Hi [[ session.user.profile.firstName ]]

Protect Yourself From Antivirus: Introducing the New Traps v3.4

Traditional antivirus (AV) is not the solution to breach prevention on the endpoint – it is the problem. At best, traditional AV gives organizations a false sense of security.

To prevent security breaches, you must protect yourself not only from known and unknown cyberthreats but also from the failures of traditional antivirus solutions deployed in your environment.

In this webinar, you will learn:

· How to determine the true value of your endpoint security solutions
· What hidden costs traditional AV imposes on your organization
· Which five capabilities are critical to effective endpoint protection
· How the new Traps v3.4 prevents security breaches in your organization
Recorded Aug 12 2016 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michael Moshiri, Director, Endpoint Protection
Presentation preview: Protect Yourself From Antivirus: Introducing the New Traps v3.4

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Top 10 Public Cloud Security Recommendations Oct 25 2017 2:00 pm UTC 45 mins
    Matt Keil, Director of Product Marketing, Public Cloud
    Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivalled only by that of the early days of the Internet era. As was the case then, the speed of adoption often means that “good enough” security is viewed as acceptable.

    With the underlying premise that the public cloud is someone else’s computer, and an extension of your network this session will cover public cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public cloud workloads and data.
  • Start Benefiting from PAN-OS 8.0 with User-ID and Global Protect Oct 17 2017 4:00 pm UTC 45 mins
    Wiley Richardson, Security Engineer, Trainer and Cloud Architect at Cloud Harmonics
    Join us for our follow-up webcast with a focus on Authentication, Global Protect, and User ID enhancements to get a quick overview of SAML Authentication, Global Protect Clientless VPN and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Attendees will:

    •Learn about the key capabilities introduced by 8.0
    •See the value of the update to security deployments
    •Receive a voucher for 8.0 training course - $500 value
  • Start Benefiting from PAN-OS 8.0 with Panorama and Networking Enhancements Sep 19 2017 4:00 pm UTC 45 mins
    Wiley Richardson, Security Engineer, Trainer and Cloud Architect at Cloud Harmonics
    Join us for our follow-up webcast with a focus on Panorama and Networking enhancements to get a quick overview of software deployment, integration architecture and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Registrants will:

    •Learn about the key capabilities introduced by 8.0
    •See the value of the update to security deployments
    •Receive a voucher for 8.0 training course - $500 value.
  • How Securing SaaS Applications Contributes to GDPR Compliance Sep 11 2017 2:00 pm UTC 60 mins
    Danielle Kriz and Anuj Sawani from Palo Alto Networks
    In less than a year (May 28, 2018) the General Data Protection Regulation (GDPR) becomes law in Europe. With the exponential rise in the use of SaaS applications, organizations that process the personal data of EU residents need to be able to maintain compliance with the GDPR while keeping data secure in the cloud.

    We invite you to join us for a live webinar on Monday, September 11 in which we zoom in on how our platform, with its SaaS Security service, Aperture, can help your organization meet the upcoming requirements.

    Our policy team expert, Danielle Kriz, and our product team expert, Anuj Sawani, team up to provide an overview of the GDPR—in particular its provisions related to securing personal data- and how Aperture can be used to address potential compliance issues. We will also provide a quick overview of how Aperture fits with EU compliance requirements when processing personal data. .

    After the presentation, we will have some time for questions and answers with our experts.
  • Disrupting Credential-based Attacks Sep 7 2017 10:30 am UTC 30 mins
    Brian Tokuyoshi, Product Marketing, and Martin Walter, Product Management, Palo Alto Networks
    Prevent Phishing and the Abuse of Stolen Credentials

    In this session, we will present the unique attack life-cycle for credential-based attacks. Using real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse
  • Prepare for the Imminent Shifts in Endpoint Attacks Sep 4 2017 1:00 pm UTC 75 mins
    Michael Moshiri, Director, Endpoint Protection, Palo Alto Networks
    The shifts in attackers’ tactics are easy to miss and will catch many organizations off-guard. Attackers have discovered new ways to re-engineer older tactics that are easier to execute and are perceived to be less risky by targeted users. Combined with targeting platforms that organizations falsely consider more secure, these new attacks are proving very damaging to unprepared organizations.

    Join this webcast to learn:
    - Vulnerabilities threat actors are now targeting most intensely
    - New tactics and techniques hackers are using against endpoints
    - Best practices Palo Alto Networks uses to secure its own endpoints
  • Addressing BYOD with new GlobalProtect features Aug 31 2017 5:00 pm UTC 60 mins
    Brian Tokuyoshi, Sr. Product Marketing Manager and Joby Menon, Product Line Manager, Palo Alto Networks
    Your user population consists of employees and contractors using a wide variety of corporate and BYOD devices. Getting your BYOD strategy into place requires providing the right types of access to each platform. New features with GlobalProtect can help you address BYOD.

    In this session, learn about the new Clientless VPN technology in GlobalProtect, and how it can be incorporated into your architecture. Find out about new integrations with mobile device management products such as AirWatch and MobileIron in order to secure traffic, control access to applications and protect data. Get an overview of the technology and see demonstrations of how it works.
  • Addressing BYOD with new GlobalProtect features Aug 31 2017 2:00 pm UTC 60 mins
    Brian Tokuyoshi, Sr. Product Marketing Manager and Joby Menon, Product Line Manager, Palo Alto Networks
    Your user population consists of employees and contractors using a wide variety of corporate and BYOD devices. Getting your BYOD strategy into place requires providing the right types of access to each platform. New features with GlobalProtect can help you address BYOD.

    In this session, learn about the new Clientless VPN technology in GlobalProtect, and how it can be incorporated into your architecture. Find out about new integrations with mobile device management products such as AirWatch and MobileIron in order to secure traffic, control access to applications and protect data. Get an overview of the technology and see demonstrations of how it works.
  • Palo Alto Networks Next Generation Endpoint Solution Traps™ Aug 31 2017 1:00 pm UTC 60 mins
    Palo Alto Networks
    Watch this webinar for an overview of Palo Alto Networks® Traps™ advanced endpoint protection and learn about this market-leading solution that provides multi-method protection against known and unknown threats.

    Hosted by Paul Wilcox, APAC Sales Director for Palo Alto Networks Cybersecurity Solutions Group, you will learn why Traps is the most effective solution on the market today to address the current threat landscape, including:

    •How it effectively prevent attacks against exploits and malware – such as ransomware
    •An overview of the unique approach Traps takes to endpoint security
    •How legacy antivirus is no longer effective enough
    •How Traps can replace your existing legacy antivirus software
    Included in this live webinar will be a live demonstration of Traps in action.
  • Use Breakthrough Performance HW to Secure your Network Aug 25 2017 10:00 am UTC 30 mins
    Navneet Singh & Sai Balabhadrapatruni from Palo Alto Networks
    Secure Increasingly Encrypted Traffic and Enable Cloud Adoption

    The increasing use of encrypted traffic and rapid consumption of cloud-based applications, coupled with ever-increasing data center consolidation, are driving new processing power, performance and capacity requirements.

    We will discuss how high-performance hardware appliances help deliver next-generation security capabilities anywhere in the network, including data center cores and enterprise perimeters, as well as branch and remote offices.
  • Accelerating Multi-Cloud Deployments Aug 23 2017 10:00 am UTC 45 mins
    Matt Keil, Director of Product Marketing, Public Cloud at Palo Alto Networks
    Organizations are rapidly embracing multi-cloud architectures that span software-defined data centers (private clouds) and public cloud environments. To help organizations protect their cloud-based applications and data from cyberattacks, PAN-OS® 8.0 expands the VM-Series with new models and optimized performance, making it the broadest, most powerful line of virtualized firewall appliances on the market.

    New scalability and resiliency features for Microsoft® Azure® and Amazon® Web Services enable organizations to build secure cloud-centric architectures. Workflow automation features for VMware® NSX® and KVM with OpenStack® help streamline VM-Series deployments.
  • GDPR update - less than 1 year to May 2018 Aug 22 2017 1:00 pm UTC 75 mins
    Greg Day, EMEA VP & CSO Palo Alto Networks
    The General Data Protection Regulation (GDPR) and the Network and Information Security (NIS) Directive will both be enforced as of May 2018. You may think you’re ready for these laws, but covered companies may need to improve the security of personal data they hold, and of their networks and information systems. Data breaches and security incidents will have to be reported. As they prepare for the GDPR and NIS, it is imperative that organisations understand their cybersecurity risks and invest appropriately.

    Greg Day, EMEA VP & CSO Palo Alto Networks, explains the security-related requirements.
  • Defend Against WannaCry Recorded: Aug 21 2017 22 mins
    Alex Hinchliffe, EMEA Threat Intelligence Analyst, Unit 42
    What you need to know and how to defend against it.

    Hours after WanaCrypt0r first emerged , the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.

    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Follow Alex Hinchliffe on a video interview during which he will cover this pervasive threat, and how it exploits vulnerabilities and spreads across networks.
  • Public Cloud Security Considerations Recorded: Aug 16 2017 41 mins
    Matt Keil, Director of Product Marketing, Public Cloud
    Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivaled only by that of the early days of the Internet era. As was the case then, the speed of adoption often means that “good enough” security is viewed as acceptable. With the underlying premise that the public cloud is someone else’s computer, and an extension of your network this session will cover public cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public cloud workloads and data.
  • Start Benefiting from PAN-OS 8.0 Now Recorded: Aug 15 2017 34 mins
    Wiley Richardson, Security Engineer, Trainer and Cloud Architect at Cloud Harmonics
    You’ve heard the hype, now see for yourself the innovations that PAN-OS 8.0 brings to your network security. Attend this 30 minute webcast, “Start Benefiting from 8.0 Now,” to get a quick overview of the new features and enhancements PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Registrants will:

    •Learn about the key capabilities introduced by 8.0
    •See the value of the update to security deployments
    •Receive a voucher for 8.0 training course and VM-100 - $800 value

    Reserve your spot now, so you can start to take advantage of all 8.0 has to offer.
  • Prepare for the Imminent Shifts in Endpoint Attacks - in Vietnamese Recorded: Aug 15 2017 42 mins
    Philip Hung Cao, Solutions Consultant, Palo Alto Networks Vietnam
    The shifts in attackers’ tactics are easy to miss and will catch many organizations off-guard. Attackers have discovered new ways to re-engineer older tactics that are easier to execute and are perceived to be less risky by targeted users. Combined with targeting platforms that organizations falsely consider more secure, these new attacks are proving very damaging to unprepared organizations.

    This webinar will focus on:

    - Vulnerabilities threat actors are now targeting most intensely
    - New tactics and techniques hackers are using against endpoints
    - Best practices Palo Alto Networks uses to secure its own endpoints
  • Phishing & Credential Abuse 201: Inside the Attack Recorded: Aug 4 2017 61 mins
    Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.
  • Phishing & Credential Abuse 201: Inside the Attack Recorded: Aug 4 2017 62 mins
    Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.
  • Disrupting Credential-based Attacks Recorded: Aug 3 2017 58 mins
    Martin Walter, Product Line Manager, Palo Alto Networks
    Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

    In this session, get details on:
    * Why the platform plays a critical role towards disrupting credential-based attacks
    * Preventing the theft of credentials, using new PAN-OS 8.0 technologies
    * Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
  • Disrupting Credential-based Attacks Recorded: Aug 3 2017 58 mins
    Martin Walter, Product Line Manager, Palo Alto Networks
    Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

    In this session, get details on:
    * Why the platform plays a critical role towards disrupting credential-based attacks
    * Preventing the theft of credentials, using new PAN-OS 8.0 technologies
    * Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Protect Yourself From Antivirus: Introducing the New Traps v3.4
  • Live at: Aug 12 2016 2:00 am
  • Presented by: Michael Moshiri, Director, Endpoint Protection
  • From:
Your email has been sent.
or close