Hi [[ session.user.profile.firstName ]]

L’union fait la force; Résoudre le casse-tête de la sécurité avec Wildfire et Tr

Les terminaux sont toujours une cible privilégiée pour les attaques, particulièrement lorsqu’ils ne sont pas reliés au réseau d’entreprise.

Vous avez profité des avantages de prévention que le cloud de renseignement sur les menaces de Wildfire™ offre à votre périmètre et à votre réseau mais saviez-vous qu’il est possible d’appliquer ce même degré de protection à vos terminaux ?

Regardez ce webinar et découvrez comment Traps et Wildfire peuvent s’associer mais aussi :

•Comment les acteurs malveillants élaborés compromettent des terminaux à l’aide d’exploits zero day
•Pourquoi les solutions de terminaux actuelles ne peuvent pas empêcher les violations sur les terminaux
•Comment empêcher les menaces connues et inconnues de compromettre vos systèmes
Inscrivez-vous ici pour ce webinar et découvrez comment associer Wildfire et Traps pour améliorer la prévention des violations sur vos terminaux.
Recorded Jun 23 2016 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bertrand Le Bail, Systems Engineer
Presentation preview: L’union fait la force; Résoudre le casse-tête de la sécurité avec Wildfire et Tr
  • Channel
  • Channel profile
  • SSL Decryption - the pro’s, the con’s and best practices Oct 10 2018 9:00 am UTC 45 mins
    Fred Streefland, CSO NEEUR and Marco Vadrucci, Systems Engineer
    Join Fred Streefland, Chief Security Officer and Marco Vadrucci, Systems Engineer from Palo Alto Networks for this exclusive Cybersecurity Webinar focusing on ‘The Pros and Cons of SSL Decryption.’

    During the webinar Fred and Marco will discuss how Secure Sockets Layer Decryption (SSL) (and its successor Transport Layer Security (TLS)) is designed to protect the privacy and security of sensitive communications across an internal or external network.

    During this webinar you'll learn:

    •SSL, its benefits and growth
    •Challenges of encryption
    •How Palo Alto Networks can provide visibility and control across encrypted SSL channels

    Register Now and join us on Wednesday October 10th at 10:00am. We’re looking forward to seeing you there.
  • Securing remote ICS/SCADA systems just got easier Oct 3 2018 3:00 pm UTC 60 mins
    Lionel Jacobs, senior security architect, ICS, Palo Alto Networks with host Karin Shopen
    Operational technology teams responsible for ICS and SCADA networks – like their IT counterparts – are being tasked with reducing costs while aiming for 100 percent uptime with minimal staffing resources. This is becoming one of the most important driving factors in the push to supply remote access to vendors and support staff.

    Join us as we look at ways that IT and OT teams can overcome the security challenges remote access often presents to process control networks. In this webinar, we’ll look at ways you can:

    •Apply Zero Trust principles to improve secure remote access
    •Create remote access that is flexible, scalable and secure
    •Protect against threats from third party systems.
  • Cybersecurity Webinar LIVE: The Unpatchables Oct 2 2018 2:00 pm UTC 60 mins
    Join Lindseigh Strickland, Cybersecurity Specialist and Ori Pliner, Systems Engineer at Palo Alto Networks
    Patch management is often highlighted as a major issue for many organisations. The volume and frequency of updates makes it almost impossible to keep all machines up to date and secure. This issue is worse for older machines many of which cannot be patched at all.

    Join Lindseigh Strickland, Cybersecurity Specialist and Matt Smith, Systems Engineer at Palo Alto Networks, for an exclusive cybersecurity webinar on September 12th at 3:00 p.m. to receive an insight into an alternative approach to securing older machines. We’ll also discuss how this approach provides more flexibility and control around patching and protecting unpatchable devices.

    This is a ‘must attend’ event if you want to understand:
    - The security, risk and compliance ramifications of operating unpatchable systems and applications
    - How to prevent security breaches on legacy machines when patching is not an option

    A live demonstration of Palo Alto Networks Advanced Endpoint Protection will also be provided.
  • Enabling and Deploying Your SSL Decryption Sep 27 2018 5:00 pm UTC 60 mins
    Arun Kumar and Ron Dodge, with host Karin Shopen
    The growth in SSL/TLS encrypted traffic traversing the internet is on an explosive upturn. Given the primary benefits associated with encryption, the private and secure exchange of information over the internet, compliance with certain privacy and security regulations – such as the Health Insurance Portability and Accountability Act and Payment Card Industry Data Security Standard, or HIPAA and PCI DSS – the trend in SSL adoption is expected to continue to rise.

    Join Palo Alto Networks® as our team of experts presents the “hows and whys” of SSL decryption. In this webcast, you will:
    •Learn why you need to enable decryption and the key metrics to support your case
    •Find out how to address internal logistics and legal considerations
    •Discover how to effectively plan and deploy decryption
    •Get your questions answered during our live Q&A

    You’ll also get access to our SSL-decryption best practices guide as additional support for decryption enablement.
  • What is the EU NIS Directive… and how can a Security Operating Platform help? Sep 24 2018 8:00 am UTC 45 mins
    Danielle Kriz, Senior Director Global Policy, Palo Alto Networks & Greg Day, VP & CSO EMEA, Palo Alto Networks
    The NIS Directive calls for technical and organisational security measures with regard to the state of the art and appropriate measures to prevent and minimise the impact of incidents. Legacy security systems made up of cobbled-together point products have proven inadequate to provide the level of visibility and control required to prevent the rising volume and sophistication of cyberattacks.

    In this webinar Danielle Kriz, Senior Director Global Policy, and Greg Day, VP & CSO EMEA, discuss how the Palo Alto Networks® Security Operating Platform can help organisations along their road to compliance. The Security Operating Platform prevents successful cyberattacks through data-driven automation and takes advantage of precise analytics to streamline routine tasks so that security teams can focus on the threats that really matter. Visibility into all traffic, classified by application, user and content, provides the context to enforce dynamic security policy to prevent known and unknown threats throughout the attack lifecycle.
  • Public Cloud Security Compliance with Palo Alto Networks Evident Recorded: Sep 12 2018 31 mins
    Jason Montgomery, WEUR Cloud Security Manager at Palo Alto Networks
    With DevOps teams eager to harness the public cloud to accelerate delivery of apps and services, legacy security tools can’t keep pace. What’s needed is a more robust, automated approach to securing public cloud deployments and ensuring compliance.

    Join Jason Montgomery, WEUR Cloud Security Manager at Palo Alto Networks for this informative webinar focusing in how to achieve Public Cloud Security Compliance.

    During this event Jason will discuss how Palo Alto Networks Evident can help you transition your business to the cloud in a secure and compliant fashion.

    During this webinar you'll learn:

    •Why legacy tools can't proactively control cloud security risk
    •Why business needs automated, API-centric tools
    •How we can maintain rigorous security controls while optimizing development and delivery for speed

    Register Now and join Palo Alto Networks on Wednesday September 12th at 10:00 a.m.
  • Forrester Total Economic Impact Study on Security Operating Platform Recorded: Sep 11 2018 58 mins
    Scott Simkin, director of threat intelligence from Palo Alto Networks and Henry Huang, principal consultant from Forrester
    Our customers tell us that in addition to minimizing their risk, our Security Operating Platform – made up of integrated network, cloud and endpoint security technologies – actually decreases their incident response time while increasing the reach and efficiency of their security teams.

    Intrigued, we commissioned Forrester® Consulting to examine the overall benefits, including ROI, that enterprise customers would likely realize after deploying the Security Operating Platform.

    The study, generated after extensive interviews with longstanding Palo Alto Networks® customers, focuses on the quantifiable savings of both time and money that a hypothetical organization would realize. The study found that, over a three-year period, this organization would:

    •Realize security operation efficiencies of $4.75M
    •Avoid alternative security purchases of $3.5M
    •Generate an ROI of 65%


    Join Palo Alto Networks and guest speaker Henry Huang, principal consultant from Forrester, as we discuss the study’s findings. We encourage you to use this research to help guide your cybersecurity investment strategy and make the right security choices.

    ***The Total Economic Impact™ Of Palo Alto Networks, a March 2018 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks
  • Forrester Total Economic Impact Study on Security Operating Platform Recorded: Sep 11 2018 57 mins
    Scott Simkin, director of threat intelligence from Palo Alto Networks and Henry Huang, principal consultant from Forrester
    Our customers tell us that in addition to minimizing their risk, our Security Operating Platform – made up of integrated network, cloud and endpoint security technologies – actually decreases their incident response time while increasing the reach and efficiency of their security teams.

    Intrigued, we commissioned Forrester® Consulting to examine the overall benefits, including ROI, that enterprise customers would likely realize after deploying the Security Operating Platform.

    The study, generated after extensive interviews with longstanding Palo Alto Networks® customers, focuses on the quantifiable savings of both time and money that a hypothetical organization would realize. The study found that, over a three-year period, this organization would:

    •Realize security operation efficiencies of $4.75M
    •Avoid alternative security purchases of $3.5M
    •Generate an ROI of 65%


    Join Palo Alto Networks and guest speaker Henry Huang, principal consultant from Forrester, as we discuss the study’s findings. We encourage you to use this research to help guide your cybersecurity investment strategy and make the right security choices.

    ***The Total Economic Impact™ Of Palo Alto Networks, a March 2018 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks
  • Accelerate your move to Microsoft® Azure® Recorded: Sep 7 2018 52 mins
    Matt Keil, Director of Product Marketing, Public Cloud
    Microsoft® Azure® can change the way your organization does business by increasing agility, scalability and storage. Although the benefits of Azure – and the public cloud – are well-documented, questions about security, potential data loss and business interruption remain, potentially slowing cloud adoption.

    Join us for a webinar focused on accelerating your move to Azure and securing your data, apps and DevOps environments once there by delivering consistent, automated security across all your environments.

    You’ll learn:

    - Common public cloud security challenges
    - How the Palo Alto Networks® cloud security portfolio protects you
    - How automation enables app developers to operate at cloud speed
  • Accelerate your move to Microsoft® Azure® Recorded: Sep 7 2018 50 mins
    Matt Keil, Director of Product Marketing, Public Cloud
    Microsoft® Azure® can change the way your organization does business by increasing agility, scalability and storage. Although the benefits of Azure – and the public cloud – are well-documented, questions about security, potential data loss and business interruption remain, potentially slowing cloud adoption.

    Join us for a webinar focused on accelerating your move to Azure and securing your data, apps and DevOps environments once there by delivering consistent, automated security across all your environments.

    You’ll learn:

    - Common public cloud security challenges
    - How the Palo Alto Networks® cloud security portfolio protects you
    - How automation enables app developers to operate at cloud speed
  • Endpoint and Network Security: Better Together Recorded: Sep 6 2018 56 mins
    Danny Milrad, Director of Endpoint Products, and Scott Simkin, Director of Threat Intelligence, Palo Alto Networks
    Threats are evolving far too quickly for point products to keep up. Security point products that operate and analyze in silos have led to security gaps and fragmented policies that fail to prevent successful cyberattacks. With more than 9 million new instances of malware each month, deploying disparate point products is no longer enough.

    Join Danny Milrad, Director of Endpoint Product Marketing, and Scott Simkin, Director of Threat Intelligence Product Marketing, as they discuss:

    - The need for endpoint security to augment perimeter protections
    - The value of threat intelligence collected, analyzed and shared across the security architecture
    - 3 requirements for effective endpoint protection
    - How Traps, Palo Alto Networks advanced endpoint protection, extends protections from the firewall throughout the organization
  • Endpoint and Network Security: Better Together Recorded: Sep 6 2018 55 mins
    Danny Milrad, Director of Endpoint Products, and Scott Simkin, Director of Threat Intelligence, Palo Alto Networks
    Threats are evolving far too quickly for point products to keep up. Security point products that operate and analyze in silos have led to security gaps and fragmented policies that fail to prevent successful cyberattacks. With more than 9 million new instances of malware each month, deploying disparate point products is no longer enough.

    Join Danny Milrad, Director of Endpoint Product Marketing, and Scott Simkin, Director of Threat Intelligence Product Marketing, as they discuss:

    - The need for endpoint security to augment perimeter protections
    - The value of threat intelligence collected, analyzed and shared across the security architecture
    - 3 requirements for effective endpoint protection
    - How Traps, Palo Alto Networks advanced endpoint protection, extends protections from the firewall throughout the organization
  • A Maturity Model for Healthcare Cybersecurity Recorded: Sep 5 2018 60 mins
    Matt Mellen, Healthcare Security Architect, Palo Alto Networks
    Palo Alto Networks security platform provides hundreds of capabilities for reducing the attack surface of healthcare organizations - But which ones should you focus on implementing first? Join us for this webinar presenting the Healthcare Maturity Model, by Matt Mellen, a former security operations lead at a hospital in California. The maturity model outlines critical security capabilities that every healthcare organization should have deployed. A variety of security capabilities will be discussed in the context of healthcare environments, like SSL-decryption, geo-based blocking, DNS sinkholing and many more.

    The security capabilities will be split into 4 levels of increasing ‘maturity’ in order to help healthcare orgs prioritize which should be implemented first (levels 1 and 2), and which are more appropriate in more mature security architectures (levels 3 and 4). In addition to helping you prioritize the security capabilities that should be enabled in your organization, you’ll get a better idea of the breadth of security functions that the security platform provides in a healthcare environment.

    Learning Objectives:
    • Understand the overview of the security capabilities the security platform provides
    • Prioritize enablement of security capabilities within your organization
  • Protecting and enabling 21st century industrial networks at scale Recorded: Sep 5 2018 62 mins
    Del Rodillas, Head of Industrial Cybersecurity Solutions & Lionel Jacobs, Senior ICS Security Architect, Palo Alto Networks
    Modernization initiatives such as "Industry 4.0" and "Industrial IoT" are pushing industrial networks to be more connected as well as more complex and challenging to protect. In this session we will demonstrate how you can establish granular visibility and consistent security policy to your SCADA deployment, IIoT and remote sites in even the harsh environments. In other words, we can show you how to protect all of your IT AND OT infrastructure.

    Join this webinar to learn about:

    - Consistent and integrated deployment securing traffic across the SCADA core, remote sites, controlled/harsh environments, IIoT and industrial cloud
    - Zero-trust segmentation using the PA-220R ruggedized Next-Gen Firewall across IT and OT environments
    - Leveraging central management to increase administrative efficiency and provide cybersecurity and ICS network traffic intelligence to OT and IT
  • Protecting and enabling 21st century industrial networks at scale Recorded: Sep 5 2018 62 mins
    Del Rodillas, Head of Industrial Cybersecurity Solutions & Lionel Jacobs, Senior ICS Security Architect, Palo Alto Networks
    Modernization initiatives such as "Industry 4.0" and "Industrial IoT" are pushing industrial networks to be more connected as well as more complex and challenging to protect. In this session we will demonstrate how you can establish granular visibility and consistent security policy to your SCADA deployment, IIoT and remote sites in even the harsh environments. In other words, we can show you how to protect all of your IT AND OT infrastructure.

    Join this webinar to learn about:

    - Consistent and integrated deployment securing traffic across the SCADA core, remote sites, controlled/harsh environments, IIoT and industrial cloud
    - Zero-trust segmentation using the PA-220R ruggedized Next-Gen Firewall across IT and OT environments
    - Leveraging central management to increase administrative efficiency and provide cybersecurity and ICS network traffic intelligence to OT and IT
  • Realize the Promise of the SWIFT Customer Security Controls Recorded: Sep 4 2018 55 mins
    Lawrence Chin, Financial Services Security Architect, Palo Alto Networks
    Improve Your Cyber Hygiene

    Members of the Society for Worldwide Interbank Financial Telecommunications (SWIFT) cooperative had to self-attest to new mandatory security controls at the end of 2017. The next self-attestation will be required by year end 2018. After that point, SWIFT reserves the right to report non-compliance to counterparties and appropriate local regulators.

    How did your institution fare in its initial self-attestation to SWIFT’s security controls? If there was room for improvement,

    • Join this webinar to learn how to meet and/or exceed SWIFT mandatory and advisory security controls with Palo Alto Networks products
    • Hear about additional best practices that can further improve your cybersecurity posture.

    In the big picture, the SWIFT security controls and further best practices from Palo Alto Networks contribute to overall cyber hygiene, and should prove to be beneficial to all financial institutions - regardless of whether they are SWIFT members or not.
  • Realize the Promise of the SWIFT Customer Security Controls Recorded: Sep 4 2018 57 mins
    Lawrence Chin, Financial Services Security Architect, Palo Alto Networks
    Improve Your Cyber Hygiene

    Members of the Society for Worldwide Interbank Financial Telecommunications (SWIFT) cooperative had to self-attest to new mandatory security controls at the end of 2017. The next self-attestation will be required by year end 2018. After that point, SWIFT reserves the right to report non-compliance to counterparties and appropriate local regulators.

    How did your institution fare in its initial self-attestation to SWIFT’s security controls? If there was room for improvement,

    • Join this webinar to learn how to meet and/or exceed SWIFT mandatory and advisory security controls with Palo Alto Networks products
    • Hear about additional best practices that can further improve your cybersecurity posture.

    In the big picture, the SWIFT security controls and further best practices from Palo Alto Networks contribute to overall cyber hygiene, and should prove to be beneficial to all financial institutions - regardless of whether they are SWIFT members or not.
  • Interpreting the 2018 NSS Labs AEP 2.0 Test Recorded: Aug 31 2018 56 mins
    Mike Spanbauer, Vice President of Research Strategy, NSS Labs & Danny Milrad, Dir. of Product Marketing, Palo Alto Networks
    NSS Labs® recently published the results of its 2018 Advanced Endpoint Protection (AEP) 2.0 Group Test, which examines vendors’ ability to protect endpoints from malware, ransomware and exploits.

    In the test, Palo Alto Networks® Traps™ advanced endpoint protection achieved both high Security Effectiveness and low Total Cost of Ownership, earning a Recommended rating.

    Join this webinar to hear vice president of Research Strategy at NSS Labs, Mike Spanbauer, and director of Product Marketing at Palo Alto Networks, Danny Milrad, discuss:

    - Advanced endpoint protection must-haves
    - Understanding the AEP 2.0 test results
    - What a Recommended rating means to you
    - How Palo Alto Networks performed on the test
  • Interpreting the 2018 NSS Labs AEP 2.0 Test Recorded: Aug 31 2018 56 mins
    Mike Spanbauer, Vice President of Research Strategy, NSS Labs & Danny Milrad, Dir. of Product Marketing, Palo Alto Networks
    NSS Labs® recently published the results of its 2018 Advanced Endpoint Protection (AEP) 2.0 Group Test, which examines vendors’ ability to protect endpoints from malware, ransomware and exploits.

    In the test, Palo Alto Networks® Traps™ advanced endpoint protection achieved both high Security Effectiveness and low Total Cost of Ownership, earning a Recommended rating.

    Join this webinar to hear vice president of Research Strategy at NSS Labs, Mike Spanbauer, and director of Product Marketing at Palo Alto Networks, Danny Milrad, discuss:

    - Advanced endpoint protection must-haves
    - Understanding the AEP 2.0 test results
    - What a Recommended rating means to you
    - How Palo Alto Networks performed on the test
  • Medical Grade Security for your Unpatchable Medical Devices Recorded: Aug 23 2018 60 mins
    Mick Coady, PwC, and Matt Mellen, Palo Alto Networks
    Because security is often an afterthought when medical devices are designed and maintained by the manufacturer, they are the most vulnerable devices in a hospital’s network.

    The medical device community is beginning to improve the security of their products, but it will take years for legacy devices to be upgraded or replaced. Until then, healthcare organizations need to develop strategies for mitigating the cybersecurity risks these unpatchable devices pose to their patients and the organizations themselves.

    Join Matt Mellen, a healthcare security architect and former security lead for a hospital network, and Mick Coady, a partner in the Health Information Privacy and Security Practice at PricewaterhouseCoopers, as they discuss how to approach and mitigate the challenges associated with securing medical devices in hospital environments.

    In this webinar, you will discover:
    •The cybersecurity risks posed by unpatchable and hard-to-patch medical devices
    •How to successfully mitigate medical device security risks
    •Strategies you can implement today to secure medical devices
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: L’union fait la force; Résoudre le casse-tête de la sécurité avec Wildfire et Tr
  • Live at: Jun 23 2016 5:35 pm
  • Presented by: Bertrand Le Bail, Systems Engineer
  • From:
Your email has been sent.
or close