How to (effectively) prevent ransomware infections
Today’s security deployments are quickly becoming unmanageable. Multiple user interfaces, too many security policies, and mountains of data from many different sources create the complexity of today’s cyber security environment. Combined with the global shortage of security personnel this situation calls for streamlined management solutions that empower network security administrators to do more with less.
In this webinar you learn how Palo Alto Networks addresses today’s issues of network complexity, overwhelming data flows, and convoluted security rules with the Panorama network security management solution.
RecordedAug 26 201651 mins
Your place is confirmed, we'll send you email reminders
Dal Gemmell, Head of Traps Marketing and Matt Mellen Healthcare Security Architect, Palo Alto Networks
It turns out ransomware and endpoint attacks are NOT going away any time soon …
According to the 2017 HIMSS Healthcare IT Cybersecurity Study, nearly 90 percent of all U.S. respondents were targeted with a ransomware attack in the past year.
Our experts will help you get ahead of ransomware and endpoint attacks. Register for the webinar and learn:
•The current – and future – state of healthcare security.
•What your healthcare security executives and IT peers are doing to lower risks.
•How we can help improve your 2018 healthcare security strategy.
If you are planning to deploy GlobalProtect, attend this webinar and get an overview on important authentication use cases and integrations. This is an architect-level technical deep dive into GlobalProtect functionality, straight from the product experts. Join us and bring your technical questions for a Q&A session direct with the GlobalProtect product managers and technical engineers.
In this session, learn about how to deploy GlobalProtect with:
1.Two Factor Authentication (2FA) with RADIUS or SAML for On-Demand Remote Access VPN
2.Two Factor Authentication (2FA) with RADIUS or SAML and client certificate for Always-On VPN
3.MFA (Multi Factor Authentication) for privileged resource access
4.Transparent authentication for user-id with Internal Gateway
5.Group Mapping and User-ID for Security Policy and Visibility
Tim Riley, Business Dev., Francesco Vigo, Partner Architect, Palo Alto Networks & John Ferguson, Product Manager, ServiceNow
Security teams today commonly use a combination of email, spreadsheets, and phone calls to manage their incident response processes. This leads to average detection and containment times that are measured in days and weeks and can result in costly breaches.
The key to reducing detection and response times lies in automating basic tasks, identifying when threats target the assets that are most critical to the business, and allowing actions to be initiated from a single platform instead of dealing with multiple consoles or teams.
Join Tim Riley, Business Development and Francesco Vigo, Partner Architect from Palo Alto Networks and John Ferguson, Product Manager from ServiceNow to learn how to:
•Accelerate threat identification by combining ServiceNow® Security Operations with automated enrichment from Palo Alto Networks WildFire and AutoFocus
• Speed up decision-making with business context for security incidents
• Reduce time to eradicate by initiating Palo Alto Networks Next-Generation Firewall changes from within ServiceNow
Brian Tokuyoshi, Product Marketing, and Martin Walter, Product Management, Palo Alto Networks
Prevent Phishing and the Abuse of Stolen Credentials
In this session, we will present the unique attack life-cycle for credential-based attacks. Using real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse
Tal Zehavi, Palo Alto Networks Cloud Specialist, Eric DeBord, Azure Specialist, Microsoft
As organizations look to offload more and more applications to the public cloud, security posture needs to remain a chief concern for the IT teams protecting these workloads. The “Shared Responsibility Model” employed by Azure® dictates that while the host is responsible for the security OF the cloud, customers are responsible for the security of their data IN the cloud.
Palo Alto Networks® helps customers achieve this security through a platform designed to safely enable widely distributed enterprise workloads.
In this webinar, we will discuss:
- The security issues to consider when developing a cloud strategy
- How to use the Palo Alto Networks platform to achieve security policy parity across your on-premise, private and public cloud environments
- Azure network security best practices and architecture diagrams
- Steps on how to configure and manage Palo Alto in the cloud
Matt Keil, Director of Product Marketing, Public Cloud
Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivalled only by that of the early days of the Internet era. As was the case then, the speed of adoption often means that “good enough” security is viewed as acceptable.
With the underlying premise that the public cloud is someone else’s computer, and an extension of your network this session will cover public cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public cloud workloads and data.
Rinki Sethi, Senior Director, Information Security and Brian Tokuyoshi, Sr. Product Marketing Manager
Creating a culture of cybersecurity is critical for all organizations. Join the conversation with our own security pros to learn how they keep employees ahead of phishing attacks, share best practices for phishing education and explain how to use innovative technologies to strengthen cyber resilience.
Rick Howard, chief security officer at Palo Alto Networks
Join Rick Howard, CSO at Palo Alto Networks to learn about must-read books for all cybersecurity practitioners – be they from industry, government or academia — where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.
John Kindervag, Field Chief Technology Officer at Palo Alto Networks
Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.
In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world's only true cybersecurity strategy. He will show a Zero Trust Strategy will achieve tactical and operational goals. This session will demonstrate how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.
Wiley Richardson, Security Engineer, Trainer and Cloud Architect at Cloud Harmonics
Join us for our follow-up webcast with a focus on Authentication, Global Protect, and User ID enhancements to get a quick overview of SAML Authentication, Global Protect Clientless VPN and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Attendees will:
•Learn about the key capabilities introduced by 8.0
•See the value of the update to security deployments
•Receive a voucher for 8.0 training course - $500 value
The signs that the security market is ready for disruption are here. Join in discussion with Nir Zuk, Palo Alto Networks co-founder and CTO, on how the security market is evolving and maturing and ultimately, ready for disruption.
Stefaan Hinderyckx, Director Europe - Security at Dimension Data
The Internet of Things or IoT has been widely publicised by the media over recent years. The integration of IT, OT and IoT poses unique challenges to security leaders. Ranging from email spamming fridges to the end of the world as we know it. The reality is, we face a situation where some devices are becoming internet enabled just because they can. At the same time, we adopt internet devices with little thought of our data, because they offer accessing something in a way that makes it easier for us. So how will Dimension Data and Palo Alto networks deal with the "Internet of Threats"?
Wissam Ali-Ahmad Lead Solutions Architect, Technical Services for Global Strategic Alliances at Splunk
Targeted attacks — including advanced persistent threats (APTs) — and today’s sophisticated malware threats are one of the biggest challenges facing customer’s as the threats multiply and create unique compromises within their networks. This creates challenges for traditional security technologies to reliably identify these new class of threats. Even when a threat is detected, there is still the issue of slow response times and extended periods of exposure, as administrators typically need to manually coordinate and configure the necessary changes to their security infrastructure.
Please join Palo Alto Networks and Splunk as we work together to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis that addresses this challenge and delivers new tools to quickly identify and analyze this new class of threats. We will show you how this integration insures better threat response time, and how to automate the steps needed to block malicious sources and quarantine compromised devices you through how Palo Alto Networks and Splunk.
- Advanced security and visibility in the cloud, on premise, or hybrid model
- Accelerated threat response and enhanced threat detection
- Security visualization, monitoring and analysis
- Demo to show you how to identify ransomware and correlate IOC data through the app and use adaptive response to take actions
Matt Mellen, Healthcare Security Architect, Palo Alto Networks
Palo Alto Networks security platform provides hundreds of capabilities for reducing the attack surface of healthcare organizations - But which ones should you focus on implementing first? Join us for this webinar presenting the Healthcare Maturity Model, by Matt Mellen, a former security operations lead at a hospital in California. The maturity model outlines critical security capabilities that every healthcare organization should have deployed. A variety of security capabilities will be discussed in the context of healthcare environments, like SSL-decryption, geo-based blocking, DNS sinkholing and many more.
The security capabilities will be split into 4 levels of increasing ‘maturity’ in order to help healthcare orgs prioritize which should be implemented first (levels 1 and 2), and which are more appropriate in more mature security architectures (levels 3 and 4). In addition to helping you prioritize the security capabilities that should be enabled in your organization, you’ll get a better idea of the breadth of security functions that the security platform provides in a healthcare environment.
•Understand the overview of the security capabilities the security platform provides
•Prioritize enablement of security capabilities within your organization
Christopher Montgomery – Principal Systems Engineer at Proofpoint
Palo Alto Networks and Proofpoint: Combining threat intelligence and detection to prevent email based attacks and increase insight into user behaviour
Securing sensitive data has never been more challenging. Email remains the leading attack vector due to evolving techniques combined with sophisticated social engineering tricks. Security teams struggle to prevent attackers from breaching their companies; once the bad guys are through, they move across the network with stealth and impunity.
The API integration of Palo Alto Networks WildFire and Proofpoint TAP (Targeted Attack Protection) delivers a perfect balance of protection from attackers and malware entering the perimeter and how it travels across the network. A key aspect of the strategic partnership is how simple it is for a customer to enable the dual layers of protection. Join us for a discussion on how two best-of-breed security technologies have been united, resulting in comprehensive protection without the usual complexity.
A Comprehensive Enterprise Security Strategy and Approach are needed in the digital, mobile and cloud era. This Strategy and Approach nowadays needs to face the following challenges:
-EMBRACE HETEROGENEITY: Identity that transcends every application access across multiple devices.
-TRUST & ASSURANCE: Establish a new, rock solid security model from the data center to the device.
-CONSUMER-GRADE EXPERIENCE: Ensure ANY app can reach ANY device to best empower employees – beyond basic, individual productivity apps.
During this session we will be covering how VMware can help in this IT transition providing an End to End Intrinsic Security Solution to minimize risk while also reducing the potential impact in case of suffering an inffection and helping to provide a much quicker response.
Don´t try to secure virtualization, it is really more about using virtualization to secure!
Chandu Cheeti, Microsoft Cloud Strategy for SAP on Azure & Key Partnerships - EMEA
The journey to the Cloud is gaining momentum with businesses embracing digital transformation. A large part of making this a success relies on providing the best security available to businesses that are looking to transform. Learn how Microsoft is helping businesses adopt the benefits of the cloud and is working hand in glove with its key security partner Palo Alto Networks to provide the most comprehensive security solution available globally.
Global expansion, mobile workforces, and cloud computing are shifting the location of your users, applications and data. As these changes ripple through your organization, two questions arise:
1.Can you secure your remote offices and mobile workforce with the same security you use to protect your corporate location?
2.Can you do so in an more operationally efficient manner than the traditional device per location methodology?
GlobalProtect Cloud Service allows you to answer yes to both questions. GlobalProtect Cloud Service operationalizes the delivery of next-generation security across widely distributed organizations through a cloud-based security infrastructure that is based on our market leading next-generation firewall.
Join us for a heart pound, chest thumping, head spinning webinar on our wickedly cool cloud service.
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.