Hi [[ session.user.profile.firstName ]]

WildFire™ e Traps™ insieme per la massima sicurezza.

Gli endpoints continuano a rappresentare il bersaglio primario degli attacchi, soprattutto quando non sono connessi alla rete aziendale.

Dopo aver appurato i vantaggi derivanti dalla prevenzione perimetrale sei a conoscenza che puoi estendere la stessa protezione agli endpoint?

Guarda questo webinar per scoprire come Traps™ e WildFire™ operano in sinergia, e anche:

•Come le minacce moderne compromettono gli endpoints con exploit zero-day;
•Perché le attuali soluzioni endpoint non riescono ad impedire le violazioni di sicurezza;
•Come evitare che le minacce note e non note danneggino i tuoi sistemi.
Registrati qui per guardare questo webinar e riceverai maggiori informazioni sull'utilizzo combinato di WildFire™ e Traps™ per estendere le funzionalità di prevenzione di entrambe le soluzioni ai tuoi endpoints.
Recorded Jun 21 2016 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Alessio Agnello, System Engineer
Presentation preview: WildFire™ e Traps™ insieme per la massima sicurezza.

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Securing your apps and data outside of your perimeter Jun 13 2017 12:00 pm UTC 60 mins
    Rob van der Wouw, Security Consultant at RedLogic
    We have had overwhelming feedback on our previous session about starting to secure the software defined datacenter at the perimeter. We have decided to move to the next level and talk about securing your data and applications outside of your perimeter.

    Want to know more? Learn from our partner Redlogic who supported several customers to accomplish this journey.

    RedLogic is a young, professional IT infrastructure services company consisting of certified top professionals in security and ICT. Managing and deploying complex infrastructure and security.
  • Prevent Costly Data Leaks From SaaS Apps May 23 2017 8:00 am UTC 60 mins
    Anuj Sawani, Sr. Product Marketing Manager at Palo Alto Networks
    SaaS apps are now extensively adopted by organizations – some procured by IT, others adopted by the users themselves. You’re already likely witnessing large amounts of data being transferred between users and these apps. As corporate data moves to the cloud, the risk of a data leakage increases with users accessing enterprise apps on unmanaged devices or storing corporate data on risky, unsanctioned apps.

    Join this webinar to learn how to prevent data exposure and maintain compliance by protecting your data within enterprise SaaS apps and blocking unsanctioned apps. You’ll learn about:
    •A real-world customer journey for complete data security in SaaS.
    •Common threats leading to data leaks from popular SaaS apps.
    •Benefits of adopting a platform approach to SaaS security.
  • SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention] May 19 2017 2:00 am UTC 45 mins
    Charles Woo, Systems Engineer, Palo Alto Networks
    The first step for many organizations migrating to the cloud is the adoption of SaaS applications, such as Office 365, Box, Salesforce and many more. As an IT professional, this means you are giving permission to your users to store data in the cloud with corporate-approved services, such as OneDrive or SharePoint Online. The decision to move to the cloud is usually supported by a long list of cost and operational benefits. Infrastructure cost reduction? Check. Increased productivity? Check. License cost reduction? Check. But, have you thought about data governance and compliance, malware protection, and collaboration with external vendors? These are great questions to ask as you make this transition.

    Organizations look to reduce the threat surface exposed by SaaS applications as their data is now hosted in data centers that are not managed by them. Join this webinar to learn more about the evolution of the data center landscape and how to redefine your security strategy to cover the unique risks surfacing from the adoption of SaaS applications.
  • Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] May 18 2017 2:00 am UTC 60 mins
    Charles Woo, Systems Engineer, Palo Alto Networks
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] May 17 2017 2:00 am UTC 60 mins
    Michael Lam, Systems Engineer, Palo Alto Networks
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] May 16 2017 2:00 am UTC 45 mins
    Charles Woo, Systems Engineer, Palo Alto Networks
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.

    This webinar will cover:

    • Visibility: Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management: Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • Securely Enabling a Hybrid Data Center with Microsoft Azure May 15 2017 12:00 pm UTC 45 mins
    Matt Keil, Director of Product Marketing at Palo Alto Networks
    Microsoft® Azure™ is enabling a data center transformation that results in a hybrid architecture that combines your on premises resources and the Azure cloud. From a security perspective, your challenge remains: how to protect your applications and data, regardless of their location.

    Join us for this live webinar to learn how the VM-Series can securely enable a hybrid data center. At the end of the webinar, you will learn:
    •Security considerations when moving to Azure
    •Top 3 VM-Series recommendations to protect your data
    •Tips and techniques to streamline your efforts
  • Cyberattacken passieren - Gehackt werden muss nicht sein. May 12 2017 9:00 am UTC 60 mins
    Tobias Frigger, System Engineer at Palo Alto Networks
    Keine Ausreden mehr. Endlich antworten.

    Strenge Regeln und traditionelle Security-Ansätze können versteckte Bedrohungen in Ihrem Netzwerk nicht verhindern.

    Lernen Sie, wie unserer Security Lifecycle Review (SLR) Ihren Netzwerkverkehr analysiert und dann einen detaillierten Lagebericht einzig für Ihre Organisation generiert.

    In diesem Webinar werden Sie mehr über einige Applikationen und Bedrohungen erfahren, denen Sie ausgesetzt sind.
  • Auto Scaling Next-Gen Firewalls on AWS May 9 2017 11:00 am UTC 45 mins
    Matt Keil, Director of Product Marketing, Data Center and Warby Warburton, Manager, Technical Marketing Engineering
    Through integration with AWS services, like Auto Scaling and AWS Elastic Load Balancing (AWS ELB), you can now build a next-generation security infrastructure that will dynamically, yet independently, scale to protect your AWS workloads as their traffic patterns fluctuate. This architecture will allow you to reduce costs by utilizing the firewall capacities intelligently and efficiently based on user-defined metrics. By scaling the security separately from the application workloads, this solution allows each firewall to be identically configured and managed centrally, resulting in lower administrative costs.

    Join us for an educational webinar to learn how you can scale next-generation security using AWS Auto Scaling and ELB. Using native AWS Services and VM-Series automation features, you can now dynamically, yet independently scale the VM-Series next-generation firewalls on AWS.

    This webinar will cover
    • Auto Scaling the VM-Series architecture
    • Auto Scaling and ELB integration details
    • Alternative architectures for protecting many VPCs
  • Prepare for the Imminent Shifts in Endpoint Attacks May 4 2017 9:00 am UTC 60 mins
    Michael Moshiri, Director, Endpoint Protection, Palo Alto Networks
    The shifts in attackers’ tactics are easy to miss and will catch many organizations off-guard. Attackers have discovered new ways to re-engineer older tactics that are easier to execute and are perceived to be less risky by targeted users. Combined with targeting platforms that organizations falsely consider more secure, these new attacks are proving very damaging to unprepared organizations.

    Join this webcast to learn:
    - Vulnerabilities threat actors are now targeting most intensely
    - New tactics and techniques hackers are using against endpoints
    - Best practices Palo Alto Networks uses to secure its own endpoints
  • Prepare for the Imminent Shifts in Endpoint Attacks May 4 2017 2:00 am UTC 60 mins
    Michael Moshiri, Director, Endpoint Protection, Palo Alto Networks
    The shifts in attackers’ tactics are easy to miss and will catch many organizations off-guard. Attackers have discovered new ways to re-engineer older tactics that are easier to execute and are perceived to be less risky by targeted users. Combined with targeting platforms that organizations falsely consider more secure, these new attacks are proving very damaging to unprepared organizations.

    Join this webcast to learn:
    - Vulnerabilities threat actors are now targeting most intensely
    - New tactics and techniques hackers are using against endpoints
    - Best practices Palo Alto Networks uses to secure its own endpoints
  • The State of Security for CIOs and CSOs May 2 2017 6:30 pm UTC 60 mins
    Rick Howard, Chief Security Officer, Palo Alto Networks
    Kick-Start a Radical Change in the Evolution of Cybersecurity

    Senior government and education officials are prime for the next evolution in cybersecurity. Although network defenders remain lockstep in outdated best practices, CIOs and CSOs are moving away from the coveted defense-in-depth strategies of the past and looking forward to more effective measures to implement the Cyber Kill Chain™ model.

    In this C-level webinar, the CSO of Palo Alto Networks®, Rick Howard, will discuss how CIOs and CSOs can more effectively orchestrate their enterprise security posture. Rick will review the state of enterprise cyber defense and provide insight for executives on:

    • Why the defense-in-depth model failed.
    • Why its replacement, the Cyber Kill Chain, hasn’t realized its full potential.
    • How to shift focus to automatic enterprise security orchestration.
    • How to influence the board and radically change thinking from the top down.

    Join us to learn more about this new and necessary direction in the evolution of cybersecurity.
  • Prepare for the Imminent Shifts in Endpoint Attacks May 2 2017 5:00 pm UTC 60 mins
    Michael Moshiri, Director, Endpoint Protection; Rinki Sethi, Sr. Director of Info Security; Bryan Lee, Unit 42 Threat Analyst
    The shifts in attackers’ tactics are easy to miss and will catch many organizations off-guard. Attackers have discovered new ways to re-engineer older tactics that are easier to execute and are perceived to be less risky by targeted users. Combined with targeting platforms that organizations falsely consider more secure, these new attacks are proving very damaging to unprepared organizations.

    Palo Alto Networks Michael Moshiri hosts colleagues Rinki Sethi, Senior Director of Information Security, and Bryan Lee, Unit 42 Threat Intelligence Analyst, in an exclusive webinar focusing on:

    - Vulnerabilities threat actors are now targeting most intensely
    - New tactics and techniques hackers are using against endpoints
    - Best practices Palo Alto Networks uses to secure its own endpoints
  • Next-generation Security for the Public Cloud May 2 2017 8:00 am UTC 60 mins
    Matt Keil, Director of Product Marketing at Palo Alto Networks
    As more and more organizations move their workloads to the public cloud, security remains a top concern because cybercriminals do not care whether your applications and data reside in your datacenter or in the cloud. Their goal is to steal data or computing resources by gaining access to the network, then moving laterally, potentially to the cloud to execute their goal.

    Join us for this webinar to learn how the VM-Series protects your public cloud deployment with the same next-generation firewall and threat prevention features available in our physical appliances.

    The webinar will cover:
    • Overview of the VM-Series next-generation firewall
    • How the VM-Series prevents cyberattacks in the public cloud
    • Key differences between the VM-Series and other cloud security offerings
  • Prevent Costly Data Leaks From SaaS Apps Apr 27 2017 9:00 am UTC 60 mins
    Anuj Sawani, Sr. Product Marketing Manager at Palo Alto Networks
    SaaS apps are now extensively adopted by organizations – some procured by IT, others adopted by the users themselves. You’re already likely witnessing large amounts of data being transferred between users and these apps. As corporate data moves to the cloud, the risk of a data leakage increases with users accessing enterprise apps on unmanaged devices or storing corporate data on risky, unsanctioned apps. 
     
    Join this webinar to learn how to prevent data exposure and maintain compliance by protecting your data within enterprise SaaS apps and blocking unsanctioned apps. You’ll learn about: 
    •A real-world customer journey for complete data security in SaaS.
    •Common threats leading to data leaks from popular SaaS apps.
    •Benefits of adopting a platform approach to SaaS security.
  • Prevent Costly Data Leaks From SaaS Apps Apr 27 2017 1:00 am UTC 60 mins
    Anuj Sawani, Sr. Product Marketing Manager at Palo Alto Networks
    SaaS apps are now extensively adopted by organizations – some procured by IT, others adopted by the users themselves. You’re already likely witnessing large amounts of data being transferred between users and these apps. As corporate data moves to the cloud, the risk of a data leakage increases with users accessing enterprise apps on unmanaged devices or storing corporate data on risky, unsanctioned apps. 
     
    Join this webinar to learn how to prevent data exposure and maintain compliance by protecting your data within enterprise SaaS apps and blocking unsanctioned apps. You’ll learn about: 
    •A real-world customer journey for complete data security in SaaS.
    •Common threats leading to data leaks from popular SaaS apps.
    •Benefits of adopting a platform approach to SaaS security.
  • Tackle Your Toughest Security Challenges at Ignite 2017 Apr 25 2017 4:00 pm UTC 30 mins
    Joerg Sieber, Director, Product Marketing, Palo Alto Networks
    Join this webinar for a sneak preview of the content you can expect at Ignite 2017 in Vancouver, BC, Canada, June 12-15, 2017. This year will be the biggest and most advanced Ignite yet! We are expecting over 4,000 security experts gathering in beautiful Vancouver to tackle their toughest security challenges through a four-day program of hands-on educational sessions, peer-to-peer networking and multiple opportunities to explore all the capabilities and technologies of the Palo Alto Networks Next-Generation Security Platform, which is designed to put an end to the era of breaches by safely enabling applications and providing cyberthreat prevention measures at all steps in the cyberattack lifecycle. Space is limited, and you won’t want to miss this unique event, so sign up today at www.paloaltonetworksignite.com
  • Attacks Happen—Breaches Don't Have To. Learn about the Security Lifecycle Review Apr 25 2017 12:00 pm UTC 60 mins
    Jay Kane, VP Cyber Security & Mike Semaniuk, CISSP Systems Engineer, Palo Alto Networks
    Excuses stop. Answers start.

    Strict policies and solid security measures can’t eliminate hidden threats in your systems. Learn how our Security Lifecycle Review (SLR) examines your network traffic and then generates a comprehensive report unique to your organization.

    In this webinar, you’ll discover some of the types of applications and threats exposing vulnerabilities in your security’s posture.

    There’s no need for excuses. Register now and see what’s really happening on your network.
  • Prevent Costly Data Leaks From SaaS Apps Recorded: Apr 20 2017 48 mins
    Anuj Sawani, Sr. Product Marketing Manager at Palo Alto Networks
    SaaS apps are now extensively adopted by organizations – some procured by IT, others adopted by the users themselves. You’re already likely witnessing large amounts of data being transferred between users and these apps. As corporate data moves to the cloud, the risk of a data leakage increases with users accessing enterprise apps on unmanaged devices or storing corporate data on risky, unsanctioned apps. 
     
    Join this webinar to learn how to prevent data exposure and maintain compliance by protecting your data within enterprise SaaS apps and blocking unsanctioned apps. You’ll learn about: 
    •A real-world customer journey for complete data security in SaaS.
    •Common threats leading to data leaks from popular SaaS apps.
    •Benefits of adopting a platform approach to SaaS security.
  • CyberSecurity-Defense & Homeland Progress & Best Practices 2017 Recorded: Apr 19 2017 59 mins
    Department of Homeland Security, U.S. Air Force Cyber, Palo Alto Networks, and more
    On-demand webinar with the Federal Executive Forum featuring government and industry panelists highlighting best practices through the Federal Government Market.

    PROGRAM DISCUSSES:
    • Progress Report on CyberSecurity in Government
    • Top Priorities & Best Practices
    • Challenges still to overcome
    • Lessons Learned
    • A Vision for The Future in CyberSecurity

    GOVERNMENT & INDUSTRY PANELISTS:
    *** Lt. Gen. J. Kevin McLaughlin, U.S. Air Force, Deputy Commander, USCYBERCOM
    *** Tamara Lilly, Deputy Chief Information Security Officer, Department of Homeland Security
    *** Peter Kim, Chief Information Security Officer, U.S. Air Force Cyber
    *** Ryan Gillis, Cybersecurity Strategy & Global Policy, Palo Alto Networks
    *** Ralph Kahn, Vice President of Federal, Tanium
    *** Scott Gray, Senior Vice President, Leidos
Webcasts and Videos
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content — by user, not just by IP address. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control threats and applications — regardless of port, protocol, evasive tactic, or SSL encryption — and scan content to stop threats and prevent data leakage. Palo Alto Networks delivers proven threat prevention combining IPS, anti-malware, URL, file and content filtering in a single integrated engine supported by one of the industry’s most prolific vulnerability research teams.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: WildFire™ e Traps™ insieme per la massima sicurezza.
  • Live at: Jun 21 2016 8:00 am
  • Presented by: Alessio Agnello, System Engineer
  • From:
Your email has been sent.
or close