Hi [[ session.user.profile.firstName ]]

Next-generation Security for the Public Cloud

As more and more organizations move their workloads to the public cloud, security remains a top concern because cybercriminals do not care whether your applications and data reside in your datacenter or in the cloud. Their goal is to steal data or computing resources by gaining access to the network, then moving laterally, potentially to the cloud to execute their goal.

Join us for this webinar to learn how the VM-Series protects your public cloud deployment with the same next-generation firewall and threat prevention features available in our physical appliances.

The webinar will cover:
• Overview of the VM-Series next-generation firewall
• How the VM-Series prevents cyberattacks in the public cloud
• Key differences between the VM-Series and other cloud security offerings
Recorded Nov 17 2016 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Matt Keil, Director of Product Marketing at Palo Alto Networks
Presentation preview: Next-generation Security for the Public Cloud
  • Channel
  • Channel profile
  • Why can't security teams overlook the benefits of Collaboration & Automation? Nov 12 2020 2:00 pm UTC 60 mins
    Dan Sarel, VP, Product Management
    In the last few years, many cybersecurity teams find themselves facing criminals that are often sophisticated, resourceful and have all it takes to win. This talk focuses on 2 areas where criminals today have the upper hand - automation and collaboration, discussing some recent high profile events that we have witnessed, and suggesting what we think is key to change the current situation where many of us feel we are the little boy sticking his finger in a leaking dike.
  • Threat Hunting 101 with Palo Alto Networks Recorded: Oct 28 2020 45 mins
    Kasey Cross, Mike Gotham
    Highly skilled adversaries can break into even the best-protected organizations. They do so by tricking users, compromising hosts and devising other underhanded schemes to infiltrate targeted networks.

    Your mission: Find these adversaries and root them out before the damage is done.

    This on-demand webinar will help you understand the latest techniques for hunting threats and speeding up investigations. Watch it at your convenience to learn how to:

    Uncover hidden threats rapidly
    Investigate alerts quickly and thoroughly
    Assess the scope and severity of an attack accurately
    Turn threat hunting discoveries into automated detection

    We know you’ll get a lot out of this insightful webinar.
  • PANuggets - Episode 14 - SSL Decryption Recorded: Oct 14 2020 32 mins
    Irteza Rana, Systems Engineer, Palo Alto Networks
    Virtually all of your internet traffic is secured by SSL. Without a mechanism to inspect and apply policies to that traffic you are operating blind. But, some data cannot be inspected for a variety of reasons. Join us for this session where you will learn how and when to apply SSL decryption and how it can transform your business by giving the right level of visibility allowing for increased security.
  • PANuggets - Episode 13 - SASE Recorded: Sep 30 2020 39 mins
    Jon Taylor, Systems Engineer, Palo Alto Networks
    SASE combines network and security into a single instrument designed to increase productivity, reduce overall costs, and streamline operations across your organization. Whether is it regional or global, you will benefit from this session where you will learn about SASE and how it can transform the way you conduct business
  • PANuggets - Episode 12 - Threat Hunting with EDR - Seeking Bad Actors Recorded: Sep 16 2020 43 mins
    Michael Wood
    Did you ever track down that phishing email? Do you even know what impact it had in your environment? Threat Hunting with EDR will enlighten you to the methods, processes, and capabilities of Palo Alto Networks’ Cortex product suite. Join us for this 30-minute session and see how you can transform your environment from passive and reactive response to active detection and prevention.
  • No More Alert Fatigue: How Good Data Drives A Sophisticated Cyber Strategy Recorded: Sep 3 2020 62 mins
    Peter Havens
    Learn how good data drives a sophisticated cyber strategy
    - Concerns/challenges organizations face
    - City of Gainesville's Proactive Prevention Strategies
    - Why organizations are still getting hit with ransomware
    - Advanced Detection & Response, Managed Security/Threat Hunting
    - Approaches to justify security funding
  • PANuggets - Episode 11 - Why Cloud Service Provider Security Controls Don't Cut Recorded: Sep 2 2020 24 mins
    Damien DeVille
    Security Breaches, internal bad actors, data exfiltration. All reasons to implement strong cloud-based security. Join us to learn more about how Palo Alto Networks fills the gaps left by the cloud service provider (CSP) security models. Hear about real-world instances involving CSP security and why it’s not enough.
  • PANuggets - Episode 10 - IOT Recorded: Aug 19 2020 29 mins
    Shane Bates
    Do you have the required visibility into your IoT devices? Can you manage the security of those devices using a common platform? Come and learn more about Palo Alto Networks’ industry-leading IoT capabilities and how we can transform your environment
  • PANuggets - Episode 9 - Navigating Support - Finding the Best Path Recorded: Aug 5 2020 32 mins
    Jon Taylor
    Learn about all of the support resources available to customers
    Understand the best way to get your problem solved quickly
  • PANuggets - Episode 8 - Wildfire - Automation in Threat Protection Recorded: Jul 22 2020 35 mins
    Shane Bates
    Learn how Palo Alto Networks uses AI, ML. and automation to help prevent catastrophe
    Understand the value of Wildfire within the Palo Alto Networks Security Operating Platform.
  • PANuggets - Episode 7 - BPA - Plastics or Best Practices? Recorded: Jul 8 2020 29 mins
    John Taylor and Damien DeVille
    Learn how to run and analyze Best Practice Assessments
    Understand the value of running BPAs on a regular basis
  • Securing the IoT Threat in Healthcare Recorded: Jun 24 2020 56 mins
    Mark Baik & May Wang
    Gartner predicts that the number of connected devices that the internet of things (IoT) will hit 25 billion by 2021. While IoT opens the door for innovative new approaches and services, it also presents new cybersecurity risks.

    This is particularly true in healthcare, where a vast array of connected devices and instruments are being deployed to deliver on the promise of improved patient care. From our analysis of 1.2 million IoT devices over two years, however, we discovered that 98% of IoT traffic is unencrypted and 83% of medical imaging systems are using out of support OS.

    IoT security in hospitals not only impacts data security but it also impacts patient safety and care operations.

    Join this webinar for a discussion around the current state of IoT security in Healthcare. We will explore the top threats from our recent publication of IoT Threat Report and best practices that you can adopt to secure your organization.
  • PANuggets - Episode 6 - PanHandler/Skillets Recorded: Jun 24 2020 25 mins
    Damien DeVille
    Learn about security automation and template configurations
    Understand how to deploy and use Skillets with PanHandler
  • Webinar – Continuum cloud-native  les enjeux de sécurité Recorded: Jun 16 2020 57 mins
    Pierre Gagnon
    Machines virtuelles (VM), containers, PaaS, Kubernetes®, déploiements sans serveur… les entreprises disposent de plus d’options que jamais à travers le continuum cloud native. Il leur appartient donc de peser le pour et le contre de chaque offre pour le développement et l’exécution de leurs workloads et applications.

    Le cabinet Enterprise Strategy Group a récemment interrogé 371 acteurs de la sécurité du cloud en Amérique du Nord. Intitulé « Leveraging DevSecOps to Secure Cloud native Applications », le rapport résultant de cette étude couvre les derniers chiffres d’adoption, les tendances et les problématiques de sécurité spécifiques à chaque élément du continuum cloud-native.

    Ce webinar vous invite à découvrir les conclusions de l’étude et les success stories d’organisations qui ont su développer et sécuriser les technologies cloud-native.
  • Webinar: Top SOAR Use Cases Part 1 Recorded: Jun 16 2020 41 mins
    Patrick Bayle
    With endless security alerts, expanding product portfolios, understaffed SOCs and remote teams, the demands placed on security professionals are increasing every day.

    Watch this webinar for live demos of products, including Cortex™ XSOAR, that can help you overcome your current SOC challenges and minimize stress in your high-pressure job. These demos cover use cases for:

    -Phishing enrichment and response
    -Endpoint protection
    -Impossible travel
    -SSL security management
    -Whitelist administration with Threat Intel Management
  • Prisma Access ...Und Wieso Wir Alle Besseres Design Brauchen Recorded: Jun 16 2020 67 mins
    Dirk Thelen und Michael Weisgerber
    Flickwerk, Provisorien, Teillösungen,... was schon im Normalbetrieb aus gutem Grund ungeliebt ist, wird in herausfordernden Zeiten wie diesen schnell zur Katastrophe und existenzbedrohend. Gerade wenn Eile geboten ist und Hektik aufkommt, zahlt sich eine gute Planung und Architektur - ein gutes, funktionales Design - mehrfach aus.

    Lassen Sie sich von Dirk Thelen und Michael Weisgerber (auch) diesen Aspekt von Palo Alto Networks' Prisma Access erläutern. Wie immer wird die Stunde gespickt sein mit vielen Detailinformationen und natürlich auch mit Infos zur neuen Version 1.6 von Prisma Access.
  • Protecting Higher Ed Infrastructure from NetWalker Ransomware Attacks Recorded: Jun 12 2020 44 mins
    Theron Parry, Robert McIntosh, and Sanket Shah
    The NetWalker family of ransomware continues to strike higher education institutions across the U.S. Join us for a discussion on recent NetWalker attacks, and learn how Palo Alto Networks' Cortex XDR can protect your infrastructure against this attack.

    During our discussion we will:
    -Review the attack in a lab environment
    -Review the Events and Incidents of the attack in Cortex XDR
    -Engage in Q&A and review of the Cortex XDR technology
  • Découvrez qui, sous vos yeux, se cache dans votre réseau! Recorded: Jun 11 2020 47 mins
    Bertrand Le Bail
    Des attaquants, ou des employés indélicats, peuvent se cacher dans votre réseau, essayer de localiser vos données confidentielles, ou voler des informations d'identification afin de se faire passer pour vos utilisateurs légitimes. Comment pouvez-vous les détecter et les arrêter rapidement?

    En tirant parti des données de vos firewalls, vous obtiendrez la visibilité dont vous avez besoin pour identifier facilement les tactiques post-intrusion, telles que les mouvements latéraux ou les exfiltrations, dans le trafic de votre réseau.

    Pour mettre en évidence les avantages de l'utilisation des données du firewall dans le cadre de l'analyse du comportement du traffic réseau (NTA) , nous détaillerons, entre autre, dans ce webinaire:

    -Les tendances observées en cybersécurité.
    -Comment stopper les attaques ciblées sans décrypter le trafic
    -Détails sur les avantages de l'utilisation de Cortex XDR ™ pour l'analyse du comportement du traffic réseau

    Prêt à en savoir plus? Voyons comment Palo Alto Networks peut augmenter votre investissement actuel dans vos firewalls avec des analyses basées sur le machine learning afin de vous aider à traquer et à arrêter les attaquants cachés dans votre réseau.
  • Descubra quien se esconde en su red Recorded: Jun 11 2020 66 mins
    Cesar Solis
    Los atacantes pueden estar ocultos en su red, tratando de localizar sus datos confidenciales o robar credenciales para mezclarse con sus usuarios. ¿Cómo puede detectarlos y detenerlos rápidamente?

    Aprovechando los datos de su firewall, obtendrá la visibilidad que necesita para identificar fácilmente las tácticas posteriores a una intrusión, como el movimiento lateral y la exfiltración de datos a partir del tráfico de su red.

    Para resaltar los beneficios del uso de datos capturados por el firewall en el análisis de tráfico de red (NTA), hemos creado un kit práctico que ofrece:

    -Modelo con más de 451 atributos para proporcionar visibilidad en red
    -Formas de detener los ataques dirigidos sin descifrar el tráfico
    -Detalles sobre las ventajas de utilizar Cortex XDR ™ para NTA

    ¿Listo para aprender más? Hablemos sobre cómo Palo Alto Networks puede aumentar su inversión en el firewall existente mediante análisis basados en inteligencia artificial para ayudar a cazar y detener a los atacantes en su red.
  • PANuggets - Episode 5 - Cortex XSOAR Recorded: Jun 10 2020 40 mins
    Michael Wood
    Learn about the value of Cortex XSOAR
    See a brief demo and understand the ease of use
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Next-generation Security for the Public Cloud
  • Live at: Nov 17 2016 6:00 pm
  • Presented by: Matt Keil, Director of Product Marketing at Palo Alto Networks
  • From:
Your email has been sent.
or close