Hi [[ session.user.profile.firstName ]]

Traps - Pure Focus On Prevention

Traps - Pure Focus On Prevention
Recorded Jul 15 2016 2 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mathijs Nienhuis
Presentation preview: Traps - Pure Focus On Prevention

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Auto Scaling Next-Gen Firewalls on AWS Jun 5 2017 1:00 pm UTC 45 mins
    Matt Keil, Director of Product Marketing, Data Center and Warby Warburton, Manager, Technical Marketing Engineering
    Through integration with AWS services, like Auto Scaling and AWS Elastic Load Balancing (AWS ELB), you can now build a next-generation security infrastructure that will dynamically, yet independently, scale to protect your AWS workloads as their traffic patterns fluctuate. This architecture will allow you to reduce costs by utilizing the firewall capacities intelligently and efficiently based on user-defined metrics. By scaling the security separately from the application workloads, this solution allows each firewall to be identically configured and managed centrally, resulting in lower administrative costs.

    Join us for an educational webinar to learn how you can scale next-generation security using AWS Auto Scaling and ELB. Using native AWS Services and VM-Series automation features, you can now dynamically, yet independently scale the VM-Series next-generation firewalls on AWS.

    This webinar will cover
    • Auto Scaling the VM-Series architecture
    • Auto Scaling and ELB integration details
    • Alternative architectures for protecting many VPCs
  • The value of Next Generation Security Platform May 31 2017 12:00 pm UTC 45 mins
    Fred Streefland
    The combination of complex, modern IT environments and a rapidly evolving threat landscape has left many businesses challenged to control costs while effectively protecting the systems on which their operations depend. In many cases, the challenges are brought about by the combination of too many disparate security solutions that do not share context and insufficient time and/or expertise.

    To address these challenges, organisations of all shapes and sizes are looking at ways to consolidate their security infrastructure to improve their security posture and reduce their total cost of ownership.

    Please join us for a webinar where we’ll discuss how Palo Alto Networks’ Next-Generation Security Platform can enable your organization to:

    1.Reduce the threat footprint
    2.Prevent known and unknown attacks.
    3.Tie policies to users.
  • Securely Enabling a Hybrid Data Center with Microsoft Azure May 30 2017 12:00 pm UTC 45 mins
    Matt Keil, Director of Product Marketing at Palo Alto Networks
    Microsoft® Azure™ is enabling a data center transformation that results in a hybrid architecture that combines your on premises resources and the Azure cloud. From a security perspective, your challenge remains: how to protect your applications and data, regardless of their location.

    Join us for this live webinar to learn how the VM-Series can securely enable a hybrid data center. At the end of the webinar, you will learn:
    •Security considerations when moving to Azure
    •Top 3 VM-Series recommendations to protect your data
    •Tips and techniques to streamline your efforts
  • De waarde van Next Generation Security Platform May 29 2017 12:00 pm UTC 60 mins
    Fred Streefland
    De combinatie van complexe, moderne IT-omgevingen en een snel ontwikkelende bedreigingen maakt het voor veel bedrijven een uitdaging om kosten laag te houden en tegelijk de systemen te beschermen waarvan hun werk afhankelijk is.

    In veel gevallen zijn de uitdagingen het resultaat van te veel verschillende beveiligingsoplossingen die geen samenhang hebben in combinatie met een gebrek aan tijd en/of expertise.

    Organisaties in alle soorten en maten gaan deze uitdagingen aan door te zoeken naar manieren om hun beveiligingsinfrastructuur te bundelen, zodat ze hun beveiligingsbeleid kunnen verbeteren en de totale eigendomskosten (TCO) kunnen verlagen.

    Neem deel aan onze webinar waar we bespreken hoe het Next-Generation Security Platform van Palo Alto Networks uw organisatie in staat stelt om:

    - De bedreigings “footprint” te verkleinen
    - Bekende en onbekende aanvallen te voorkomen
    - Beleid aan gebruikers te verbinden
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you May 26 2017 9:00 am UTC 45 mins
    Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • Palo Alto Networks Next Generation Endpoint Solution Traps™ May 26 2017 8:00 am UTC 45 mins
    Paul Wilcox
    You are invited to join this live webinar for an overview of Palo Alto Networks® Traps™ advanced endpoint protection and learn about this market-leading solution that provides multi-method protection against known and unknown threats.

    Hosted by Paul Wilcox, APAC Sales Director for Palo Alto Networks Cybersecurity Solutions Group, you will learn why Traps is the most effective solution on the market today to address the current threat landscape, including:

    •How it effectively prevent attacks against exploits and malware – such as ransomware
    •An overview of the unique approach Traps takes to endpoint security
    •How legacy antivirus is no longer effective enough
    •How Traps can replace your existing legacy antivirus software
    Included in this live webinar will be a live demonstration of Traps in action.
  • SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention] May 26 2017 2:00 am UTC 45 mins
    Charles Woo, Systems Engineer, Palo Alto Networks
    The first step for many organizations migrating to the cloud is the adoption of SaaS applications, such as Office 365, Box, Salesforce and many more. As an IT professional, this means you are giving permission to your users to store data in the cloud with corporate-approved services, such as OneDrive or SharePoint Online. The decision to move to the cloud is usually supported by a long list of cost and operational benefits. Infrastructure cost reduction? Check. Increased productivity? Check. License cost reduction? Check. But, have you thought about data governance and compliance, malware protection, and collaboration with external vendors? These are great questions to ask as you make this transition.

    Organizations look to reduce the threat surface exposed by SaaS applications as their data is now hosted in data centers that are not managed by them. Join this webinar to learn more about the evolution of the data center landscape and how to redefine your security strategy to cover the unique risks surfacing from the adoption of SaaS applications.
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you May 26 2017 1:00 am UTC 45 mins
    Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • New Traps v4.0: Advancing Endpoint Security, Again! May 25 2017 5:00 pm UTC 60 mins
    Michael Moshiri, Director, Endpoint Protection, Palo Alto Networks
    We’re excited to announce the availability of the new release of Traps™ advanced endpoint protection, version 4.0. This release is packed with new features and expanded multi-method prevention capabilities that deliver unsurpassed protection against known and unknown threats.

    Join us for a webinar to learn about these new capabilities and improvements in Traps v4.0, including:

    • Support for macOS™ and Android™
    • Protection from malicious macros
    • Prevention of script-based attacks
    • Exploit kit fingerprinting protection
    • Kernel privilege escalation protection

    Plus much more...
  • Next-generation Security for the Public Cloud May 25 2017 8:00 am UTC 60 mins
    Matt Keil, Director of Product Marketing at Palo Alto Networks
    As more and more organizations move their workloads to the public cloud, security remains a top concern because cybercriminals do not care whether your applications and data reside in your datacenter or in the cloud. Their goal is to steal data or computing resources by gaining access to the network, then moving laterally, potentially to the cloud to execute their goal.

    Join us for this webinar to learn how the VM-Series protects your public cloud deployment with the same next-generation firewall and threat prevention features available in our physical appliances.

    The webinar will cover:
    • Overview of the VM-Series next-generation firewall
    • How the VM-Series prevents cyberattacks in the public cloud
    • Key differences between the VM-Series and other cloud security offerings
  • Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] May 25 2017 2:00 am UTC 60 mins
    Charles Woo, Systems Engineer, Palo Alto Networks
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you Recorded: May 24 2017 45 mins
    Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Recorded: May 24 2017 53 mins
    Michael Lam, Systems Engineer, Palo Alto Networks
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • Credential Theft: A Perspective From the FBI & Unit 42 Threat Intel Team Recorded: May 23 2017 62 mins
    SSA John Caruthers, FBI & Jen Miller-Osborn Palo Alto Networks
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join the FBI and our own Unit 42 threat intelligence team as they present their insightful perspective on the cyberthreat landscape in 2017, with an emphasis on credential-based attacks and phishing. In addition to presenting their unique attack lifecycle, they will:

    * Identify trends and techniques in methods used for credential theft and abuse.
    * Review how cybercriminals have changed their tactics to compromise networks.
    * Examine who is being targeted, and why.
    * Discuss techniques to stop credential leakage.
    * Review the FBI’s role in combating this destructive attack.

    Defending against cyberattacks is tough enough, especially when attackers pose as authenticated users on your network.

    Join the FBI and Palo Alto Networks® Unit 42 to learn what to do when you discover intruders on your network, and how to prevent their attacks from succeeding
  • Prevent Costly Data Leaks From SaaS Apps Recorded: May 23 2017 48 mins
    Anuj Sawani, Sr. Product Marketing Manager at Palo Alto Networks
    SaaS apps are now extensively adopted by organizations – some procured by IT, others adopted by the users themselves. You’re already likely witnessing large amounts of data being transferred between users and these apps. As corporate data moves to the cloud, the risk of a data leakage increases with users accessing enterprise apps on unmanaged devices or storing corporate data on risky, unsanctioned apps.

    Join this webinar to learn how to prevent data exposure and maintain compliance by protecting your data within enterprise SaaS apps and blocking unsanctioned apps. You’ll learn about:
    •A real-world customer journey for complete data security in SaaS.
    •Common threats leading to data leaks from popular SaaS apps.
    •Benefits of adopting a platform approach to SaaS security.
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Recorded: May 23 2017 43 mins
    Charles Woo, Systems Engineer, Palo Alto Networks
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.

    This webinar will cover:

    • Visibility: Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management: Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • [Video Interview] Understanding the Role of Stolen Credentials in Data Breaches Recorded: May 16 2017 21 mins
    Josh Downs, BrightTALK & Alexander Hinchliffe, Threat Intelligence Analyst at Unit 42, Palo Alto Networks
    Protecting user identities and preventing phishing attacks are key tactical priorities for today’s security professional. The majority of breaches involve password theft at some stage of the attack. Nearly two-thirds of the breaches analyzed by Verizon in the 2016 Data Breach Incident Report (DBIR) used stolen credentials. This is because the vast majority of organizations continue to use password-based credentials as the primary means of securing user access, and it is easier for an attacker to steal passwords than it is to find and hack a vulnerable system.

    As a result, password stealing techniques are used by a broad spectrum of attackers to breach organizations, compromise their networks and steal critical data from internal data centers and the cloud. Traditional approaches to stop credential phishing rely only on classifying the phishing site before the user encounters it. If the organization’s security products miss a new phishing site, their only recourse is hoping the user doesn’t proceed and enters his credentials.

    Tune into this BrightTALK - Palo Alto Networks video interview as Alexander Hinchliffe discusses the need to protect user credentials and advises how to improve your businesses security stature.
  • The State of Cybersecurity for CIOs and CSOs Recorded: May 15 2017 57 mins
    Rick Howard, CSO of Palo Alto Networks
    Kick-Start a Radical Change in the Evolution of Cybersecurity. C-level Webinar for Government and Education Executives.

    Senior government and education officials are prime for the next evolution in cybersecurity. Although network defenders remain lockstep in outdated best practices, CIOs and CSOs are moving away from the coveted defense-in-depth strategies of the past and looking forward to more effective measures to implement the Cyber Kill Chain™ model.

    In this executive webinar, the CSO of Palo Alto Networks®, Rick Howard, will discuss how CIOs and CSOs can more effectively orchestrate their enterprise security posture. Rick will review the state of enterprise cyber defense and provide insight for executives on:

    • Why the defense-in-depth model failed.
    • Why its replacement, the Cyber Kill Chain, hasn’t realized its full potential.
    • How to shift focus to automatic enterprise security orchestration.
    • How to influence the board and radically change thinking from the top down.

    Join us to learn more about this new and necessary direction in the evolution of cybersecurity.
  • Securing Healthcare Systems on AWS with a Next-Gen Security Platform Recorded: May 9 2017 33 mins
    Gerry Miller, CTO at Cloudticity & Matt Mellen, Heatlhcare Security Architect at Palo Alto Networks
    Securing healthcare applications and data on AWS requires extra diligence, focus and a strong(er) architecture, due to the sensitive nature of protected health information and regulatory requirements. Join us for a deep-dive into the robust AWS-based security architecture developed by Cloudticity specifically designed to cater to the needs of healthcare organizations using Palo Alto Networks Next-Generation Security Platform.

    Healthcare applications store, process, and transmit highly sensitive data and require 24x7 uptime. Cloudticity's security architecture takes advantage of some of the high-availability capabilities that AWS and Palo Alto Networks security platform have to offer for highly scalable mission-critical cloud-hosted environments. For example, we will cover multi-availability zones using Lambda, Auto Scaling and PAN-OS/VM-Series automation features.

    You will walk away with specific, actionable architectural patterns resulting in a usable model for deploying Palo Alto Networks devices on AWS to protect healthcare workloads for stronger security, higher availability, and limitless scalability.
  • Prepare for the Imminent Shifts in Endpoint Attacks Recorded: May 4 2017 63 mins
    Michael Moshiri, Director, Endpoint Protection, Palo Alto Networks
    The shifts in attackers’ tactics are easy to miss and will catch many organizations off-guard. Attackers have discovered new ways to re-engineer older tactics that are easier to execute and are perceived to be less risky by targeted users. Combined with targeting platforms that organizations falsely consider more secure, these new attacks are proving very damaging to unprepared organizations.

    Join this webcast to learn:
    - Vulnerabilities threat actors are now targeting most intensely
    - New tactics and techniques hackers are using against endpoints
    - Best practices Palo Alto Networks uses to secure its own endpoints
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Traps - Pure Focus On Prevention
  • Live at: Jul 15 2016 1:55 pm
  • Presented by: Mathijs Nienhuis
  • From:
Your email has been sent.
or close