Hi [[ session.user.profile.firstName ]]

Take Back Control of Your DNS Traffic

DNS is wide open for attackers. Security teams are under pressure to enforce consistent protections for millions of new malicious domains while keeping up with advanced tactics like DNS tunneling. How can you take back control of your DNS traffic and prevent these threats?

Join Palo Alto Networks experts to see:
• How real-world threats found by Unit 42 use DNS for command-and-control and data theft.
• Challenges in addressing DNS-based attacks faced by the Palo Alto Networks SOC team.
• Best practices for protecting DNS traffic to keep your organization safe.

You’ll also get your questions answered in our live Q&A when you join us for this interactive session. Learn what you should be doing to protect your DNS traffic today—and how to stay ahead of emerging tactics.
Recorded Mar 19 2019 43 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bryan Lee, Martin Walter, and Stan Lee, with host Zoltan Deak
Presentation preview: Take Back Control of Your DNS Traffic
  • Channel
  • Channel profile
  • Data Center Hybrid Cloud Overview Jul 11 2019 5:00 pm UTC 60 mins
    Sam Rastogi, Senior Product Marketing Manager, Data Center Security
    Data is now everywhere. Application workloads are moving across multiple data centers as well as private, public and hybrid clouds. New trends in the data center and hybrid cloud IT help organizations deliver greater business opportunities, but introduce new risks.

    Watch this webinar and learn how to rethink your approach to security to better protect your data and workload in the data center and across multi-cloud environments.

    You will:
    •Hear about key trends, challenges, and Palo Alto Networks Data Center Security strategy
    •Get a security architecture overview and technology deep dive
    •Learn best practices and use cases to extend security everywhere across on-prem data centers, private clouds, and public clouds
    •Get your questions answered in our live Q&A
  • Network Security Management Best Practices: Getting the Most Out of Panorama Jun 20 2019 5:00 pm UTC 60 mins
    Charul Sadwelkar and Ron Dodge with Host Karin Shopen
    Panorama™ network security management simplifies firewall management by delivering comprehensive controls and deep visibility into network-wide traffic and security threats. Whether you have a handful or hundreds of firewalls, Panorama can help you maintain effective security across all of them. Watch Palo Alto Networks experts discuss key network security management concepts and best practices for using a centralized firewall management.

    In this webcast, you will learn best practices for:
    •Maintaining centralized configurations, tracking changes, and streamlining workflows using Panorama
    •Automating manual and repetitive tasks using Panorama and third party integrations to free up time and save effort
    •Using various central security management concepts for reducing the time you spend on managing network and security configuration

    Join us to learn about how Panorama and its new 9.0 features can help you gain efficacy and efficiency. Bring your questions, our experts will also answer them live in a Q&A.
  • Peer Exchange: State of North Dakota's Zero Trust Strategy Jun 19 2019 5:00 pm UTC 60 mins
    Ryan Kramer, Enterprise Network Architect, State of North Dakota & John Kindervag, Founder of Zero Trust
    Automating Cybersecurity While Preventing Untrusted Systems and Cyberthreats From Compromising State Assets

    Zero Trust and the principles of “never trust, always verify” are becoming more widely known across industries as a model for fighting cybercrime, by eliminating “trust” for both external and internal systems and networks. Is it feasible to implement a Zero Trust strategy in government settings, similar to the private sector?

    Watch as Palo Alto Networks® expert and founder of Zero Trust, John Kindervag, discusses the “whys and hows” of extending a Zero Trust architecture to the network and cloud, and Ryan Kramer, Enterprise Network Architect from State of North Dakota, about their successful Zero Trust and cloud-first implementation to enhance agility and efficiency. Ryan will highlight how the State of North Dakota adopted a Zero Trust posture to automatically detect and defuse cyberthreats on networks, endpoints, and clouds to prevent them from infiltrating state-wide operations.
  • Protect the Endpoint: Stay Ahead of Threats Jun 11 2019 5:00 pm UTC 60 mins
    Danny Milrad, Director of Advanced Endpoint Protection
    Adversaries continue to target your endpoints with malware, ransomware and other dynamic threats. To stay ahead, you need to stop attacks with proven protection and critical detection and response capabilities in a single agent.

    Join our live webinar with Danny Milrad, director of advanced endpoint protection, who will discuss:

    - Why current approaches aren’t effective on the endpoint
    - How today’s threats take advantage of legitimate system processes
    - Strengthening and simplifying endpoint protection, detection and response

    You’ll find out how our prevention-first approach, coupled with critical detection and response capabilities, strengthens and simplifies your endpoint security.
  • Five Ways to Find an Active Attacker May 28 2019 9:00 am UTC 60 mins
    Kasey Cross, Sr. Product Marketing Manager and Bryan Lee, Unit 42 Principal Researcher,
    You can locate and stop attackers from within your infrastructure if you know what to look for – and if you can get out of your own way.
    To predict common attack tactics like use of stolen credentials, learning your organization’s topology and managing compromised systems from the internet, you need a new way to detect, investigate and respond.

    Watch the webinar with Bryan Lee, Unit 42 principal researcher, and Kasey Cross, senior product marketing manager, to learn:

    * Five tactics attackers often use to find, access and steal data
    * Best practices to detect and stop sophisticated attacks
    * Real-world examples of highly evasive as well as low-and-slow attacks

    You’ll learn how to identify and stop attackers by removing security silos, automating and stitching together all network, endpoint and cloud data, and moving from labor-intensive, manual tasks to automated processes with Cortex XDR™ detection and response.

    Join us and learn how to identify and stop attackers by removing security silos, automating and stitching together all network, endpoint and cloud data, and moving from labor-intensive, manual tasks to automated processes with Cortex XDR™ detection and response.
  • Don't Open These - The Five Most Dangerous File Types Recorded: May 21 2019 70 mins
    Palo Alto Networks experts John Harrison, Alex Hinchliffe and Erik Yunghans
    So many breaches and infections start with someone in your organization innocently clicking on a legitimate-seeming attachment or document.

    You probably know that opening these files and attachments without the proper security in place can put you and your company at serious risk, but how do you know which files are malicious and what are the most effective means to counter them?

    Join our webinar and learn how WildFire, file blocking and SSL decryption are key to successfully protecting your organisation.

    Palo Alto Networks experts John Harrison, Alex Hinchliffe and Erik Yunghans will examine the latest automated and evasive attack techniques adversaries are using to bypass your defences. You’ll learn about the five major malicious file types you need to protect against and – more importantly – exactly how you can stop them, drawing on our experiences with attack frameworks and our own Unit 42 playbooks.

    With live demos, examples of what to watch out for and how to effectively block these threats, this is a webinar you won’t want to miss.
  • Extending Zero Trust to the Cloud Recorded: May 17 2019 61 mins
    John Kindervag
    Zero Trust continues to gain traction as more and more enterprises adopt it to effectively segment their networks. As these enterprises have embraced the model, it’s evolved into a key strategic security initiative they’re using to prevent successful cyberattacks.


    That said, is Zero Trust merely a compelling theory, or is it a readily implementable and practical cybersecurity strategy?


    Watch this webinar as Palo Alto Networks expert and creator of Zero Trust, John Kindervag, discusses the few challenges and many benefits of extending a Zero Trust architecture to the public and private cloud.


    John is joined by Rob LaMagna-Reiter, CISO of First National Technology Solutions, to talk about successful Zero Trust cloud operations, business drivers and implementation strategy.


    You’ll learn:
    -Real-world business challenges and results
    -Key Zero Trust drivers and how to implement them
    -How to extend a Zero Trust architecture to the cloud
  • URL Filtering Best Practices: Making Your Web Security Policies Work For You Recorded: May 16 2019 61 mins
    Kelvin Kwan and Suzanne VanPatten with Host Zoltan Deak
    As attackers evolve and progress, organizations require increased flexibility that goes beyond the traditional binary categorization and policies for URLs. With the recent release of PanOS 9.0 we’ve added powerful new capabilities to our URL Filtering service to help keep your users safe without complicating your security policies.

    Join our experts as they provide best practice recommendations pertaining to risk, multi-category, and policy actions. We’ll show how you can prevent successful attacks when you:
    •turn on selective SSL decryption
    •enable credential theft protection
    •utilize automated actions

    Take your web security policy beyond categorizing web sites and turn it into a critical component of your security strategy. Join us for insights and answers to your web security questions.
  • Cloud Native Security: What’s Missing? Recorded: May 14 2019 42 mins
    Speaker: Tim Prendergast, Chief Cloud Officer at Palo Alto Networks
    As organizations adopt public cloud to accelerate development and reduce reliance on traditional datacenters, risk management remains a top concern. It’s well understood that legacy security tools designed for the datacenter cannot adapt to the distributed, dynamic nature of cloud environments, but what about the security tools offered by the cloud providers? Can they offer the visibility and control needed to effectively manage risk and mitigate vulnerabilities? We take a deep dive into native cloud security to see how these tools work and uncover if they can effectively support the differing security requirements across SecOps, DevOps, and compliance teams.
  • Five Ways to Find an Active Attacker Recorded: Apr 30 2019 59 mins
    Kasey Cross, Sr. Product Marketing Manager and Bryan Lee, Unit 42 Principal Researcher,
    Today’s attackers are using elusive tactics like leveraging stolen credentials and managing compromised systems from the internet.

    That said, it’s possible to locate and stop attackers from within your infrastructure with the help of automated detection and response.

    Watch the webinar as Palo Alto Networks' Bryan Lee, Unit 42 Principal Researcher, and Kasey Cross, Sr. Product Marketing Manager, explain in detail:

    ●Best practices to detect and stop sophisticated attacks
    ●Five tactics attackers often use to find, access and steal data
    ●How to identify highly-evasive as well as low and slow attacks

    Join us on April 30 at 11:15 a.m. PT for the webcast and live Q&A session.
  • Zero Trust Segmentation through VLAN Insertion for ICS/SCADA Recorded: Apr 30 2019 49 mins
    Lionel Jacobs
    It’s a new day for industrial automation and control systems.

    In the last few years, automation, AI and machine learning have brought the energy sector, critical infrastructure and manufacturing industries unprecedented agility, speed and cost savings.

    However, as often happens during times of rapid change, this integration has also brought with it IT vulnerabilities. These, in turn, have attracted malicious actors looking to disrupt critical processes and steal confidential information.

    One of the major areas of concern for ICS and SCADA operators is unsegmented networks, and cybersecurity professionals agree that network segmentation is a crucial step in network security.

    A Zero Trust approach is the answer. Watch this webinar designed specifically for ICS and SCADA professionals and you’ll:

    • Learn how to easily segment a process control network without having to re-IP your devices.

    • Find out how to appropriately secure your critical operations infrastructure using a Zero Trust strategy.

    • Hear how PAN-OS 9.0 can help design layer seven application security policies.

    • Get your questions answered in our live Q&A

    The webinar will show you how to achieve Zero Trust Segmentation through VLAN Insertion for ICS/SCADA.
  • Adiós al pensamiento aislado en materia de seguridad Recorded: Apr 24 2019 121 mins
    Jesus Diaz Barrero, Manager, Systems Engineering Spain & Portugal
    Comienza una nueva era de la detección

    Ya está aquí: una estrategia de detección y respuesta que acaba con el pensamiento aislado e integra a la perfección los datos de los endpoints, las redes y la nube para frenar amenazas sofisticadas.

    Jesús Díaz Barrero, ingeniero de Sistemas de Palo Alto Networks España y Portugal, le cuenta sin rodeos cómo Cortex XDR™ ofrece una detección y respuesta nunca vistas.

    La sesión tratará sobre:
    •La importancia de utilizar cualquier fuente de datos
    •El papel del análisis del comportamiento en la detección de amenazas sofisticadas
    •La manera en la que la IA reducirá dramáticamente la complejidad de las investigaciones

    Participe en este seminario web para ser testigo en primera persona de una demostración de Cortex XDR™. Además, tendrá la oportunidad de plantear cualquier duda a nuestro experto durante el turno de preguntas.

    ¿No puede asistir? Inscríbase de todos modos y tendrá acceso a la grabación a la carta.
  • Brisez les silos de sécurité. Découvrez Cortex XDR. Recorded: Apr 18 2019 44 mins
    Jean-Philippe Resca, directeur commercial France - Palo Alto Networks
    Ça y est ! La nouvelle génération de plateforme de détection et de réponse est enfin arrivée. Avec elle, vous allez enfin pouvoir maintenant intégrer l’ensemble des données des réseaux, terminaux et clouds pour stopper les attaques avancées.

    Jean-Philippe Resca, directeur commercial France, fera un point concret et sans filtre sur les fonctionnalités révolutionnaires de détection et de réponse de Cortex XDR™.

    Au sommaire de cette session :

    Comment utiliser toutes les sources de données combinées et quels en sont les avantages
    Le rôle de l'analyse comportementale dans la détection des menaces avancées
    Comment l'Intelligence Artificielle va considérablement simplifier la complexité des investigations

    Assistez à notre webinar pour une démo Cortex XDR™ en direct et posez vos questions à notre expert au cours d'une séance de questions-réponses.

    Vous ne pouvez pas assister au direct ? Inscrivez-vous quand même et nous vous enverrons l’enregistrement de l'évènement.
  • Debunking the Myth Around Implementing Zero Trust Recorded: Apr 16 2019 64 mins
    John Kindervag, Field CTO and Scott Stevens, SVP Global Systems Engineering, Palo Alto Networks
    One of the mythologies surrounding Zero Trust is that it is difficult and expensive to implement. Not true! In this webcast, John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks and Scott Stevens, SVP Global Systems Engineering at Palo Alto Networks debunk this myth.

    Join us for this webcast and learn:
    •How Zero Trust is easy to implement using an iterative approach designed to mitigate disruption or downtime
    •The five key steps to implementation
    •Why Zero Trust is easy to measure, including maturity metrics for Zero Trust

    You’ll also get your questions answered in our live Q&A.
  • Are You CloudFit? Twelve AWS Best Practices Recorded: Apr 9 2019 61 mins
    John Martinez, Director of Technical Support at Palo Alto Networks
    As the cloud constantly evolves, how do you keep your cloud “in shape” as well as ensure long-term protection and success?

    By implementing best practices and identifying issues before they become costly problems, you’ll improve your cloud security and operations to handle any threat that comes through.

    In this webinar, our expert panel will highlight the critical cloud security and compliance “exercises” that will keep your organization’s data and systems secure in Amazon Web Services, so you can:

    * Improve your overall cloud security and health
    * Minimize the impact of human errors on your AWS® cloud
    * Encourage a more defensive mindset across your organization
  • Debunking the Myth Around Implementing Zero Trust Recorded: Apr 4 2019 63 mins
    John Kindervag, Field CTO and Scott Stevens, SVP Global Systems Engineering, Palo Alto Networks, with host Karin Shopen
    Zero Trust has become a global strategic initiative for preventing successful cyberattacks by eliminating the concept of “trust” from digital systems.

    Yet, when it comes to actually implementing a Zero Trust strategy within your organization, perceptions can be skewed, like thinking Zero Trust is challenging to set up and costly to implement – neither of which is true.

    In this webcast, John Kindervag, creator of Zero Trust and field CTO, and Scott Stevens, SVP of Global Systems Engineering, will debunk the myth and teach you:
    * What Zero Trust is and is not
    * A five-step methodology for implementing a Zero Trust network
    * How easy it is to achieve Zero Trust using a consistent approach

    Join our webcast with live Q&A and get insight into effectively implementing a Zero Trust strategy.
  • SD-WAN and Security at the Edge on Intel Architecture Recorded: Apr 4 2019 60 mins
    Ramnath D Shenai - VMware, Sam Rastogi - Palo Alto Networks, Goker Ozturk - Intel
    Enterprises are deploying SD-WAN, at an increasingly faster pace, as an important first step towards building optimized environments that are ready for multi-cloud world. As a platform, SD-WAN is a solid first step in deploying edge security applications and services with additional security functions like next-generation firewall (NGFW), intrusion prevention, SSL inspection, web filtering, DNS security, and malware analysis needed as well. In this webinar, we will discuss how VMware SD-WAN by Velocloud lays the foundation for SD-WAN and how Palo Alto Networks VM-Series and GlobalProtect security products complement and strengthen overall security to help organizations prevent successful cyberattacks. We will also discuss how Intel architecture, network and security specific hardware and software technologies help these workloads operate in a consistent, saleable and high performance way.
  • Take Back Control of Your DNS Traffic Recorded: Apr 2 2019 44 mins
    Bryan Lee and Martin Walter, with host Zoltan Deak
    DNS is wide open for attackers. Security teams are under pressure to enforce consistent protections for millions of new malicious domains while keeping up with advanced tactics like DNS tunneling. How can you take back control of your DNS traffic and prevent these threats?

    Join Palo Alto Networks experts to see:
    • How real-world threats found by Unit 42 use DNS for command-and-control and data theft.
    • A detailed demo of how the new DNS Security service disrupts attacks that use DNS.
    • Best practices for protecting DNS traffic to keep your organization safe.

    You’ll also get your questions answered in our live Q&A when you join us for this interactive session. Learn what you should be doing to protect your DNS traffic today—and how to stay ahead of emerging tactics.
  • Build Security In: Cloud Security at DevOps Speed Recorded: Mar 22 2019 55 mins
    Rick Collette, Cloud Architect at Palo Alto Networks; John Martinez, Director of Public Cloud R&D, Palo Alto Networks
    As DevSecOps adoption slowly goes mainstream among organizations, it is fundamentally changing the culture and collaboration semantics among security, development and operations teams.
    This webinar will explore whether SecOps and DevOps have been effective in fostering collaboration to align their different goals into a single effort or have they slipped into implementing primitive security models of the past. Is the union of DevOps and SecOps on rocky ground and in need of marriage counseling, or are they copacetic? In this webinar, we’ll explore the needs of DevOps, Security and IT and five principles that will help you move at the speed of cloud together without creating gaps in your security posture.
  • XDR - Neue Waffe im Kampf gegen Cyber-Angriffe Recorded: Mar 22 2019 63 mins
    Chistian Doolmann, Systems Engieneer Specialist, Palo Alto Networks
    Cyber-Attacken erfolgen heutzutage häufig direkt über gezielt ausgewählte Endgeräte. Daher setzen viele Unternehmen auf EDR (Endpoint Detection and Response) als Lösung, um Cyberangriffe zu erkennen und darauf zu reagieren.

    Das Problem dabei: Die Sicht von EDR ist auf den jeweiligen Endpoint beschränkt, ergänzende Informationen fehlen und müssen mühsam und aufwändig ergänzt werden. Laut SANS Institute werden zudem nur 26% aller initialen Angriffsvektoren durch EDR-Lösungen erkannt.

    Eines wird dabei deutlich: Ein neuer Ansatz muss her! Und hier kommt XDR ins Spiel. Im Gegensatz zu EDR kombiniert es Daten aus verschiedenen Quellen wie zum Beispiel den Endpoints, dem Netz, der Cloud, Log-Daten mit allgemeinen Bedrohungsinformationen. Dadurch bringt es unterschiedliche Aspekte zusammen und liefert ein weitaus vollständigeres Bild eines Angriffs – der dank der integrierten Analysefunktionen schneller erkannt und besser abgeblockt werden kann.

    Wenn Sie erfahren wollen, wie Ihr Unternehmen dank XDR sicherer werden kann, dann sehen Sie sich dieses Webinar an.
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Take Back Control of Your DNS Traffic
  • Live at: Mar 19 2019 5:00 pm
  • Presented by: Bryan Lee, Martin Walter, and Stan Lee, with host Zoltan Deak
  • From:
Your email has been sent.
or close