Hi [[ session.user.profile.firstName ]]

Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention]

The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.
 
This webinar will cover:
 
• Visibility:  Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
• Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
• Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
• Centralized management:  Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
Recorded Jan 23 2017 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
Presentation preview: Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention]
  • Channel
  • Channel profile
  • URL Filtering Best Practices - Las Políticas de Seguridad Web a tu Servicio Mar 25 2020 10:00 am UTC 60 mins
    Marçal Balasch
    A medida que los atacantes evolucionan, las organizaciones requieren una mayor flexibilidad que va más allá de la categorización binaria tradicional y las políticas para URL. Con el lanzamiento de PanOS 9.0, hemos agregado nuevas y potentes capacidades a nuestro servicio de filtrado de URL para ayudar a mantener a los usuarios seguros sin complicar sus políticas de seguridad.

    Únete a nuestros expertos que te proporcionarán recomendaciones de las mejores prácticas relacionadas con el filtrado URL. Te enseñaremos cómo puedes prevenir ataques exitosos cuando quieras:
    - Activar el descifrado selectivo de SSL
    - Habilitar la protección contra el robo de credenciales
    - Utilizar acciones automatizadas

    Lleva tu política de seguridad web más allá de la clasificación los sitios web y conviértela en un componente crítico de vuestra estrategia de seguridad. Únete a nosotros para obtener información y respuestas a tus preguntas sobre seguridad web.
  • URL Filtreleme ile İlgili En İyi Uygulamalar Mar 20 2020 8:00 am UTC 60 mins
    İbrahim Eskiocak
    Saldırganlar yöntemlerini geliştirip ilerledikçe kuruluşlar, URL'ler için geleneksel ikili sınıflandırma ve kuralların ötesinde daha fazla esnekliğe ihtiyaç duyar hale geldi. PanOS'in son sürümü (9.0) ile URL Filtreleme hizmetimize, güvenlik kurallarınızı karmaşıklaştırmadan kullanıcılarınızı güvende tutmaya yardımcı olacak güçlü, yeni özellikler ekledik.

    Risk, çoklu kategori ve kural aksiyonları ile ilgili en iyi uygulama önerilerini sunan uzmanlarımıza katılarak başarılı saldırıları nasıl önleyeceğinizi görebilirsiniz:
    - Seçmeli SSL trafiği çözme özelliğini etkinleştirme
    - Kimlik bilgileri hırsızlığı korumasını etkinleştirme
    - Otomatik aksiyonlardan yararlanma

    Web güvenliği kurallarınızı web sitelerini sınıflandırmanın ötesine taşıyıp güvenlik stratejinizin önemli bir bileşeni haline getirmek, Web güvenliği hakkında bilgi edinmek ve sorularınızın yanıtlarına ulaşmak için bize katılın.
  • URL Filtering Best Practice - Come Creare Web Security Policy Funzionali Mar 18 2020 10:00 am UTC 60 mins
    Pamela Ancel Juachon
    Data la rapida evoluzione degli hacker, le aziende necessitano di una maggiore flessibilità che va oltre la tradizionale categorizzazione e policy per URL. Con il rilascio di PanOS 9.0, abbiamo aggiunto nuove capacità potenziate al nostro servizio di URL filtering per mantenere protetti gli utenti utenti senza complicare le policy di sicurezza.

    Unisciti ai nostri esperti che ti illustreranno le best practice relative a risk, multi-category e policy action. Ti mostreremo come prevenire gli attacchi grazie alle funzioni di:
    - Selective SSL decryption
    - Credential Theft Prevention
    - Automated action

    Con Palo Alto Networks potrai portare la web security oltre la semplice categorizzazione dei siti web e trasformarla in una componente chiave per la strategia di security della tua organizzazione. Partecipa al webinar per trovare le risposte alle domande più importanti riguardo la web security.
  • NGFW Configuration Hardening - Part 1 Mar 18 2020 8:00 am UTC 60 mins
    Othman Amarneh
    According to research, almost 95% of cybersecurity incidents/attacks are due to misconfiguration in the security solutions the organizations have. Accordingly, having a solid and hardened configuration is a requirement to improve the organization's security posture.

    In this webinar, we will discuss some of the hardening and best practice configurations to apply to Palo Alto Networks NGFW which will help your organization to reduce the attack surface.
  • Развеиваем мифы о реализации Zero Trust Mar 17 2020 9:00 am UTC 60 mins
    Денис Батранков
    Один из мифов, который есть про Zero Trust, что его сложно и дорого реализовать. Неверно! В нашем вебинаре, который проводит Денис Батранков, будет рассказано о подходе Zero Trust и как его реализовать.

    Подключютесь к вебинару и узнайте:
    - Как пошагово реализовать Zero Trust и избежать прекращения работы сервисов
    - Пять ключевых шагов реализации
    - Почему Zero Trust хорошая метрика для измерения безопасности и зрелости службы ИБ в компани
  • Machine Learning 101: Dinamiza la seguridad y mejora tu tiempo de respuesta Mar 13 2020 10:00 am UTC 60 mins
    Jesus Diaz Barrero
    El machine learning, como disciplina de la Inteligencia Artificial, está cambiando el modo en el que vivimos. Es capaz de reducir drásticamente los errores humanos y conseguir ejecutar con efectividad tareas que manualmente parecen imposibles.

    Sí, pero, ¿cómo cambia el panorama de la Ciberseguridad? Y, además y probablemente más importante, cómo impactará tu camino en la ciberseguridad?

    Únete a nuestro experto Jesus Diaz Barrero para comprender cómo aplicar el machine learning en las tareas de threat hunting y análisis de malware.

    Regresarás conociendo:

    -En dónde se aplica hoy día el machine learning
    -Cómo será aprovechado en el futuro
    -Cómo puedes simplificar tus operaciones de seguridad gracias al machine learning y el automatismo.
  • Windows 7 End-of-Life: What to Do If You Can’t Upgrade Your Systems Mar 2 2020 10:00 am UTC 60 mins
    Shahar Razon and Aviel Fogel
    Now that Windows 7 has reached its end-of-life date, you might be wondering if your Windows 7 PCs increase your risk of an attack. The simple answer is yes. Because Windows 7 systems will no longer receive software patches or security updates, any unsupported Windows 7 PCs in your network could become the entry point for a damaging attack.

    Unfortunately, legacy systems lurk in many corporate networks. Extended security update programs can offer a temporary—and costly—stopgap, but security leaders must consider other approaches to protect all their unsupported systems from exploits.

    Join security experts Shahar Razon and Aviel Fogel as they discuss:

    -The top risks for Windows 7 systems
    -Why older operating systems are inherently less secure
    -Strategies to secure legacy systems from exploits and malware
  • Policy Optimizer—Strengthen your security rule set and save time Feb 27 2020 11:00 am UTC 62 mins
    Mandeep Singh Sandhu and Scott Johanson, with Host Karin Shopen
    App-ID increases the value of our next-generation firewalls by making it easier and faster to determine the exact identity of applications traversing the network, enabling teams to set and enforce the right policies.

    Join Palo Alto Networks experts and learn how you can use the New Policy Optimizer capability to migrate your legacy rule set to App-ID based rules.

    In this session, you will:
    •Learn best practices for rule management
    •Find out how Policy Optimizer can help you achieve a more secure and easier to manage security rule set
    •Learn how App-ID can reduce complexity and minimize human error, the leading cause of data breaches
    •Get your questions answered in our live Q&A
  • Desmontando mitos en la implementación Zero Trust Feb 26 2020 10:00 am UTC 60 mins
    Diego Gonzalez Alicante
    Uno de los mitos sobre el Zero Trust es que es muy difícil y costoso de implementar. Para nada!! En este webinar desmontaremos este mito de una vez.

    Unase en este webinar y aprenderá:
    - Cómo implementar de una manera simple Zero Trust utilizando una aproximación iterativa diseñada para evitar impacto.
    - Los 5 pasos claves de la implementación
    - Por qué Zero Trust es simple de medir, especialmente cuando usamos métricas maduras.
  • 4 Life Hacks to Love Your Security Job (From Elements of Security Operations) Feb 25 2020 6:00 pm UTC 60 mins
    Kerry Matre, Author, Elements of Security Operations; Kasey Cross, Sr. Product Marketing Manager
    As a security analyst, you have the seemingly enviable job of finding and stopping cyber attackers. In reality, you spend too much time sifting through false positives and low-fidelity data and can’t remember the last time you could fully focus on hunting real threats to the business!

    We can help. We’ve analyzed hundreds of SOCs to develop a blueprint for efficient and scalable security operations. Featuring the author of “Elements of Security Operations”, this webinar will teach you how to cut down repetitive tasks, spend more time investigating incidents and hunt for hidden threats.

    Join this webinar to learn:
    4 life hacks that will make your security job easier
    The secrets to effective security operations
    How you can automate so you focus on valuable and interesting tasks
    How to to prevent burnout by simplifying security operations


    Attend this webinar and learn strategies that can improve your security outcomes and job satisfaction at the same time!
  • SSL-Entschlüsselung: Stärkere Sicherheit, bessere Sichtbarkeit Feb 21 2020 11:00 am UTC 60 mins
    Jens Egger
    In den letzten Jahren ist der Umfang des verschlüsselten Datenverkehrs deutlich gestiegen. Leider bietet dies neben den offensichtlichen Vorteilen der Verschlüsselung auch die Möglichkeit, böswillige Aktivitäten zu verbergen, was die Notwendigkeit einer effektiven Entschlüsselung noch dringender macht.

    Zusammen mit unserem Experten Jens Egger werfen wir einen genaueren Blick auf folgende Themen:

    - Innovationen in PAN-OS® 9.0 zur Optimierung der SSL-Entschlüsselung
    - Best-Practices und eine vollständige Übersicht über Protokolle wie HTTP/2
    - Die richtige Strategie zur Implementierung der SSL-Entschlüsselung
  • Рекомендации по настройке URL фильтрации Feb 21 2020 9:00 am UTC 75 mins
    Kanat Iliasov
    С развитием современных угроз организациям требуется повышенная гибкость, выходящая за рамки традиционной категоризации и политик для URL фильтрации. В недавнем релизе PanOS 9.0 мы добавили новые возможности в модуль URL фильтрации, чтобы обеспечить безопасность ваших пользователей, не усложняя ваши политики безопасности.

    Присоединяйтесь к нашим экспертам, которые поделятся best-practice рекомендациями для URL фильтрации включая:

    Выборочная расшифровка SSL
    Защита от кражи учетных данных
    Утечка чувствительных данных
    Использование автоматизированных действий
    Работа с новым механизмом мульти-категоризации

    Выведите вашу политику веб-безопасности за рамки классификации веб-сайтов и превратите ее в важный компонент вашей стратегии информационной безопасности.

    Присоединяйтесь к нам для получения информации и ответов на ваши вопросы о веб-безопасности.
  • Secure your Mobile Users, Branch Offices, and SaaS Applications Feb 19 2020 11:00 am UTC 60 mins
    Darren D'Arcy, Issam Aouad Tabet, and Marina Daniela Costache
    To secure your Cloud-enabled organization, you need to have a cloud-delivered security mindset. This is achieved through enabling secure access, protecting users & applications, and controlling data from anywhere.

    Join our Webinar to learn more about:

    - Securing your mobile users and branch offices with Prisma Access designed for SASE
    - Providing visibility and control for your SaaS applications through Prisma SaaS
    - Your cloud environment design best practices and use case
  • Sécurisez vos utilisateurs nomades, vos succursales et vos applications SaaS Feb 19 2020 10:00 am UTC 60 mins
    Alaa Riahi, Aurélien Bihel, and Quentin Hidderley
    Afin de sécuriser votre environnement Cloud d'entreprise, il est nécessaire d'avoir à l'esprit l'ensemble des problématiques propres aux infrastructures Cloud. Cela va de la garantie d'un accès sécurisé, en protégeant tant les utilisateurs que les applications, au contrôle même des données, quelles que soient leurs localisations.

    Joignez-vous à nous pour ce Webinar afin de découvrir notre approche concernant :

    - La sécurisation des utilisateurs et sites distants grâce à Prisma Access, conçu comme SASE,
    - L'amélioration de la visibilité et du contrôle des applications SaaS au travers de Prisma SaaS,
    - Les bonnes pratiques applicables au Cloud à l'aide de scenarii usuels.
  • Machine Learning 101: comment la machine intervient en cybersécurité Recorded: Feb 18 2020 41 mins
    Bertrand Le Bail
    Machine Learning change la façon dont nous vivons nos vies. Il peut réduire les erreurs et même réaliser l'impossible en accomplissant des tâches qui ne peuvent pas être effectuées manuellement.

    Mais comment cela change-t-il le paysage de la cybersécurité? Et, peut-être plus important encore, comment cela affectera-t-il votre carrière dans la sécurité?

    Rejoignez notre expert Bertrand pour comprendre comment appliquer les techniques de Machine Learning dans le contexte de la chasse aux menaces et à l'analyse des logiciels malveillants.

    Vous repartirez en comprenant:

    -Où le Machine Learning est utilisé aujourd'hui dans la sécurité
    -Comment il sera exploité à l'avenir
    -Comment simplifier les opérations de sécurité avec l'automatisation et le Machine Learning
  • Middle-East Cloud Regulations Explained Recorded: Feb 17 2020 64 mins
    Haider Pasha
    Cloud regulations in the region can be difficult to understand and more often than not, we tend to make assumptions or accept the myths from what we hear in the market. Join us for this webinar where we demystify the common assumptions businesses make around cloud regulations.

    We will cover regulations in Saudi Arabia and UAE and will be joined by Partners from Al Tamimi group, a reputable law firm based in the UAE with operations in Saudi Arabia. The focus will be to cover the definition of cloud and data followed by discussing the various industries and the local data laws that apply, clarifying what is acceptable and what is not when transferring data to the cloud.
  • Allez au delà du filtrage URL tout en optimisant votre temps Recorded: Feb 12 2020 68 mins
    Damien Raynal
    Le type des attaques évolue sans cesse, et les entreprises devant leur transformation digitale doivent s’adapter à leurs nouveaux besoins. Avec la nouvelle version 9.1 nous accompagnons nos clients en créant de nouvelles fonctionnalités de filtrage URL afin de sécurisé le surf des utilisateurs sans complexifier la politique de sécurité.

    Rejoignez nos experts lors de cette session, ils seront à même de vous accompagner, expliquer, les bonnes pratiques des politiques de sécurité. Nous vous ferons une démonstration de comment arrêter les attaques avec :

    - L’activation du déchiffrement SSL
    - L’activation de protection contre le vole de login & mot de passe
    - Utiliser les actions d’automatisations

    Cela vous permettra d’aller bien au dela de juste la catégorisation d’url, et d’alleger votre temps de réponse tout en gagne en visibilité. Rejoignez nous pour cette session de question réponse.
  • PanOS 9.1 - SD-Wan und mehr Recorded: Feb 7 2020 57 mins
    Dirk Thelen und Rene Fleissner
    Seit Dezember 2019 ist die neue Version von PanOS verfügbar. Ein Hauptaugenmerk wurde hier auf SD-Wan gesetzt.

    Sichere Vernetzung und Kostenoptimierung Ihrer Standorte bei der Verbindung zu den businessrelevanten Diensten stellen für viele Unternehmen eine Herausforderung dar. Mit SD-Wan zeigt Palo Alto Networks, SD-Wan muss nicht kompliziert sein und auch keine Einbußen bei Security bedeuten.

    Die Security Spezialisten Dirk Thelen und Rene Fleissner-Lichtel zeigen die Möglichkeiten von SD-WAN für Ihr Unternehmen. Zusätzlich bringt PanOS 9.1 einige neue Features, auf die auch eingegangen wird.
  • Build security into CI/CD pipelines for effective automation on Azure Recorded: Feb 6 2020 48 mins
    David MacLean
    Realizing “DevSecOps” and effectively implementing security into your CI/CD pipelines on Azure remains a challenging proposition for most organizations today.

    In this session, we share the essential principles to achieve security automation in your CI/CD pipelines and across the build, deploy and run phases of your applications.

    Finally, we conclude with a demonstration of security automation across all three phases of your applications deployed on Azure infrastructure - showing you how to bring security automation to your organization today.
  • Network Security’s Future is in the Cloud Recorded: Feb 5 2020 45 mins
    Joakim Ullgren
    Cloud adoption and user mobility are shifting the locations of applications, data and users. These changes create new vectors for cybersecurity risk. Organizations need a way to securely enable digital business transformation and innovation. We believe that this requires a fundamentally different approach: both security and networking must be delivered in the cloud.

    Join this discussion and explore best practices to secure your cloud initiatives with Prisma Access, a Secure Access Service Edge (SASE) platform, by bringing together industry-leading security and SD-WAN capabilities in the cloud.
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention]
  • Live at: Jan 23 2017 6:00 pm
  • Presented by: Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
  • From:
Your email has been sent.
or close