to passenger safety and well-being.

    In fact, Gartner is predicting a quarter billion connected vehicles on the road by 2020.

    The average modern car now features over 100 computers, all communicating with one another – often through the cloud. These connections increase the chances of cyberattacks, which can lead to accidents and cause extensive recalls.

    We’ve joined forces with GuardKnox to provide an end-to-end cybersecurity strategy for the modern connected vehicle.

    In this webinar, you’ll learn:

    •How to protect connected cars against cyberattacks
    •Why encryption is so important for connected vehicles
    •How to eliminate challenges when implementing security

    Register/Join the webinar to learn how to prevent successful cyberattacks on connected vehicles.
  • Machine Learning 101: Streamline Security and Speed Up Response Time Recorded: Oct 30 2018 48 mins
    Join Yinnon Meshi, Sr. Data Scientist and Kasey Cross, Senior Product Manager
    Machine learning is changing the way we live our lives. It can reduce errors and even achieve the impossible by accomplishing tasks that cannot be performed manually.

    But how does it change the cybersecurity landscape? And, perhaps more importantly, how will it impact your career in security?

    Join Yinnon Meshi, Sr. Data Scientist and Kasey Cross, Senior Product Marketing Manager to understand how to apply machine learning to threat hunting and malware analysis.

    You will come away understanding:

    •Where machine learning is used today in security
    •How it will be leveraged in the future
    •How you can simplify security operations with automation and machine learning
  • Securing Connected Vehicles Recorded: Oct 30 2018 42 mins
    Dharminder Debisarun : Cybersecurity strategist for automotive Moshe Shlisel : CEO GuardKnox
    The end-to-end cybersecurity strategy that protects connected vehicles.

    With the expected surge in connected vehicles, cloud security remains critically important to passenger safety and well-being.

    In fact, Gartner is predicting a quarter billion connected vehicles on the road by 2020.

    The average modern car now features over 100 computers, all communicating with one another – often through the cloud. These connections increase the chances of cyberattacks, which can lead to accidents and cause extensive recalls.

    We’ve joined forces with GuardKnox to provide an end-to-end cybersecurity strategy for the modern connected vehicle.

    In this webinar, you’ll learn:

    •How to protect connected cars against cyberattacks
    •Why encryption is so important for connected vehicles
    •How to eliminate challenges when implementing security

    Register/Join the webinar to learn how to prevent successful cyberattacks on connected vehicles.
  • Cloud Security Trends and Best Practices for 2019 Recorded: Oct 23 2018 59 mins
    Dave Klein (GuardiCore) | Prof Avishai Wool (Algosec) | Fred Streefland (Palo Alto Networks)
    As more corporate data moves to the cloud, the new challenge is to efficiently manage security in both the cloud and on premises. How are organizations coping and what are the solutions they should be employing?

    Join this keynote panel of security and cloud experts as they discuss:
    - Cloud security challenges today
    - Extending network security to the cloud
    - Security policy management in the cloud
    - Security automation
    - Best practices and recommendations for improving your enterprise security posture
    - Future trends in cloud security

    Speakers:
    - Dave Klein, Sr. Director Engineering & Architecture, GuardiCore
    - Prof Avishai Wool, CTO & Co-founder, Algosec
    - Fred Streefland, Chief Security Officer North & East-Europe (NEEUR), Palo Alto Networks
  • Top 10 Security Recommendations for Public Cloud Migration Recorded: Oct 23 2018 47 mins
    Dejan Stanic - Consulting Engineer Cloud EMEA at Palo Alto Networks
    Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivalled only by that of the early days of the Internet era. As was the case then, the speed of adoption often means that “good enough” security is viewed as acceptable.

    With the underlying premise that the public cloud is someone else’s computer, and an extension of your network, this session will cover:

    - Public Cloud security concerns
    - What the shared security responsibility model really means
    - Recommendations for protecting your public cloud workloads and data
  • SSL Decryption - the pro’s, the con’s and best practices Recorded: Oct 23 2018 35 mins
    Fred Streefland, Chief Security Officer Northern and Eastern Europe and Marco Vadrucci, Systems Engineer
    Join Fred Streefland, Chief Security Officer and Marco Vadrucci, Systems Engineer from Palo Alto Networks for this exclusive Cybersecurity Webinar focusing on ‘The Pros and Cons of SSL Decryption.’

    During the webinar Fred and Marco will discuss how Secure Sockets Layer Decryption (SSL) (and its successor Transport Layer Security (TLS)) is designed to protect the privacy and security of sensitive communications across an internal or external network.

    During this webinar you'll learn:

    •SSL, its benefits and growth
    •Challenges of encryption
    •How Palo Alto Networks can provide visibility and control across encrypted SSL channels

    Register Now and join us on Wednesday October 10th at 10:00am. We’re looking forward to seeing you there.
  • Worry-Free Security on Azure Recorded: Oct 19 2018 55 mins
    Robert Smith & Hubert Ng
    Presenter

    Robert Smith - Higher Education & Research Specialist – APAC - Microsoft

    Hubert Ng – Cloud Engagement Manager – Asia Pacific - Palo Alto Networks

    An exclusive webinar for the education sector

    Businesses are not the only organisations looking to take advantage of the innovation and disruption that moving to the cloud can provide. Schools, colleges and universities across the Asia-Pacific region are moving their data and applications to the cloud.

    Join our webinar on October 19, and learn how to secure your data and apps in Microsoft® Azure®.

    We will be joined by Robert Smith, higher education and research specialist – APAC from Microsoft, and Hubert Ng, cloud engagement manager for Palo Alto Networks, who will share their experience in bringing the advantages of the cloud specifically to organisations like yours.
  • Worry-Free Security on Azure Recorded: Oct 19 2018 54 mins
    Robert Smith & Hubert Ng
    Presenter

    Robert Smith - Higher Education & Research Specialist – APAC - Microsoft

    Hubert Ng – Cloud Engagement Manager – Asia Pacific - Palo Alto Networks

    An exclusive webinar for the education sector

    Businesses are not the only organisations looking to take advantage of the innovation and disruption that moving to the cloud can provide. Schools, colleges and universities across the Asia-Pacific region are moving their data and applications to the cloud.

    Join our webinar on October 19, and learn how to secure your data and apps in Microsoft® Azure®.

    We will be joined by Robert Smith, higher education and research specialist – APAC from Microsoft, and Hubert Ng, cloud engagement manager for Palo Alto Networks, who will share their experience in bringing the advantages of the cloud specifically to organisations like yours.
  • Compliance is a Team Sport Recorded: Oct 18 2018 55 mins
    Tighe Schlottog, Security Architect - Cross Industries at Palo Alto Networks and Aaron Wilson, Founder, ScaleSec
    Too often, organizations make the move to the cloud without considerations for how it will be in compliance. Whether you need to maintain compliance for regulatory or business obligations it is best to go into the cloud with those requirements in mind.

    In this webinar, our experts will discuss some of the common misconceptions and mistakes that are made in working toward cloud compliance. They will provide practical advice about how to get your cloud compliance program in the best shape possible.

    -Where to start, whether you’re starting from scratch or modifying your existing program
    -Who to involve and when
    -How to manage reporting, audits, and communication

    Given the maturity of the cloud platforms, it isn’t hard to be compliant in the cloud --you just need to prepare appropriately and share the work across the organization to ensure you maintain compliance.
  • Securing remote ICS/SCADA systems just got easier Recorded: Oct 17 2018 55 mins
    Lionel Jacobs, senior security architect, ICS, Palo Alto Networks with host Karin Shopen
    Operational technology teams responsible for ICS and SCADA networks – like their IT counterparts – are being tasked with reducing costs while aiming for 100 percent uptime with minimal staffing resources. This is becoming one of the most important driving factors in the push to supply remote access to vendors and support staff.

    Join us as we look at ways that IT and OT teams can overcome the security challenges remote access often presents to process control networks. In this webinar, we’ll look at ways you can:

    •Apply Zero Trust principles to improve secure remote access
    •Create remote access that is flexible, scalable and secure
    •Protect against threats from third party systems.
  • IDC led Journey to Automation Recording Recorded: Oct 8 2018 44 mins
    Konstantin Rychkov, Senior Research Analyst, Software, Western Europe
    IDC led Journey to Automation
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Prevention Week: Securing Multi-Tenant Software Defined Data Center w/ VM-Series
  • Live at: Jul 18 2016 5:00 pm
  • Presented by: Sai Balabhadrapatruni | Sr. Product Marketing Manager at Palo Alto Networks
  • From:
Your email has been sent.
or close