Hi [[ session.user.profile.firstName ]]

De Voordelen Van WildFire

De Voordelen Van WildFire
Recorded Jul 15 2016 3 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dilip Timal
Presentation preview: De Voordelen Van WildFire

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Top 10 Public Cloud Security Recommendations Oct 25 2017 2:00 pm UTC 45 mins
    Matt Keil, Director of Product Marketing, Public Cloud
    Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivalled only by that of the early days of the Internet era. As was the case then, the speed of adoption often means that “good enough” security is viewed as acceptable.

    With the underlying premise that the public cloud is someone else’s computer, and an extension of your network this session will cover public cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public cloud workloads and data.
  • Consider a Career in Cybersecurity Oct 20 2017 5:00 pm UTC 60 mins
    Wendy Barnes, Head of Human Resources at Palo Alto Networks
    Join Palo Alto Networks to learn our best tips on how to land a job in cybersecurity.
  • Cybersecurity in the Workplace is Everyone’s Business Oct 19 2017 5:00 pm UTC 60 mins
    Rinki Sethi, Senior Director, Information Security and Brian Tokuyoshi, Sr. Product Marketing Manager
    Creating a culture of cybersecurity is critical for all organizations. Join the conversation with our own security pros to learn how they keep employees ahead of phishing attacks, share best practices for phishing education and explain how to use innovative technologies to strengthen cyber resilience.
  • Essential Reading for the Security Professional Oct 18 2017 5:00 pm UTC 60 mins
    Rick Howard, chief security officer at Palo Alto Networks
    Join Rick Howard, CSO at Palo Alto Networks to learn about must-read books for all cybersecurity practitioners – be they from industry, government or academia — where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.
  • Win the Cyberwar with Zero Trust Oct 17 2017 5:00 pm UTC 60 mins
    John Kindervag, Field Chief Technology Officer at Palo Alto Networks
    Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.

    In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world's only true cybersecurity strategy. He will show a Zero Trust Strategy will achieve tactical and operational goals. This session will demonstrate how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.
  • Start Benefiting from PAN-OS 8.0 with User-ID and Global Protect Oct 17 2017 4:00 pm UTC 45 mins
    Wiley Richardson, Security Engineer, Trainer and Cloud Architect at Cloud Harmonics
    Join us for our follow-up webcast with a focus on Authentication, Global Protect, and User ID enhancements to get a quick overview of SAML Authentication, Global Protect Clientless VPN and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Attendees will:

    •Learn about the key capabilities introduced by 8.0
    •See the value of the update to security deployments
    •Receive a voucher for 8.0 training course - $500 value
  • Disrupting the Cybersecurity Status Quo Oct 16 2017 5:00 pm UTC 60 mins
    Nir Zuk, Palo Alto Networks co-founder and CTO
    The signs that the security market is ready for disruption are here. Join in discussion with Nir Zuk, Palo Alto Networks co-founder and CTO, on how the security market is evolving and maturing and ultimately, ready for disruption.
  • The end of the world as we know it? How to tackle security risks in IoT Oct 6 2017 7:00 am UTC 60 mins
    Stefaan Hinderyckx, Director Europe - Security at Dimension Data
    The Internet of Things or IoT has been widely publicised by the media over recent years. The integration of IT, OT and IoT poses unique challenges to security leaders. Ranging from email spamming fridges to the end of the world as we know it. The reality is, we face a situation where some devices are becoming internet enabled just because they can. At the same time, we adopt internet devices with little thought of our data, because they offer accessing something in a way that makes it easier for us. So how will Dimension Data and Palo Alto networks deal with the "Internet of Threats"?
  • Teaming Together to Prevent Attacks and Protect Your Data Oct 5 2017 12:00 pm UTC 60 mins
    Wissam Ali-Ahmad Big Data, Security & Cloud Architect, Development Manager & Agile Software Engineer at Splunk
    Targeted attacks — including advanced persistent threats (APTs) — and today’s sophisticated malware threats are one of the biggest challenges facing customer’s as the threats multiply and create unique compromises within their networks. This creates challenges for traditional security technologies to reliably identify these new class of threats. Even when a threat is detected, there is still the issue of slow response times and extended periods of exposure, as administrators typically need to manually coordinate and configure the necessary changes to their security infrastructure.

    Please join Palo Alto Networks and Splunk as we work together to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis that addresses this challenge and delivers new tools to quickly identify and analyze this new class of threats. We will show you how this integration insures better threat response time, and how to automate the steps needed to block malicious sources and quarantine compromised devices you through how Palo Alto Networks and Splunk.

    Key Benefits:
    - Advanced security and visibility in the cloud, on premise, or hybrid model
    - Accelerated threat response and enhanced threat detection
    - Security visualization, monitoring and analysis
    - Demo to show you how to identify ransomware and correlate IOC data through the app and use adaptive response to take actions
  • A Maturity Model for Healthcare Cybersecurity Oct 4 2017 5:00 pm UTC 60 mins
    Matt Mellen, Healthcare Security Architect, Palo Alto Networks
    Palo Alto Networks security platform provides hundreds of capabilities for reducing the attack surface of healthcare organizations - But which ones should you focus on implementing first? Join us for this webinar presenting the Healthcare Maturity Model, by Matt Mellen, a former security operations lead at a hospital in California. The maturity model outlines critical security capabilities that every healthcare organization should have deployed. A variety of security capabilities will be discussed in the context of healthcare environments, like SSL-decryption, geo-based blocking, DNS sinkholing and many more.

    The security capabilities will be split into 4 levels of increasing ‘maturity’ in order to help healthcare orgs prioritize which should be implemented first (levels 1 and 2), and which are more appropriate in more mature security architectures (levels 3 and 4). In addition to helping you prioritize the security capabilities that should be enabled in your organization, you’ll get a better idea of the breadth of security functions that the security platform provides in a healthcare environment.

    Learning Objectives:
    •Understand the overview of the security capabilities the security platform provides
    •Prioritize enablement of security capabilities within your organization
  • Combining threat intelligence and detection to prevent email based attacks Oct 4 2017 2:00 pm UTC 60 mins
    Tim Ricketts, Senior Sales Engineer at Proofpoint
    Palo Alto Networks and Proofpoint: Combining threat intelligence and detection to prevent email based attacks and increase insight into user behaviour

    Securing sensitive data has never been more challenging. Email remains the leading attack vector due to evolving techniques combined with sophisticated social engineering tricks. Security teams struggle to prevent attackers from breaching their companies; once the bad guys are through, they move across the network with stealth and impunity.

    The API integration of Palo Alto Networks WildFire and Proofpoint TAP (Targeted Attack Protection) delivers a perfect balance of protection from attackers and malware entering the perimeter and how it travels across the network. A key aspect of the strategic partnership is how simple it is for a customer to enable the dual layers of protection. Join us for a discussion on how two best-of-breed security technologies have been united, resulting in comprehensive protection without the usual complexity.
  • Cybersecurity in the Digital, Mobile & Cloud Era Oct 3 2017 8:00 am UTC 60 mins
    Ghaleb Zekri, Security Architect at VMware
    A Comprehensive Enterprise Security Strategy and Approach are needed in the digital, mobile and cloud era. This Strategy and Approach nowadays needs to face the following challenges:

    -EMBRACE HETEROGENEITY: Identity that transcends every application access across multiple devices.
    -TRUST & ASSURANCE: Establish a new, rock solid security model from the data center to the device.
    -CONSUMER-GRADE EXPERIENCE: Ensure ANY app can reach ANY device to best empower employees – beyond basic, individual productivity apps.

    During this session we will be covering how VMware can help in this IT transition providing an End to End Intrinsic Security Solution to minimize risk while also reducing the potential impact in case of suffering an inffection and helping to provide a much quicker response.

    Don´t try to secure virtualization, it is really more about using virtualization to secure!
  • Securing your digital transformation Oct 2 2017 9:00 am UTC 60 mins
    Chandu Cheeti, Microsoft Cloud Strategy for SAP on Azure & Key Partnerships - EMEA
    The journey to the Cloud is gaining momentum with businesses embracing digital transformation. A large part of making this a success relies on providing the best security available to businesses that are looking to transform. Learn how Microsoft is helping businesses adopt the benefits of the cloud and is working hand in glove with its key security partner Palo Alto Networks to provide the most comprehensive security solution available globally.
  • Securing Your Global Workforce With GlobalProtect Cloud Service Sep 27 2017 4:00 pm UTC 60 mins
    Brian Tokuyoshi, Product Marketing Manager
    Global expansion, mobile workforces, and cloud computing are shifting the location of your users, applications and data. As these changes ripple through your organization, two questions arise:

    1.Can you secure your remote offices and mobile workforce with the same security you use to protect your corporate location?
    2.Can you do so in an more operationally efficient manner than the traditional device per location methodology?

    GlobalProtect Cloud Service allows you to answer yes to both questions. GlobalProtect Cloud Service operationalizes the delivery of next-generation security across widely distributed organizations through a cloud-based security infrastructure that is based on our market leading next-generation firewall.

    Join us for a heart pound, chest thumping, head spinning webinar on our wickedly cool cloud service.
  • Next-Generation (SOC) Security Operation Center Sep 26 2017 5:00 pm UTC 60 mins
    Rinki Sethi, Sr. Director, Information Security and Matt Mellen, Security Architect, Palo Alto Networks
    Security Operations Centers, or SOCs, were invented to enable ease of collaboration among security personnel across different technologies and location, providing a full view of an attack. Most traditional SOC practices and tools, where established in a time when cyberattacks were primarily manual in nature. Nowadays, machine-based automated cyberattacks, with multi-steps approach leveraging variety of entry points are the norm and are challenging enterprises to ‘re-think’ their SOC and InfoSec team’s strategy.

    Join Matt Mellen from our PMM team, and Rinki Sethi, who leads our InfoSec team, for an educational webinar on defining and building your Next-Generation SOC, sharing insights and providing best practice from our own experiences.

    Join this information session to understand:

    •Why traditional SOCs fail.
    •What defines a Next-Gen SOC.
    •How to shift in focus from detection to prevention
    •The business value of building a Next-Gen SOC in your organization.
  • Start Benefiting from PAN-OS 8.0 with Panorama and Networking Enhancements Recorded: Sep 19 2017 40 mins
    Wiley Richardson, Security Engineer, Trainer and Cloud Architect at Cloud Harmonics
    Join us for our follow-up webcast with a focus on Panorama and Networking enhancements to get a quick overview of software deployment, integration architecture and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Registrants will:

    •Learn about the key capabilities introduced by 8.0
    •See the value of the update to security deployments
    •Receive a voucher for 8.0 training course - $500 value.
  • How Securing SaaS Applications Contributes to GDPR Compliance Recorded: Sep 11 2017 42 mins
    Danielle Kriz and Anuj Sawani from Palo Alto Networks
    In less than a year (May 28, 2018) the General Data Protection Regulation (GDPR) becomes law in Europe. With the exponential rise in the use of SaaS applications, organizations that process the personal data of EU residents need to be able to maintain compliance with the GDPR while keeping data secure in the cloud.

    We invite you to join us for a live webinar on Monday, September 11 in which we zoom in on how our platform, with its SaaS Security service, Aperture, can help your organization meet the upcoming requirements.

    Our policy team expert, Danielle Kriz, and our product team expert, Anuj Sawani, team up to provide an overview of the GDPR—in particular its provisions related to securing personal data- and how Aperture can be used to address potential compliance issues. We will also provide a quick overview of how Aperture fits with EU compliance requirements when processing personal data. .

    After the presentation, we will have some time for questions and answers with our experts.
  • Disrupting Credential-based Attacks Recorded: Sep 7 2017 27 mins
    Brian Tokuyoshi, Product Marketing, and Martin Walter, Product Management, Palo Alto Networks
    Prevent Phishing and the Abuse of Stolen Credentials

    In this session, we will present the unique attack life-cycle for credential-based attacks. Using real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse
  • Prepare for the Imminent Shifts in Endpoint Attacks Recorded: Sep 4 2017 63 mins
    Michael Moshiri, Director, Endpoint Protection, Palo Alto Networks
    The shifts in attackers’ tactics are easy to miss and will catch many organizations off-guard. Attackers have discovered new ways to re-engineer older tactics that are easier to execute and are perceived to be less risky by targeted users. Combined with targeting platforms that organizations falsely consider more secure, these new attacks are proving very damaging to unprepared organizations.

    Join this webcast to learn:
    - Vulnerabilities threat actors are now targeting most intensely
    - New tactics and techniques hackers are using against endpoints
    - Best practices Palo Alto Networks uses to secure its own endpoints
  • Addressing BYOD with new GlobalProtect features Recorded: Aug 31 2017 44 mins
    Brian Tokuyoshi, Sr. Product Marketing Manager and Joby Menon, Product Line Manager, Palo Alto Networks
    Your user population consists of employees and contractors using a wide variety of corporate and BYOD devices. Getting your BYOD strategy into place requires providing the right types of access to each platform. New features with GlobalProtect can help you address BYOD.

    In this session, learn about the new Clientless VPN technology in GlobalProtect, and how it can be incorporated into your architecture. Find out about new integrations with mobile device management products such as AirWatch and MobileIron in order to secure traffic, control access to applications and protect data. Get an overview of the technology and see demonstrations of how it works.
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: De Voordelen Van WildFire
  • Live at: Jul 15 2016 1:40 pm
  • Presented by: Dilip Timal
  • From:
Your email has been sent.
or close