Hi [[ session.user.profile.firstName ]]

Endpunktschutz ohne Antivirensoftware

Es wird Zeit, dass Sie Ihre Benutzer vor Bedrohungen schützen, die Antivirensoftwares ganz einfach umgehen können.

Nehmen Sie an einem Live-Webinar zur Endpunktsicherheit mit folgenden Themen teil:

•Die versteckten Kosten, die herkömmliche Antivirensoftware in einem Unternehmen verursacht.
•So erkennen Sie den tatsächlichen Wert einer jeden Lösung für Endpunktsicherheit.
•Welche fünf Funktionen sind wichtig für den Schutz Ihrer Benutzer, Systeme und Endpunkte?
•Wie Traps™ v3.4 Sicherheitsverletzungen in Ihrem Unternehmen verhindert – ohne herkömmliche Antivirensoftware!

Schützen Sie sich gegen Antivirensoftware.
Recorded Sep 7 2016 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Christian Doolman, Cyber Security Solutions, Palo Alto Networks
Presentation preview: Endpunktschutz ohne Antivirensoftware
  • Channel
  • Channel profile
  • Debunking the Myth Around Implementing Zero Trust Apr 16 2019 8:00 am UTC 60 mins
    John Kindervag, Field CTO, Palo Alto Networks
    One of the mythologies surrounding Zero Trust is that it is difficult and expensive to implement. Not true! In this webcast, John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks will debunk this myth.

    Join us for this webcast and learn:
    •How Zero Trust is easy to implement using an iterative approach designed to mitigate disruption or downtime
    •The five key steps to implementation
    •Why Zero Trust is easy to measure, including maturity metrics for Zero Trust

    You’ll also get your questions answered in our live Q&A.
  • Debunking the Myth Around Implementing Zero Trust Apr 4 2019 5:00 pm UTC 60 mins
    John Kindervag, Field CTO, Palo Alto Networks
    One of the mythologies surrounding Zero Trust is that it is difficult and expensive to implement. Not true! In this webcast, John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks will debunk this myth.

    Join us for this webcast and learn:
    •How Zero Trust is easy to implement using an iterative approach designed to mitigate disruption or downtime
    •The five key steps to implementation
    •Why Zero Trust is easy to measure, including maturity metrics for Zero Trust

    You’ll also get your questions answered in our live Q&A.
  • Take Back Control of Your DNS Traffic Apr 2 2019 8:00 am UTC 60 mins
    Bryan Lee and Martin Walter, with host Zoltan Deak
    DNS is wide open for attackers. Security teams are under pressure to enforce consistent protections for millions of new malicious domains while keeping up with advanced tactics like DNS tunneling. How can you take back control of your DNS traffic and prevent these threats?

    Join Palo Alto Networks experts to see:
    • How real-world threats found by Unit 42 use DNS for command-and-control and data theft.
    • A detailed demo of how the new DNS Security service disrupts attacks that use DNS.
    • Best practices for protecting DNS traffic to keep your organization safe.

    You’ll also get your questions answered in our live Q&A when you join us for this interactive session. Learn what you should be doing to protect your DNS traffic today—and how to stay ahead of emerging tactics.
  • Mock-Live NAM: Securing AWS Workloads Mar 28 2019 5:00 pm UTC 45 mins
    Dinah Barret, AWS Marketplace & David Maclean, Cloud Engineer, Palo Alto Networks
    AWS is quickly becoming the dominant deployment platform for business-critical applications. However, protecting the growing public cloud footprint from threats, data loss and misconfiguration remains significantly challenging.

    And as more organizations take advantage of AWS low cost, agile computing, the need for innovative and comprehensive security for applications and data becomes more important. Protecting and segmenting workloads will require complementing native AWS protection with continuous monitoring and compliance as well as automated threat remediation.

    In this webinar, Dinah Barrett, specialist solutions architect – management tools, AWS, and David Maclean, special cloud engineer, Palo Alto Networks acknowledge the importance and offer ways to add additional security, beyond that of native security by:

    •Employing the shared responsibility model across cloud security
    •Utilizing use cases on the importance of adding security to AWS workloads
    •Implementing tools that protect AWS workloads and developer environments

    Register to watch “Securing AWS Workloads” to learn how continuous monitoring and compliance along with automated threat remediation can enhance your existing AWS protections.
  • Holistic Cybersecurity for Industrial Process Industries Mar 26 2019 10:00 am UTC 60 mins
    Stefan Woronka, Director, Head of Business Development for Industrial Security Services Siemens and Dharminder Debisarun
    IT Security for Industrial Automation and Control Systems is on the rise due to prominent incidents based on WannaCry, Shamoon or Trises/Triton. Learnings from these incidents and from recent regulations show that it is a must to implement a holistic security concept for the production environment that captures all relevant aspect: People, Processes and Technology. This presentation from Siemens and Palo Alto Networks will guide you through this process and show how IEC 62443 and the defence in depth concept can be applied for an Industrial Automation and Control System.
  • Take Back Control of Your DNS Traffic Mar 19 2019 5:00 pm UTC 60 mins
    Bryan Lee and Martin Walter, with host Zoltan Deak
    DNS is wide open for attackers. Security teams are under pressure to enforce consistent protections for millions of new malicious domains while keeping up with advanced tactics like DNS tunneling. How can you take back control of your DNS traffic and prevent these threats?

    Join Palo Alto Networks experts to see:
    • How real-world threats found by Unit 42 use DNS for command-and-control and data theft.
    • A detailed demo of how the new DNS Security service disrupts attacks that use DNS.
    • Best practices for protecting DNS traffic to keep your organization safe.

    You’ll also get your questions answered in our live Q&A when you join us for this interactive session. Learn what you should be doing to protect your DNS traffic today—and how to stay ahead of emerging tactics.
  • How Colleges and Universities Gain Visibility into Cloud Apps Mar 14 2019 3:30 pm UTC 60 mins
    Hunter Ely, SLED Security Strategist at Palo Alto Networks
    Colleges and Universities are making the trek to the cloud. Most often, that first step is toward Google Suite, Office 365, Box.com or similar cloud services. While these services provide great value and flexibility for the modern college environment, they present risk of inadvertent data exposure or data breach without providing the visibility into how and where that data is shared. These services are incredibly valuable but without that visibility, IT Administrators are blind to the potential issues inherent to the platforms.

    Join us for a live webinar where we will have a panel discussion with to learn how, in these different environments, they safely enable the use of SaaS applications and:


    • Quickly gain visibility and granular, context-based control of SaaS applications, whether sanctioned or unsanctioned.
    • Protect school or university data from malicious and inadvertent exposure after it has left the campus.
    • Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

    Find out how your peers take charge of their SaaS environments, those that they enabled or those that they inherited by end users.
  • Yapay zeka için hazır mısınız? Güvenliğin geleceği açiğa çikiyor Mar 14 2019 7:30 am UTC 75 mins
    Zekeriya Eskiocak, Manager Systems Engineering at Palo Alto Networks
    Makine Öğrenimi ve Otomasyon Ağ Güvenliğini Nasıl Değiştiriyor?

    Yapay zeka ve makine öğrenimi, işinizi henüz etkilemiyor olabilir ancak etkilemeye başlayacak, hem de yakın zamanda.Hatta, hem işiniz hem de kuruluşunuzun güvenliği hızla yayılan bu teknolojilere giderek daha fazla bağlı olacak. Güvenliğinizi artırmak ve işinizi daha kolay hale getirmek için, şu anda kullandığınız teknolojinin sektörü değiştirecek özelliklerini ve heyecan verici yeni ürünlerimizi ilk duyanlardan biri olun.Size en gelişmiş teknolojileri kullanan saldırganların bile nasıl önüne geçileceğini göstereceğiz.

    Şunlar hakkında bilgi sahibi olacaksınız:
    - Yeni makine öğrenimi işlevlerinin tehditleri önlemeye güç kazandırması
    - Artan otomasyon ve güçlü analizlerin, manuel çalışmayı azaltıp en iyi uygulamaların önünü açması
    - Güvenlik duvarı yönetiminin, en geniş dağıtımları çalıştırırken bile zaman kazandıracak şekilde ölçeklenebilmesi

    Biz güvenliği (yeniden) dönüştürürken bize katılın ve bugün yeni olanaklardan hangilerini uygulayabileceğinizi görün. Bunu kaçırmak istemeyeceksiniz! Palo Alto Networks kurucusu ve CTO'su Nir Zuk ve Baş Ürün Yöneticisi Lee Klarich eşliğinde canlı bir açık oturumla başlayarak büyük duyuruların iç yüzünü paylaşacağız. Ardından tanıtımlar ve vaka çalışmaları aracılığıyla bu yeni olanaklardan nasıl yararlanabileceğinizin anlatılacağı bu etkinlikte, yerel uzmanlar sorularınızı yanıtlıyor olacak.
  • Intelligence Artificielle: êtes-vous prêts ? Lumière sur le futur de la sécurité Mar 13 2019 10:00 am UTC 75 mins
    Eric Antibi, Sales Engineer Manager (Palo Alto Networks)
    IA, machine learning, automatisation : nouveau triptyque de la sécurité réseau

    Si l'IA et le machine learning n'ont pas encore débarqué dans votre vie professionnelle, cela ne saurait tarder. Bientôt, non seulement votre travail mais aussi la sécurité de toute votre entreprise dépendront de plus en plus de ces technologies révolutionnaires. Découvrez en exclusivité les nouveaux produits et fonctionnalités appelés à redéfinir les missions de vos technologies actuelles. Non seulement vous saurez comment devancer des attaques de plus en plus sophistiquées, mais aussi comment nos technologies vous simplifient la vie.

    Assistez à notre évènement pour découvrir comment :
    -Les nouvelles fonctionnalités de machine learning renforcent la prévention
    -L'automatisation et l'analytique réduisent les tâches manuelles et favorisent les bonnes pratiques
    -La gestion des pare-feu monte systématiquement en charge pour gagner du temps, même sur les plus grands déploiements

    Une fois encore, Palo Alto Networks réinvente le monde de la sécurité. Ne manquez surtout pas cet évènement pour explorer les nouveautés à adopter dès aujourd'hui ! Nous commencerons par une table ronde en compagnie de Nir Zuk (CTO et fondateur de Palo Alto Networks) et Lee Klarich (Directeur des produits), qui vous inviteront à vous plonger au cœur de ces nouvelles technologies. Cette discussion sera suivie de démos et études de cas qui vous présenteront les avantages concrets pour votre environnement. Enfin, nous conclurons par une séance de questions-réponses animée par des experts locaux.
  • Preparados, listos, ia | una ventana al futuro de la seguridad Mar 12 2019 10:00 am UTC 75 mins
    Jesus Diaz Barrero, Manager, Systems Engineering Spain & Portugal
    El aprendizaje automático y la automatización están revolucionando la seguridad en la red

    Puede que los efectos de la IA y el aprendizaje automático aún no se hayan dejado sentir en su trabajo, pero lo harán muy pronto. Es más, la seguridad de las tareas que realiza y de la organización en su conjunto dependerá cada vez más de estas tecnologías imparables. Nuestros revolucionarios productos y funciones han nacido para cambiar las reglas del juego. Entérese antes que nadie de cómo aplicarlos a la tecnología que ya utiliza para reforzar su seguridad y simplificar su trabajo. Le contaremos cómo mantenerse siempre un paso por delante de los atacantes, incluso de los más sofisticados.

    Descubra de qué manera:
    - las nuevas funciones de aprendizaje automático refuerzan la prevención;
    - el aumento de la automatización y la posibilidad de hacer análisis más profundos reducen el esfuerzo manual y permiten adoptar las prácticas recomendadas;
    - una gestión de cortafuegos flexible ayuda a ganar tiempo, incluso con las implementaciones más grandes.

    Inscríbase para ser testigo de cómo, una vez más, estamos transformando la seguridad, y descubra qué novedades puede implementar ya mismo. No querrá perderse este encuentro, que dará comienzo con una animada mesa redonda a cargo de Nir Zuk —fundador y director de tecnología de Palo Alto Networks— y Lee Klarich —responsable de producto—, durante la cual se despejarán algunas incógnitas sobre estas importantes novedades. Tras esta charla introductoria, le daremos la oportunidad de descubrir las ventajas de las nuevas funciones mediante demostraciones y casos reales. Además, contaremos con expertos locales durante el turno de preguntas.
  • Policy Optimizer—Strengthen your security rule set and save time Mar 12 2019 9:00 am UTC 60 mins
    Mandeep Singh Sandhu and Scott Johanson, with Host Karin Shopen
    App-ID increases the value of our next-generation firewalls by making it easier and faster to determine the exact identity of applications traversing the network, enabling teams to set and enforce the right policies.

    Join Palo Alto Networks experts and learn how you can use the New Policy Optimizer capability to migrate your legacy rule set to App-ID based rules.

    In this session, you will:
    •Learn best practices for rule management
    •Find out how Policy Optimizer can help you achieve a more secure and easier to manage security rule set
    •Learn how App-ID can reduce complexity and minimize human error, the leading cause of data breaches
    •Get your questions answered in our live Q&A
  • Secure Your Branch Mar 5 2019 10:00 am UTC 60 mins
    Brian Tokuyoshi, Pradeep Singh, Ron Dodge
    There’s a shift underway in branch networking. Backhauling branch office traffic to HQ made sense when accessing data center application, but does this approach still make sense? SaaS and Cloud have fundamentally changed how we use applications and access data. With the high cost of maintaining MPLS and the need to access applications in the cloud, organizations are looking for options to use SD-WAN or access the internet directly from the branch. But how do you do that safely, without watering down the protection?

    Join our Palo Alto Networks experts and learn how you can safely route branch traffic directly to the internet while ensuring the same levels of security that you expect for all your users. You will:

    •Get details on the scenarios for branch security
    •Learn about what does and doesn’t work
    •Find out how to deploy a flexible set of security options to cover your requirements
    •Get your questions answered by the experts in our live Q&A
  • Policy Optimizer—Strengthen your security rule set and save time Feb 28 2019 6:00 pm UTC 60 mins
    Mandeep Singh Sandhu and Scott Johanson, with Host Karin Shopen
    App-ID increases the value of our next-generation firewalls by making it easier and faster to determine the exact identity of applications traversing the network, enabling teams to set and enforce the right policies.

    Join Palo Alto Networks experts and learn how you can use the New Policy Optimizer capability to migrate your legacy rule set to App-ID based rules.

    In this session, you will:
    •Learn best practices for rule management
    •Find out how Policy Optimizer can help you achieve a more secure and easier to manage security rule set
    •Learn how App-ID can reduce complexity and minimize human error, the leading cause of data breaches
    •Get your questions answered in our live Q&A
  • Striking the Right Balance of Cybersecurity and Digital Access in K-12 Education Feb 27 2019 4:30 pm UTC 60 mins
    Fadi Fadhil, CIO, Minneapolis Public Schools and Hunter Ely, SLED Security Strategist, Palo Alto Networks
    Keeping students and their data safe, while maintaining a modern and engaging learning environment, is a delicate balance. Today’s “classroom” is a complicated array of devices, networks, and SaaS or cloud vendors for learning management, student information, or data storage services. The modern classroom advances the educational mission, but strain the ability of K-12 IT leaders to maintain visibility to the environment and manage the risks posed to student safety, confidential data, and availability of services. Using a platform approach, IT Administrators can:

    · Accommodate the ability for student to access their data and apps from anywhere
    · Apply consistent security across everything - traditional classroom settings, cloud services, and 1:1 and BYOD programs
    · Manage the environment in an operationally efficient manner

    Join us for a live webinar featuring a panel discussion with K-12 administrators and learn how they have been able to achieve greater security through a platform approach to BYOD and cloud while still providing the tools necessary for students, faculty, and staff to teach and learn wherever they are.
  • How to Build a Zero Trust Network Feb 26 2019 10:00 am UTC 60 mins
    John Kindervag, Field CTO, Palo Alto Networks
    “Trust is always a vulnerability in a digital system,” - John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks

    Much has been written about the topic of Zero Trust. Is it a security buzz word or a true effective security strategy?

    High-profile breaches involving “trusted” insiders have given industry-wide visibility to the fact that trust represents a vulnerability for digital systems. It’s something malicious actors can and do exploit for their advantage.

    Zero Trust was first introduced around the principles of “never trust, always verify” as a means for enterprises to implement effective network segmentation. As the model has been embraced, Zero Trust evolved to become a strategic Cybersecurity initiative that major enterprises align to in order to prevent successful cyberattacks.

    Watch as our Palo Alto Networks® expert John Kindervag discusses the “whys and hows” of building a Zero Trust architecture. In this webcast, you will:

    • Learn specific outcomes of implementing a Zero Trust architecture
    • Hear recommendations on where to start when planning and implementing a Zero Trust framework
    • See how Palo Alto Networks performed in an independent evaluation on Zero Trust Networks
    • Get your questions answered in our Live Q&A
  • 2019 Cloud Security Predictions (EMEA) Recorded: Feb 12 2019 43 mins
    Greg Day, Chief Security Officer EMEA at Palo Alto Networks; James Brown, Head of EMEA Public Cloud at Palo Alto Networks
    On average, organizations fail 43% of CIS Foundations best practices, 36% of NIST CSF best practices, 32% of GDPR requirements and 24% of SOC 2 requirements, according to the Unit 42 cloud research team. Still, for most organizations, the speed and agility the cloud provides is undeniable, despite new risks as well as security and compliances challenges that come along with them.

    Join Palo Alto Networks EMEA’s Greg Day, regional CSO, and James Brown, head of public cloud, discuss the impact cloud has had on security and compliance, highlighting top cloud security predictions and technology trends in Europe, the Middle East and Africa. They will also provide some practical advice on how to secure your organization when moving to the AWS® cloud.

    Together, Greg Day and James Brown bring nearly 40 years of public cloud security knowledge and expertise to the table.

    Sponsored by AWS Marketplace
  • See a 360 view of YOUR threat landscape Recorded: Feb 7 2019 30 mins
    Augustin Montano, Jamian Mason, and Pablo Armas; System Engineers for Palo Alto Networks
    Which threats are the ones affecting my industry and my organization? How am I proactively protecting the organization against them? Is there any evidence of malicious activity as it relates to these specific campaigns? We will show you how to get the answers to this common questions that any cybersecurity professional is asking himself.
  • Leveraging a Security Platform for the Apple Ecosystem Recorded: Feb 6 2019 18 mins
    Jeff Gwathney, Marty Lee and Sharjeel Khan, Systems Engineers for Palo Alto Networks
    IT environments today are adopting BYOD initiatives and allowing employees to pick their own devices. How do you ensure your security posture is reaching all of your platforms? Join us to learn how Palo Alto Networks secures the Apple ecosystem and how we can help you enable your users.
  • AWS Security: Securing AWS Workloads with Palo Alto Networks Recorded: Feb 6 2019 52 mins
    Dinah Barrett, Specialist Solutions Architect, AWS Marketplace & David Maclean, Cloud Engineer, Palo Alto Networks
    Today, AWS provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world with customers across all industries are taking advantage of low cost, agile computing.

    In this webinar, Dinah Barrett, Specialist Solutions Architect | Management Tools, AWS
    and David Maclean, Special Cloud Engineer, Palo Alto Networks will dive into the need for additional security, over and above native security to protect AWS workloads and developer environments, examining the shared responsibility model for cloud security & diving into specific use cases.
  • Protecting against credential-based attacks Recorded: Feb 5 2019 23 mins
    Brad Cochran, Systems Engineer; John Fults, System Engineer; and Jon Hayot, Systems Engineer
    Credential theft is one of the first steps in common attack chains. How can you prevent credential theft with the infrastructure you have today? If credentials have already been leaked out, how can you stop their abuse? We will show you how Palo Alto Networks can help you bring peace of mind when it comes to credential theft and abuse.
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Endpunktschutz ohne Antivirensoftware
  • Live at: Sep 7 2016 8:00 am
  • Presented by: Christian Doolman, Cyber Security Solutions, Palo Alto Networks
  • From:
Your email has been sent.
or close