Hi [[ session.user.profile.firstName ]]

Virtualized Network Services: Cyber Security on Your Terms

How do you balance protecting your company and keeping IT costs low? Join Verizon and Palo Alto Networks and learn about our new virtualized network security solution. This Security as a Service offering provides a best-in-class prevention-focused network platform in simplified service tiers. It offers subscribers flexible purchasing and service delivery models without sacrificing advanced threat protection.

Join this webinar to learn how to:
· Strengthen your network defenses while simplifying management.
· Get the security your network needs with flexible, cost-effective options.
· Give yourself time to focus on your business.

Additionally, we will explore Palo Alto Networks’ Security Lifecycle Review, a free tool that helps you understand the business and security risks your organization faces, providing an opportunity to review the findings and take action. The review looks into known and unknown threats and integrates existing Application Visibility Report data with WildFire™ cloud-based threat analysis service, SaaS-based application visibility, and more.
Recorded Nov 8 2016 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Marcelo Lima, Global Channel Sales - Technical Lead, Palo Alto Networks and Anuj Dutia, Product Marketing Director, Verizon
Presentation preview: Virtualized Network Services: Cyber Security on Your Terms

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [Breach Prevention] Public, Private, Hybrid: Embrace Any Cloud, Securely Mar 6 2017 9:00 am UTC 60 mins
    Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.

    This webinar will cover:

    • Visibility: Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management: Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention] Mar 3 2017 8:00 am UTC 60 mins
    Anuj Sawani, Product Marketing Manager, Palo Alto Networks
    The first step for many organizations migrating to the cloud is the adoption of SaaS applications, such as Office 365, Box, Salesforce and many more. As an IT professional, this means you are giving permission to your users to store data in the cloud with corporate-approved services, such as OneDrive or SharePoint Online. The decision to move to the cloud is usually supported by a long list of cost and operational benefits. Infrastructure cost reduction? Check. Increased productivity? Check. License cost reduction? Check. But, have you thought about data governance and compliance, malware protection, and collaboration with external vendors? These are great questions to ask as you make this transition.
     
    Organizations look to reduce the threat surface exposed by SaaS applications as their data is now hosted in data centers that are not managed by them. Join this webinar to learn more about the evolution of the data center landscape and how to redefine your security strategy to cover the unique risks surfacing from the adoption of SaaS applications. 
  • SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention] Mar 3 2017 2:00 am UTC 60 mins
    Anuj Sawani, Product Marketing Manager, Palo Alto Networks
    The first step for many organizations migrating to the cloud is the adoption of SaaS applications, such as Office 365, Box, Salesforce and many more. As an IT professional, this means you are giving permission to your users to store data in the cloud with corporate-approved services, such as OneDrive or SharePoint Online. The decision to move to the cloud is usually supported by a long list of cost and operational benefits. Infrastructure cost reduction? Check. Increased productivity? Check. License cost reduction? Check. But, have you thought about data governance and compliance, malware protection, and collaboration with external vendors? These are great questions to ask as you make this transition.
     
    Organizations look to reduce the threat surface exposed by SaaS applications as their data is now hosted in data centers that are not managed by them. Join this webinar to learn more about the evolution of the data center landscape and how to redefine your security strategy to cover the unique risks surfacing from the adoption of SaaS applications. 
  • How to Enable Zero Trust Security for Your Data Center Mar 2 2017 2:00 pm UTC 60 mins
    John Kindervag, Vice President and Principal Analyst at Forrester
    The rising tide of successful cyberattacks against organizations has made it clear that traditional approaches for defining trust levels, stopping lateral movement and enforcing advanced security controls within a data center are no longer effective. The Zero Trust approach advocated by Forrester provides guiding principles for achieving a robust and secure data center security architectures. However, choice of the security platform, design considerations and effective use of advanced security capabilities play a crucial role in implementing a successful Zero Trust enabled data center.

    In this webinar, guest speaker John Kindervag, Vice President and Principal Analyst at Forrester will talk about the steps to achieving a Zero Trust data center.

    Topics covered in this webinar will include:

    - 5 Steps to achieving Zero Trust enabled data centers.
    - Extending Zero Trust design principles across hybrid cloud deployments
    - Security policy considerations and guidelines for implementing Zero Trust enabled data centers.
  • Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Mar 2 2017 8:00 am UTC 60 mins
    Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Mar 2 2017 2:00 am UTC 60 mins
    Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Mar 1 2017 8:00 am UTC 60 mins
    Scott Simkin, Sr. Group Manager for Threat Intelligence Cloud, Palo Alto Networks
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Mar 1 2017 2:00 am UTC 60 mins
    Scott Simkin, Sr. Group Manager for Threat Intelligence Cloud, Palo Alto Networks
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Feb 28 2017 8:00 am UTC 60 mins
    Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.
     
    This webinar will cover:
     
    • Visibility:  Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management:  Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Feb 28 2017 2:00 am UTC 60 mins
    Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.
     
    This webinar will cover:
     
    • Visibility:  Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management:  Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • How to Implement User-based Controls for CybersecurityVisibility and policy cont Recorded: Feb 2 2017 29 mins
    Navneet Singh, Product Marketing Director, Next-Generation Firewall
    Visibility and policy control based on users is critical for cybersecurity. User-based policies readily show their business relevance, are more secure, easier to manage, and allow better forensics. In this webinar you will:

    •Learn the value of user-based controls using real-life data breach examples
    •Discover a step-by-step approach for implementing User-IDTM on your Palo Alto Networks Next-Generation Firewall
  • Live chat - Ransomware Survey findings Recorded: Jan 31 2017 33 mins
    Alex Hinchliffe, EMEA Threat Intelligence Analyst, Unit 42, & Ramon de Boer, Sales Lead, EMEA, Palo Alto Networks
    A 30 minute interactive discussion based on the findings and outcome of the EMEA Ransomware Survey run by Palo Alto Networks in December 2016.
  • SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention] Recorded: Jan 26 2017 54 mins
    Anuj Sawani, Product Marketing Manager, Palo Alto Networks
    The first step for many organizations migrating to the cloud is the adoption of SaaS applications, such as Office 365, Box, Salesforce and many more. As an IT professional, this means you are giving permission to your users to store data in the cloud with corporate-approved services, such as OneDrive or SharePoint Online. The decision to move to the cloud is usually supported by a long list of cost and operational benefits. Infrastructure cost reduction? Check. Increased productivity? Check. License cost reduction? Check. But, have you thought about data governance and compliance, malware protection, and collaboration with external vendors? These are great questions to ask as you make this transition.
     
    Organizations look to reduce the threat surface exposed by SaaS applications as their data is now hosted in data centers that are not managed by them. Join this webinar to learn more about the evolution of the data center landscape and how to redefine your security strategy to cover the unique risks surfacing from the adoption of SaaS applications. 
  • Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Recorded: Jan 25 2017 60 mins
    Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • Exploit kits: getting in by any means necessary Recorded: Jan 25 2017 50 mins
    Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Exploit kits: getting in by any means necessary Recorded: Jan 25 2017 50 mins
    Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • The Power of the Platform Recorded: Jan 24 2017 28 mins
    Zoltan Deak, Sr. Product Marketing Manager
    Protection. Delivered.

    Our next-gen security platform brings network, cloud and endpoint security into a common architecture providing greater visibility and control - making prevention possible.

    Traditional security methods focus on the detection of known threats, but as new threats emerge, our platform routes suspicious files and URLs to WildFireTM for threat analysis.

    In this webinar, you will learn how you can prevent never-before seen threats and protect your data through:

    •Prevention of unknown threats: Identify and block newly discovered threats in 5 minutes.
    •Shared global threat intelligence: Threat intelligence from more than 12,500 other WildFireTM users.
    •Automated security response and visibility: Reduce security workflow with automated prevention and get detailed analysis reports for threat events.
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Recorded: Jan 24 2017 37 mins
    Scott Simkin, Sr. Group Manager for Threat Intelligence Cloud, Palo Alto Networks
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Recorded: Jan 23 2017 61 mins
    Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.
     
    This webinar will cover:
     
    • Visibility:  Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management:  Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • Preventing Threats in Modern Government Networks -Replacing Proxy Technology Recorded: Jan 19 2017 53 mins
    Pamela Warren, Director, Government & Industry Initiatives & Scott Brunstrom, Sr. Fed. Systems Engineer, Palo Alto Networks
    Proxy deployments today have outlived their usefulness and practicality with limited security functionality against today’s advanced threats. Today's security must consider new applications, access options and capabilities within our networks. This webinar provides insights on a next generation security approach to today's networks that considers the changing nature of our networks without compromising the protection of our data and the integrity of our networks.
Webcasts and Videos
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content — by user, not just by IP address. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control threats and applications — regardless of port, protocol, evasive tactic, or SSL encryption — and scan content to stop threats and prevent data leakage. Palo Alto Networks delivers proven threat prevention combining IPS, anti-malware, URL, file and content filtering in a single integrated engine supported by one of the industry’s most prolific vulnerability research teams.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Virtualized Network Services: Cyber Security on Your Terms
  • Live at: Nov 8 2016 5:00 pm
  • Presented by: Marcelo Lima, Global Channel Sales - Technical Lead, Palo Alto Networks and Anuj Dutia, Product Marketing Director, Verizon
  • From:
Your email has been sent.
or close