Hi [[ session.user.profile.firstName ]]

De Voordelen Van WildFire

De Voordelen Van WildFire
Recorded Jul 15 2016 3 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dilip Timal
Presentation preview: De Voordelen Van WildFire

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Addressing BYOD with new GlobalProtect features Aug 31 2017 2:00 pm UTC 60 mins
    Brian Tokuyoshi, Sr. Product Marketing Manager and Joby Menon, Product Line Manager, Palo Alto Networks
    Your user population consists of employees and contractors using a wide variety of corporate and BYOD devices. Getting your BYOD strategy into place requires providing the right types of access to each platform. New features with GlobalProtect can help you address BYOD.

    In this session, learn about the new Clientless VPN technology in GlobalProtect, and how it can be incorporated into your architecture. Find out about new integrations with mobile device management products such as AirWatch and MobileIron in order to secure traffic, control access to applications and protect data. Get an overview of the technology and see demonstrations of how it works.
  • Start Benefiting from PAN-OS 8.0 Now Aug 15 2017 4:00 pm UTC 45 mins
    Wiley Richardson, Security Engineer, Trainer and Cloud Architect at Cloud Harmonics
    You’ve heard the hype, now see for yourself the innovations that PAN-OS 8.0 brings to your network security. Attend this 30 minute webcast, “Start Benefiting from 8.0 Now,” to get a quick overview of the new features and enhancements PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Registrants will:

    •Learn about the key capabilities introduced by 8.0
    •See the value of the update to security deployments
    •Receive a voucher for 8.0 training course and VM-100 - $800 value

    Reserve your spot now, so you can start to take advantage of all 8.0 has to offer.
  • Phishing & Credential Abuse 201: Inside the Attack Aug 4 2017 9:00 am UTC 60 mins
    Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.
  • Phishing & Credential Abuse 201: Inside the Attack Aug 4 2017 2:00 am UTC 60 mins
    Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.
  • Disrupting Credential-based Attacks Aug 3 2017 9:00 am UTC 60 mins
    Martin Walter, Product Line Manager, Palo Alto Networks
    Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

    In this session, get details on:
    * Why the platform plays a critical role towards disrupting credential-based attacks
    * Preventing the theft of credentials, using new PAN-OS 8.0 technologies
    * Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
  • Disrupting Credential-based Attacks Aug 3 2017 2:00 am UTC 60 mins
    Martin Walter, Product Line Manager, Palo Alto Networks
    Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

    In this session, get details on:
    * Why the platform plays a critical role towards disrupting credential-based attacks
    * Preventing the theft of credentials, using new PAN-OS 8.0 technologies
    * Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
  • How does Credential Theft Affect Your Organization? Aug 2 2017 9:00 am UTC 60 mins
    Brian Tokuyoshi, Sr Product Marketing Manager, Palo Alto Networks
    The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

    In this session, hear about:
    * Credential theft industry research coverage
    * Industry analysis of the problem space
    * Application of the credential theft lifecycle in light of recent attacks
  • How does Credential Theft Affect Your Organization? Aug 2 2017 2:00 am UTC 60 mins
    Brian Tokuyoshi, Sr Product Marketing Manager, Palo Alto Networks
    The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

    In this session, hear about:
    * Credential theft industry research coverage
    * Industry analysis of the problem space
    * Application of the credential theft lifecycle in light of recent attacks
  • Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives Behind Aug 1 2017 9:00 am UTC 60 mins
    Jen Miller-Osborn, Unit 42 Threat Intelligence Analyst, Palo Alto Networks
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

    • Identify trends and techniques in methods used for credential theft and abuse.
    • Review how cyber criminals have changed their tactics to compromise networks.
    • Examine who is being targeted, and why.
    • Discuss techniques to stop credential leakage.
  • Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives Behind Aug 1 2017 2:00 am UTC 60 mins
    Jen Miller-Osborn, Unit 42 Threat Intelligence Analyst, Palo Alto Networks
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

    • Identify trends and techniques in methods used for credential theft and abuse.
    • Review how cyber criminals have changed their tactics to compromise networks.
    • Examine who is being targeted, and why.
    • Discuss techniques to stop credential leakage.
  • [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack Jul 27 2017 5:00 pm UTC 60 mins
    Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.
  • [Breach Prevention] Disrupting Credential-based Attacks Jul 26 2017 5:00 pm UTC 60 mins
    Martin Walter, Product Line Manager, Palo Alto Networks
    Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

    In this session, get details on:
    * Why the platform plays a critical role towards disrupting credential-based attacks
    * Preventing the theft of credentials, using new PAN-OS 8.0 technologies
    * Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
  • [Breach Prevention] How does Credential Theft Affect Your Organization? Jul 25 2017 5:00 pm UTC 60 mins
    Brian Tokuyoshi, Sr Product Marketing Manager, Palo Alto Networks
    The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

    In this session, hear about:
    * Credential theft industry research coverage
    * Industry analysis of the problem space
    * Application of the credential theft lifecycle in light of recent attacks
  • [Breach Prevention] Phishing & Credential Abuse 101: Exposing the Ecosystem Jul 24 2017 5:00 pm UTC 60 mins
    Jen Miller-Osborn, Unit 42 Threat Intelligence Analyst, Palo Alto Networks
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

    • Identify trends and techniques in methods used for credential theft and abuse.
    • Review how cyber criminals have changed their tactics to compromise networks.
    • Examine who is being targeted, and why.
    • Discuss techniques to stop credential leakage.
  • Enabling Cloud Security with Palo Alto Networks Recorded: Jul 18 2017 41 mins
    Tal Zehavi - Cloud Security Specialist & Keith Olsen - Systems Engineer
    As organizations look to offload more and more applications to the public cloud, security posture needs to remain a chief concern for the IT teams protecting these workloads. The “Shared Responsibility Model” employed by hosting services like AWS® and Azure® dictates that while the host is responsible for the security OF the cloud, customers are responsible for the security of their data IN the cloud. Palo Alto Networks® helps customers achieve this security through a platform designed to safely enable widely distributed enterprise workloads.

    In this webinar, we will discuss:

    - The security issues to consider when developing a cloud strategy.
    - How to use the Palo Alto Networks platform to achieve security policy parity across your on-premise, private and public cloud environments.
    - Governing SaaS application usage and protecting your data within sanctioned applications.
  • Palo Alto Networks – How to get most from your Splunk App with latest updates Recorded: Jul 13 2017 53 mins
    Paul Nguyen, Technical Business Development, Palo Alto Networks & Tom Heckman, SE Manager - Global Strategic Partners, Splunk
    As you read more and more in the media about cyber attacks and loss of sensitive data, you have to review internally how you are preventing attacks and keeping your data safe while reducing the attack surface at risk. Together, Palo Alto Networks and Splunk provide the tools and integration needed to be able to identify more unknown threats and convert them into known threats and therefore minimize the attack surface so your analyst are focused only on the most critical alerts. Learn how we extend the richnes and contextual view of your enterprise.

    Please join us as we give you an overview on the partnership with Splunk and Palo Alto Networks with a focus on the latest customer use cases, messaging, and enhancements of our Palo Alto Networks Splunk App available on Splunkbase. Learn all that we have added into our latest release with Autofocus and Traps integration and see a live demo of the Palo Alto Networks App for Splunk Enterprise. See why we are the #1 download on Splunkbase!
  • GDPR update - less than 1 year to May 2018 Recorded: Jul 12 2017 62 mins
    Greg Day, EMEA VP & CSO Palo Alto Networks
    The General Data Protection Regulation (GDPR) and the Network and Information Security (NIS) Directive will both be enforced as of May 2018. You may think you’re ready for these laws, but covered companies may need to improve the security of personal data they hold, and of their networks and information systems. Data breaches and security incidents will have to be reported. As they prepare for the GDPR and NIS, it is imperative that organisations understand their cybersecurity risks and invest appropriately. Greg Day, EMEA VP & CSO Palo Alto Networks, explains the security-related requirements.
  • How to Prevent Breaches through Application Controls Recorded: Jul 12 2017 34 mins
    Navneet Singh, Director, Product Marketing
    Employees are accessing any application they want, using work or personal devices, regardless of the business and security risks involved.

    What are you doing to protect your organization’s data?

    Join the webinar and discover:
    • How attackers use apps to infect and exfiltrate data
    • How to use app control the right way to prevent breaches
    • How to extend visibility and control to SaaS apps
  • Protect your organization from Petya Recorded: Jul 5 2017 37 mins
    Ryan Olson, Senior Director, Threat Intelligence & Scott Simkin, Senior Group Manager, Threat Intelligence Marketing
    On June 27, a new variant of Petya malware began circulating – first in Europe, then worldwide. Multiple organizations reported network outages, including hospitals, supermarkets, banks, government and critical infrastructure operators. Following the WanaCrypt0r attack, this second global ransomware campaign in recent months highlights the relentlessness of cybercrime, a growing threat that will continue to challenge organizations both now and in the future.

    Join our cybersecurity experts for an insightful webinar to learn:

    • How Petya exploits vulnerabilities and spreads across networks.
    • How Palo Alto Networks® Next-Generation Security Platform protects your organization from Petya through multiple prevention controls. 
    • Actionable steps to protect your organization against Petya and future ransomware campaigns.
  • [Dark Reading] How to Secure Endpoints from Ransomware & other Trending Attacks Recorded: Jun 30 2017 64 mins
    Ryan Olson - Intelligence Director & Dal Gemmell, Head of Endpoint Marketing at Palo Alto Networks
    Attackers have shifted their tactics. They’ve discovered new ways to re-engineer tactics to make them easier to execute, more evasive, and more likely to deceive targeted users. Combined with targeting platforms that organizations falsely consider more secure, these sophisticated attacks, including ransomware, are proving very damaging to unprepared organizations.

    In this webinar, you will discover:

    •Which new tactics attackers are now using against endpoints
    •What specific approach is most effective in defeating those tactics
    •How Palo Alto Networks helps our customers to secures their endpoints from ransomware and other attacks
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: De Voordelen Van WildFire
  • Live at: Jul 15 2016 1:40 pm
  • Presented by: Dilip Timal
  • From:
Your email has been sent.
or close