Hi [[ session.user.profile.firstName ]]

How to Implement User-based Controls for Cybersecurity

Visibility and policy control based on users is critical for cybersecurity. User-based policies readily show their business relevance, are more secure, easier to manage, and allow better forensics. In this webinar you will:

•Learn the value of user-based controls using real-life data breach examples
•Discover a step-by-step approach for implementing User-IDTM on your Palo Alto Networks Next-Generation Firewall
Recorded Jan 18 2017 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Navneet Singh, Product Marketing Director, Next-Generation Firewall
Presentation preview: How to Implement User-based Controls for Cybersecurity
  • Channel
  • Channel profile
  • Technology Deep Dive for the Hybrid DC: Arista MSS and Palo Alto Networks Nov 21 2019 6:00 pm UTC 60 mins
    Christer Swartz and Mohanad Elamim
    Arista Networks Macro-Segmentation Service (MSS), a capability within Arista CloudVision and Arista Data Center Switches, addresses a growing gap in security deployment for hybrid data centers. Arista MSS extends the concept of fine-grained security for VMs to the rest of the data center by enabling dynamic firewall services insertion by integrating with leading Palo Alto Networks Next-Generation Firewalls (NGFW) in the data center.

    Join our security experts and learn how you can deploy Arista MSS together with Palo Alto Networks NGFWs to inspect traffic and deliver robust security across a secure, resilient, and high-performance Arista data center fabric.

    In this webinar you will:

    · See demos on how best to deploy Palo Alto Networks firewalls across Arista MSS enabled next-generation data center
    · Learn about design considerations for firewall insertion
    · Hear real world deployment use cases and best practices
    · Get your questions answered in our live Q&A

    Learn how to protect your applications workloads across an Arista MSS enabled modern hybrid data center.
  • Securing the 5G-ready TelCo Cloud Oct 29 2019 5:00 pm UTC 60 mins
    Lakshmi Anaderi Kandadai and Scott Stevens, with Host Karin Shopen
    The technological shift to dynamic and scalable architectures brings agility and flexibility to network modernization— reducing the time to bring new services to market while enabling rapid service deployment. Operators are embracing a highly-distributed telco cloud environment that spans across multi-vendor, multi-site cloud infrastructures, primarily driven by performance and scalability requirements of the advanced 5G-enabled service offerings.

    These evolving network architectural changes vastly impact security postures that mobile operators are required to adopt in their journey to 5G. As you prepare for your network transition by building 5G-ready telco clouds, you will need a resilient network with robust security mechanisms in place to support the diversity of 5G-enabled applications and services.

    In this webcast, you will learn how to:
    *Build a proactive defense around your robust telco cloud environments
    *Enable cloud-agnostic security at scale across distributed cloud architectures
    *Automate dynamic security policies in lockstep with workload creation and movements

    You will also get your questions answered in our live Q&A.
  • Best Practices For Stopping Theft and Abuse of Employee Credentials Oct 16 2019 5:00 pm UTC 60 mins
    Ashwath Murthy, Ryan Barrett and Bryan Lee, with Host Karin Shopen
    The theft and use of stolen passwords is a common attack for adversaries, mostly because passwords are the weakest link in security. Plus, stealing credentials is much faster, cheaper and easier than having to find and exploit a vulnerability in a system.

    Once done, an adversary can bypass the entire attack lifecycle – impersonating a valid user – and move freely through the network. With inside access, an attacker can quickly move laterally to set up a broader footprint, compromise additional systems and steal other credentials along the way.

    In our new webcast, Best Practices for Stopping Theft and Abuse of Employee Credentials, our experts will:
    *Outline the common techniques attackers use
    *Provide best practices to prevent further credential attacks
    *Showcase Palo Alto Networks features you can enable now to protect your organization

    Get your questions answered, and learn how to stop credential theft and abuse in your organization today.
  • URL Filtering Best Practices-- Making Your Web Security Policies Work for You Sep 30 2019 10:00 am UTC 60 mins
    Trevor Dearing
    As attackers evolve and progress, organizations require increased flexibility that goes beyond the traditional binary categorization and policies for URLs. With the recent release of PanOS 9.0 we’ve added powerful new capabilities to our URL Filtering service to help keep your users safe without complicating your security policies.

    Join our experts as they provide best practice recommendations pertaining to risk, multi-category, and policy actions. We’ll show how you can prevent successful attacks when you:

    •turn on selective SSL decryption

    •enable credential theft protection

    •utilize automated actions

    Take your web security policy beyond categorizing web sites and turn it into a critical component of your security strategy. Join us for insights and answers to your web security questions.
  • Technology Deep Dive for the Hybrid Data Center:Cisco ACI and Palo Alto Networks Sep 26 2019 5:00 pm UTC 60 mins
    Christer Swartz with host Karin Shopen
    For organizations like yours considering Cisco Application Centric Infrastructure (ACI) for the modern next-generation data center, you need to know the key requirements for security and how Palo Alto Networks is solving security challenges in a Cisco ACI fabric.

    Join us and learn what every networking or security professional should know about how Palo Alto Networks firewalls can be integrated with Cisco ACI fabric to protect your application workloads across a Cisco ACI enabled hybrid data center.

    In this webinar you will:

    · See demos on how best to deploy Palo Alto Networks firewalls within Cisco ACI
    · Learn about design considerations for firewall insertion
    · Hear real world deployment use cases and best practices
    · Get your questions answered in our live Q&A

    Learn how best to deploy Cisco ACI and Palo Alto Networks technologies in your modern hybrid data center.
  • Threat Hunting 101 Sep 25 2019 6:00 pm UTC 60 mins
    Kasey Cross, Sr Product Manager; Mike Gotham, Threat Hunter
    Skilled and stealthy attackers have broken into some of the best-protected organizations. They trick users, compromise hosts and utilize any number of other underhanded schemes to infiltrate targeted networks.

    Your mission is simple on paper, but harder to execute in practice: find these hidden adversaries and root them out fast, before they can really do some serious damage.

    Join our live webinar to learn the latest techniques for more efficient threat hunting and accelerated investigations. You’ll learn how to:

    - Quickly uncover hidden threats
    - Accurately assess the scope and severity of an attack
    - Thoroughly investigate alerts quickly
    - Turn threat hunting discoveries into automated detections
  • Visibility, Compliance and Control across the Application Lifecycle Sep 24 2019 11:00 am UTC 45 mins
    David Maclean, Cloud Security Systems Engineer, Palo Alto Networks
    For many organisations, the cloud has become the sole route to market for new application deployments. It provides greater agility and scalability, higher performance, and faster access to innovative technologies, all of which help organisations gain a competitive edge.

    As a result, data and applications now live in multiple cloud environments, including private and public clouds, spanning infrastructure, platform and software as a service. This complexity can result in poor visibility and an increase in vulnerabilities without an appropriate security and compliance strategy in place.

    In this webinar, we’ll cover:
    * Common speed bumps your security and DevOps teams face
    * Innovative security strategies to tackle a wide range of cloud risks
    * Security automation and integration within the development lifecycle
    * Achieving consistent and advanced multi-cloud protections

    Learn how to secure your cloud applications using advanced protections delivered via a frictionless approach.
  • [PANEL] Multiple Clouds, Multiple Concerns - Best Practices for Cloud Security Sep 23 2019 3:00 pm UTC 60 mins
    Clarify360 | Nuvalo| Optimized Channel | Palo Alto Networks | SonicWall
    According to Forrester's Cloud Security Solutions Forecast 2018 to 2023 report, the global spend for cloud security technologies will reach $12.7 billion by 2023, mostly driven by financial services organizations. This spend likely won't flow into a single vendor, as organizations are increasingly relying on several options for securing their clouds.

    Join this keynote panel of experts to learn more about the biggest trends in cloud security, as well as the best practices for securing your multi clouds:
    - Crucial steps companies should be taking as they move data and processes to multiple cloud environments
    - Understanding the shared responsibility model in the context of infrastructure-as-a-service (IaaS), software-as-a-service (SaaS), and platform-as-a-service (PaaS)
    - Protecting and planning for the future

    - Jo Peterson, Vice President, Cloud and Security Services, Clarify360

    - Manon Buettner, CEO & Co-Founder, Nuvalo
    - Michelle Ruyle, CEO & Founder, Optimized Channel
    - Fred Streefland, Chief Security Officer,, North and North East Europe, Palo Alto Networks
    - John Aarsen, Benelux & Nordics Solutions Architect, SonicWall

    Join BrightTALK's LinkedIn Group for IT Security: http://bit.ly/2IsbauU
  • To Get Google Cloud Security Right, Retailers Shift Left Sep 19 2019 5:00 pm UTC 60 mins
    Matt Helin, Sr Mngr. of security engineering at Wayfair, Rob Sadowski, trust & security marketing lead at Google Cloud
    To stay competitive, retailers are facing tremendous pressure to digitally transform their operations and accelerate the delivery of new business capabilities. Customers increasingly expect more personalized, differentiated experiences, both in-store and online.

    Leveraging the cloud as a strategic enabler helps retailers accelerate this innovation and provides the flexibility to securely scale during peak buying periods like Black Friday, Cyber Monday or over busy holiday seasons.

    Not long ago, Wayfair was like most companies – managing co-located data centers full of VMs and physical machines. Today, they’ve expanded their infrastructure footprint to Google Cloud Platform which houses Wayfair’s storefront application and serves thousands of customers every hour.

    Join our live webinar with Wayfair’s senior manager of cloud security, Matt Helin, and learn about Wayfair’s move to the public cloud and how they addressed challenges around securing their Google Cloud environments by basically shifting security left in their journey.

    Matt will be joined by Rob Sadowski, trust and security product lead for Google Cloud and Keith Mokris, product marketing manager for Prisma Cloud at Palo Alto Networks. Together, they’ll cover:

    - How the cloud helps retailers accelerate innovation with flexibility to scale as needed
    - Strategies for securely implementing infrastructure as code and containers
    - Accelerating app development by taking a more CI/CD-based DevOps style approach
  • Is security the #1 obstacle in your journey to the cloud? Recorded: Sep 17 2019 54 mins
    Jason Georgi, Field Chief Technology Officer for Prisma Access and SaaS at Palo Alto Networks
    Cloud adoption has led to branch locations and mobile users going direct-to-internet, often without connecting to remote-access VPNs. The patchwork days of backhauling data over a VPN (or MPLS) to HQ then hair pinning it to the cloud to keep up with users are over. But, it doesn't mean maintaining consistent security at different locations has to be an obstacle. To keep up, you need to use the cloud to your advantage. By building security policies directly in the cloud, you create consistent protection wherever your users are, at headquarters, branch offices, or on the go as well as your applications, in the data center, and the cloud.

    Join the webinar and learn key requirements for complete cloud security and walk away with confidence knowing you can:

    - Protect any data stored within cloud applications
    - Control access to the cloud from anywhere
    - Secure access to all applications built in the cloud
  • Protect your business with Security delivered from the cloud Recorded: Sep 11 2019 36 mins
    Brian Tokuyoshi, Sr. Product Marketing Manager, Palo Alto Networks
    Your security should be consistent wherever your users are, whether at headquarters, branch offices, or on the go. The same goes for your applications, whether in your data center or the cloud. However, maintaining consistent security at different locations, while also ensuring optimum networking and performance, is difficult, especially given the limitations of most networking and security technologies. First-generation cloud-delivered security, such as proxies, DNS filtering, and cloud access security broker proxies provide only limited security capabilities and often result in latency and other performance limitations.

    Join this webinar for an in depth overview of how Prisma Access delivers protection from over 100 locations around the world from a cloud-native infrastructure that dramatically simplifies cloud access and networking – without compromising on security or performance. Key security and networking outcomes include:

    - Secure traffic across all ports and all applications
    - Support for complete networking and security needs for both mobile and remote networks
  • Don’t Get Pwned: Cloud Threat Intelligence to Empower Your Business Recorded: Sep 10 2019 55 mins
    Matt Chiodi, Nathaniel “Q” Quist and Jay Chen
    The new wave of innovative features – coming out almost daily – has led to excessively complex multi-cloud environments. Although IT and security organizations understand the Shared Responsibility Model conceptually, research shows a breakdown when the concept is put into practice.

    During a year-long investigation, Palo Alto Networks Unit 42 threat research team collected data from more than 100 billion public cloud events and 21 recent high-profile cloud breaches, finding a consistent culprit: a lack of understanding around the Shared Responsibility Model, especially who is responsible for what. The resulting report provides comprehensive threat intelligence, tools and best practices to help fulfill your cloud security responsibilities.

    In this webinar, we’ll discuss Unit 42’s findings, provide insight into attackers’ tactics, techniques and procedures, and give you some actionable prevention advice so you can go cloud-first safely and stop:

    - Rising exposure risks from container adoption
    - Malware from extending its reach into the cloud
    - Cloud complexity from creating low-hanging fruit for attackers
    - On-premises vulnerability management habits from carrying over to the cloud

    Register for "Don’t Get Pwned: Cloud Threat Intelligence to Empower Your Business" now.
  • Orchestrieren Sie Ihre Sicherheitstools mit automatisierten DEMISTO Playbooks Recorded: Sep 6 2019 55 mins
    Dirk Thelen, Florian Schmidt
    Im Cyberspace heißt es immer häufiger 'Mensch gegen Maschine'. Diesem unfairen Kampf kann man mit Automatisierung begegnen.

    SOAR-Lösungen ermöglichen Unternehmen, Daten über Sicherheitsbedrohungen aus verschiedenen Quellen zu sammeln und auf Zwischenfälle mithilfe von standardisierten und automatisierten Aktionen (Playbooks) ohne menschliche Hilfe zu begegnen - natürlich herstellerübergreifend.

    In diesem Webcast zeigen unsere Spezialisten Dirk Thelen und Florian Schmidt, wie DEMISTO diese Funktion bereitstellt und Ihren Analysten bei der Arbeit durch die Automatisierung von Aktivitäten hilft. Dadurch haben Sie die Chance, Ihren Angreifern auf Augenhöhe zu begegnen und Zeit zu gewinnen.

    Der interaktive Webcast beinhaltet:

    -Eine Einführung in SOAR-Systeme (Security Orchestration, Automation and Response)
    -Die Erklärung der Besonderheiten der marktführenden Lösung DEMISTO
    -Einen praktischer Demo-Teil
    -Fragen und Antworten
  • Protecting Data in Your Cloud Applications Recorded: Sep 5 2019 50 mins
    Venkat Krishnamoorthi, Director, Product Management, Palo Alto Networks
    Cloud-based collaboration applications enhance your employees’ productivity and enable collaboration with partners and others. However, this may also result in increased risk for data exposure – whether accidental or malicious. In addition, regulatory compliance requirements drive data protection needs. In this session, we will dive deep into how you can secure your data for various SaaS apps using our current and upcoming DLP capabilities, that can be used for all your SaaS data protection needs – whether it is data-in-motion or data-at-rest!
  • Comment choisir le meilleur EDR disponible sur le marché? Recorded: Sep 4 2019 62 mins
    Jean-Philippe Resca
    Sélectionner son outil de Endpoint Detection & Response (EDR) est complexe.

    Le standard de modélisation MITRE ATT&CK est utilisé pour évaluer l'efficacité et l'efficience des meilleures offres EDR disponibles aujourd'hui.

    Comprenez comment vos outils EDR actuels se comparent dans ce standard grâce aux résultats l’évaluation de la première ronde de MITRE, qui teste plusieurs fournisseurs à travers une liste exhaustive de capacités et de techniques utilisées par les adversaires dans des attaques réels..

    Rejoignez-nous pour apprendre de nos experts lors de ce webinaire en direct :

    · L'explication des techniques utilisées dans le cadre MITRE ATT&CK
    · Examiner les résultats des tests, leurs implications et leur lien pour la sélection d'un EDR.
    · Examiner comment notre approche XDR a donné des résultats qui se distinguent des offres EDR traditionnelles.
  • Unpacking the MITRE ATT&CK Evaluation featuring Forrester Recorded: Aug 29 2019 30 mins
    Josh Zelonis, Peter Havens & Zeynep Ozdemir
    An Expert's View on the MITRE ATT&CK Evaluation featuring Josh Zelonis

    MITRE, the world's largest collector of real attack techniques, provides organizations with in-depth detail across 12 categories of tactics, how they're used, and how to mitigate them. Pulling from this data, the ATT&CK evaluation has quickly become the standard by which endpoint detection and response (EDR) offerings are judged through a real-world red/blue team exercise.

    Join guest speaker Josh Zelonis, Forrester, Senior Analyst, and Peter Havens, Palo Alto Networks, as they dive into first-round evaluation results using techniques sourced from APT3, a sophisticated Chinese threat group. MITRE used APT3's playbook to test the ten leading EDR vendors, including leveraging post-exploit behavior, credential harvesting, on-keyboard commands, scripting techniques, and anti-EDR capabilities. This packed session will provide a deep-dive on:

    * How security emulation and testing tools were used to break into systems
    * The details with real screen shots and specific outcomes of tested attack techniques across different products
    * Why Forrester's ranking system is becoming the standard to evaluate EDR products and how you can use it
    * How to objectively choose the right EDR based on Forrester's research
  • Cortex XDR & Traps 6.1: Mit der führenden EDR-Lösung Security-Silos niederreißen Recorded: Aug 19 2019
    Dirk Thelen und Bastian Schwittay
    Cortex XDR Detection and Response integriert Netzwerk-, Endpunkt- und Clouddaten, um komplexe Cyberangriffe abzuwehren. Dank rapider Weiterentwicklung wurden in Cortex XDR gerade einmal 5 Monate nach Erscheinen bereits zahlreiche Innovationen implementiert, die es Kunden immer besser ermöglichen, Bedrohungen aufzudecken, diese tiefgehend zu analysieren und darauf zu reagieren.

    In diesem Webinar werden wir Ihnen die wesentlichen Neuerungen in Cortex XDR & Traps 6.1 vorstellen, unter anderem:

    -Erweiterte XDR Datensammlungs- und Responsefunktionen für
    Windows und
    -Optimierte Verwaltung von XDR Incidents
    -Integration von Threat Intelligence und Demisto per API
  • SSL Decryption Deep Dive Recorded: Aug 15 2019 73 mins
    Mandeep Singh Sandhu and Sandeep Ghosh, with Host Karin Shopen
    Recent technology trends have led to a marked increase in the amount of TLS traffic, as it provides confidentiality and trust. However, this also presents an opportunity for attackers to hide malicious activity and calls for an even more pressing need for SSL Decryption.

    In this session, you will:
    -Hear about recent innovations in PAN-OS 9.0 that help customers streamline SSL Decryption best practices and get full visibility into protocols like HTTP/2
    -Learn about a best practice implementation strategy for SSL Decryption

    Bring your questions for our experts, and come get a look at SSL Decryption "under the hood."

    This is a 60-minute session with 15-minutes of live Q&A to follow.
  • Cortex XDR & Traps 6.1: Mit der führenden EDR-Lösung Security-Silos niederreißen Recorded: Aug 9 2019 61 mins
    Dirk Thelen und Bastian Schwittay
    Cortex XDR Detection and Response integriert Netzwerk-, Endpunkt- und Clouddaten, um komplexe Cyberangriffe abzuwehren. Dank rapider Weiterentwicklung wurden in Cortex XDR gerade einmal 5 Monate nach Erscheinen bereits zahlreiche Innovationen implementiert, die es Kunden immer besser ermöglichen, Bedrohungen aufzudecken, diese tiefgehend zu analysieren und darauf zu reagieren.

    In diesem Webinar werden wir Ihnen die wesentlichen Neuerungen in Cortex XDR & Traps 6.1 vorstellen, unter anderem:

    -Erweiterte XDR Datensammlungs- und Responsefunktionen für
    Windows und macOS
    -Optimierte Verwaltung von XDR Incidents
    -Integration von Threat Intelligence und Demisto per API
  • Secure Access Control for Mobile Users Recorded: Jul 25 2019 60 mins
    Sarvesh Rao and Ron Dodge, with Host Karin Shopen
    With mobile workers now using the cloud and the internet to access critical applications, it is crucial that businesses secure beyond their data center. However, with threats continuously advancing, traditional remote access VPN is just simply not enough.

    In this session, our team of experts will discuss how with Global Protect businesses can:
    · Extend consistent security policies to all workers regardless of their location
    · Implement a zero trust architecture
    · Protect against advanced threats

    Learn how GlobalProtect can eliminate remote access blind spots while strengthening security.

    Bring your questions for our experts. Hope you'll join us.
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Implement User-based Controls for Cybersecurity
  • Live at: Jan 18 2017 5:00 pm
  • Presented by: Navneet Singh, Product Marketing Director, Next-Generation Firewall
  • From:
Your email has been sent.
or close