Hi [[ session.user.profile.firstName ]]

Cloud Native Security: What’s Missing?

As organizations adopt public cloud to accelerate development and reduce reliance on traditional datacenters, risk management remains a top concern. It’s well understood that legacy security tools designed for the datacenter cannot adapt to the distributed, dynamic nature of cloud environments, but what about the security tools offered by the cloud providers? Can they offer the visibility and control needed to effectively manage risk and mitigate vulnerabilities? We take a deep dive into native cloud security to see how these tools work and uncover if they can effectively support the differing security requirements across SecOps, DevOps, and compliance teams.
Recorded Mar 21 2019 43 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Speaker: Tim Prendergast, Chief Cloud Officer at Palo Alto Networks
Presentation preview: Cloud Native Security: What’s Missing?
  • Channel
  • Channel profile
  • Technology Deep Dive for the Hybrid DC: Arista MSS and Palo Alto Networks Nov 21 2019 6:00 pm UTC 60 mins
    Christer Swartz and Sam Rastogi, with host Karin Shopen
    Arista Networks Macro-Segmentation Service (MSS), a capability within Arista CloudVision and Arista Data Center Switches, addresses a growing gap in security deployment for hybrid data centers. Arista MSS extends the concept of fine-grained security for VMs to the rest of the data center by enabling dynamic firewall services insertion by integrating with leading Palo Alto Networks Next-Generation Firewalls (NGFW) in the data center.

    Join our security experts and learn how you can deploy Arista MSS together with Palo Alto Networks NGFWs to inspect traffic and deliver robust security across a secure, resilient, and high-performance Arista data center fabric.

    In this webinar you will:

    · See demos on how best to deploy Palo Alto Networks firewalls across Arista MSS enabled next-generation data center
    · Learn about design considerations for firewall insertion
    · Hear real world deployment use cases and best practices
    · Get your questions answered in our live Q&A

    Learn how to protect your applications workloads across an Arista MSS enabled modern hybrid data center.
  • Best Practices For Stopping Theft and Abuse of Employee Credentials Oct 31 2019 5:00 pm UTC 60 mins
    Nithin Varam, Lior Kolnik, Stan Lee, with Host Karin Shopen
    The theft and use of stolen passwords is a common attack for adversaries, mostly because passwords are the weakest link in security. Plus, stealing credentials is much faster, cheaper and easier than having to find and exploit a vulnerability in a system.

    Once done, an adversary can bypass the entire attack lifecycle – impersonating a valid user – and move freely through the network. With inside access, an attacker can quickly move laterally to set up a broader footprint, compromise additional systems and steal other credentials along the way.

    In our new webcast, Best Practices for Stopping Theft and Abuse of Employee Credentials, our experts will:
    *Outline the common techniques attackers use
    *Provide best practices to prevent further credential attacks
    *Showcase Palo Alto Networks features you can enable now to protect your organization

    Get your questions answered, and learn how to stop credential theft and abuse in your organization today.
  • Five Ways to Find an Active Attacker Oct 31 2019 11:00 am UTC 58 mins
    Kasey Cross, Sr. Product Marketing Manager and Bryan Lee, Unit 42 Principal Researcher,
    Today’s attackers are using elusive tactics like leveraging stolen credentials and managing compromised systems from the internet.

    That said, it’s possible to locate and stop attackers from within your infrastructure with the help of automated detection and response.

    Watch the webinar as Palo Alto Networks' Bryan Lee, Unit 42 Principal Researcher, and Kasey Cross, Sr. Product Marketing Manager, explain in detail:

    ●Best practices to detect and stop sophisticated attacks
    ●Five tactics attackers often use to find, access and steal data
    ●How to identify highly-evasive as well as low and slow attacks

    Join us on October 31st at 11 a.m. GMT for the webcast and live Q&A session.
  • Securing the 5G-ready TelCo Cloud Oct 29 2019 5:00 pm UTC 60 mins
    Lakshmi Kandadai and Scott Stevens, with Host Karin Shopen
    While the technological shift from a closed and proprietary model to dynamic and scalable architectures brings agility and flexibility through network modernization, it also introduces a new security paradigm. Mobile network operators are not only responsible for hardening and securing the platform, underlying OS and the software stack, but must secure the applications (virtual network functions), as well, making it much more cumbersome and time-consuming to manage. 

    Manual security operations are not keeping pace with the migration to public, private, hybrid clouds and SDN/NFV environments. Workloads are becoming much more dynamic, so making sure that security is in lockstep towards these dynamic workloads is critical. As mobile network operators prepare for their network transformation by building 5G-ready telco clouds, you will need a resilient network with robust security mechanisms in place to support the diverse requirements of 5G-enabled applications and services. 

    In this webcast, you will: 

    * Find out about security implications of cloud adoption in telco environments
    * Learn about cloud-agnostic security enforcement at scale across distributed cloud architectures
    * Hear how to build a proactive defense around your telco cloud environments

    Bring your questions for our experts and join us for an interactive and informative session!
  • Walking The Walk: Deploying Cortex in Our SOC Oct 24 2019 6:00 pm UTC 60 mins
    Matt Mellen, Sr Manager, Security Operations
    Join this live webinar where practitioners at Palo Alto Networks Security Operations Center (SOC) share how they have deployed Cortex to solve some of the pressing problems in Cyber security. You will walk away with practical tips and recommendations to reduce the number of alerts, streamline vendor technologies and improve mean time to response. Using the Cortex AI platform, Palo Alto Networks has deployed innovative technology to detect sophisticated threats, accelerate investigations and improve the response.
  • Schützen Sie die geschäftskritischen Daten in Ihren SaaS-Anwendungen Oct 18 2019 10:00 am UTC 60 mins
    Markus Willmann und Michael Weisgerber
    Die Attraktivität von SaaS-Anwendungen wie Office 365®️, G Suite™️, Box und Salesforce®️ nimmt immer weiter zu, mit ihr aber auch die verborgenen Bedrohungen in SaaS-Angeboten: teure Datenverluste, Compliance-Probleme, Verbreitung von Malware usw. Der SaaS-Sicherheitsdienst Prisma™️ SaaS ergänzt Ihre bestehenden Sicherheitstools durch Datenklassifizierung, Prävention von Datenverlust und Bedrohungserkennung – sodass Ihre SaaS-Anwendungen optimal geschützt sind.

    In diesem Webcast zeigen unsere Spezialisten Markus Willmann und Michael Weisgerber wie Sie eine vollständige Transparenz über sämtliche Aktivitäten von Benutzern, Ordnern und Dateien erhalten. Durch die umfassende Auswertung des täglichen Nutzungsverhaltens erkennen Sie schnell, ob Datenrisiken oder rechtlich relevante Verstöße vorliegen.

    Der interaktive Webcast beinhaltet:

    -Eine Einführung in CASB Thematik
    -Die Erklärung der Besonderheiten der marktführenden Lösung Prisma SaaS
    -Einen praktischer Demo-Teil
    -Fragen und Antworten
  • Customer Rockstar: How Gainesville Leveled-up Endpoint Security Oct 17 2019 5:00 pm UTC 60 mins
    Jonathan Reich, City of Gainesville, City IT Manager
    Hear directly from Jonathan Reich, IT manager for City of Gainesville, on his move to Traps and viewpoint on the Cortex XDR vision. He will dig into how his small team replaced their legacy AV and got dramatically better security with less operational headache. Jonathan will provide an unbiased opinion on the key challenges, decision criteria, and in-depth details on how Traps works in the real-world. You'll walk away with a clear view of the before-and-after, including positives and potential risks.

    Join City of Gainesville’s IT Manager, Jonathan as he:
    - Shares the end-to-end story of choosing and migrating to Traps
    - Details how he achieved zero security events and more efficient security operations
    - Highlights key benefits like off-network protection and WildFire integration
  • Cloud Native Cybersecurity: Trends, Requirements, and Best Practices with ESG Oct 15 2019 5:00 pm UTC 60 mins
    ESG, Senior Analyst and Group Practice Director Doug Cahill & Palo Alto Networks Product Marketing Manager, Keith Mokris
    Join ESG and Palo Alto Networks to discuss how organizations can secure their cloud native applications.
  • Datacenter Design, Mikrosegmentierung und relevante Hardware/Software Updates Recorded: Oct 11 2019 61 mins
    Dirk Thelen und Nicholas Ackroyd
    Klassische Datacenter Designs werden immer mehr durch neue Technologien abgelöst, die auch die Grundlage aller großen Cloudanbieter darstellen. Die Rede ist natürlich von SDN, Underlay- und Overlay-Netzwerken, Mikrosegmentierung, Cisco ACI und Vmware NSX-T.

    In diesem Webinar verschaffen Ihnen unsere Spezialisten Dirk Thelen und Nicholas Ackroyd einen Überblick über aktuelle Technologien und wie Palo Alto Networks Ihnen als integrierte Sicherheitslösung dabei hilft, diese bestmöglich abzusichern.
  • Live webinar: Security walk-in clinic! Recorded: Oct 11 2019 29 mins
    Lindseigh Strickland
    A day in the life of a SecOps analyst typically starts with receiving multiple alerts or seeing a breaking threat on the news, which then sets a reactive process in motion. The following questions probably seem familiar:

    -Is everything you do complex and manual ?
    -Does it require working across multiple teams and tools?
    -Do you find your time filled with reactive, mundane and repetitive tasks, rather than being proactive?

    There has to be a better way!

    Join our live webinar to hear our customers' best practices when addressing these pain points.
  • Detecting Attacks with Machine Learning Recorded: Oct 10 2019 62 mins
    Yariv Shivek
    Noise is the enemy of detection and response. After data breaches, forensic investigators have often found warning signs left behind by adversaries, but these signs were buried amongst thousands of other security alerts, including countless false positives.

    Machine learning and behavioral analytics can provide security teams the edge they need to reduce noise and accurately pinpoint attacks. Machine learning models can classify devices and compare current behavior to past behavior and peer behavior to isolate real attacks. Unlike static rules, machine learning models can dynamically adjust to ignore unusual but benign activity, drastically reducing false positives.

    Attend this informative session to understand:
    - Real-world examples of machine learning models used to detect attacks
    - The key shortcomings with today’s approaches to machine learning and how security best practices and the right tools can overcome them
  • [Cloud Security Alliance] Don’t Let Your Security Slow Your Cloud Journey Recorded: Oct 1 2019 61 mins
    Jason Georgi, Field Chief Technology Officer for Prisma Access and SaaS at Palo Alto Networks
    Cloud adoption for some services is no longer optional, however security is what is overwhelmingly holding organizations back from doing more. Cloud and SaaS themselves are also evolving, which is changing the approach for securing access to them. The right security capabilities will allow you to address risk while having you ready for tomorrow.
  • URL Filtering Best Practices-- Making Your Web Security Policies Work for You Recorded: Sep 30 2019 52 mins
    John Harrison
    As attackers evolve and progress, organizations require increased flexibility that goes beyond the traditional binary categorization and policies for URLs. With the recent release of PanOS 9.0 we’ve added powerful new capabilities to our URL Filtering service to help keep your users safe without complicating your security policies.

    Join our experts as they provide best practice recommendations pertaining to risk, multi-category, and policy actions. We’ll show how you can prevent successful attacks when you:

    •turn on selective SSL decryption

    •enable credential theft protection

    •utilize automated actions

    Take your web security policy beyond categorizing web sites and turn it into a critical component of your security strategy. Join us for insights and answers to your web security questions.
  • Technology Deep Dive for the Hybrid Data Center:Cisco ACI and Palo Alto Networks Recorded: Sep 26 2019 61 mins
    Christer Swartz and Sam Rastogi, with host Karin Shopen
    For organizations like yours considering Cisco Application Centric Infrastructure (ACI) for the modern next-generation data center, you need to know the key requirements for security and how Palo Alto Networks is solving security challenges in a Cisco ACI fabric.

    Join us and learn what every networking or security professional should know about how Palo Alto Networks firewalls can be integrated with Cisco ACI fabric to protect your application workloads across a Cisco ACI enabled hybrid data center.

    In this webinar you will:

    · See demos on how best to deploy Palo Alto Networks firewalls within Cisco ACI
    · Learn about design considerations for firewall insertion
    · Hear real world deployment use cases and best practices
    · Get your questions answered in our live Q&A

    Learn how best to deploy Cisco ACI and Palo Alto Networks technologies in your modern hybrid data center.
  • Threat Hunting 101 Recorded: Sep 25 2019 53 mins
    Kasey Cross, Sr Product Manager; Mike Gotham, Threat Hunter
    Skilled and stealthy attackers have broken into some of the best-protected organizations. They trick users, compromise hosts and utilize any number of other underhanded schemes to infiltrate targeted networks.

    Your mission is simple on paper, but harder to execute in practice: find these hidden adversaries and root them out fast, before they can really do some serious damage.

    Join our live webinar to learn the latest techniques for more efficient threat hunting and accelerated investigations. You’ll learn how to:

    - Quickly uncover hidden threats
    - Accurately assess the scope and severity of an attack
    - Thoroughly investigate alerts quickly
    - Turn threat hunting discoveries into automated detections
  • Visibility, Compliance and Control across the Application Lifecycle Recorded: Sep 24 2019 42 mins
    David Maclean, Cloud Security Systems Engineer, Palo Alto Networks
    For many organisations, the cloud has become the sole route to market for new application deployments. It provides greater agility and scalability, higher performance, and faster access to innovative technologies, all of which help organisations gain a competitive edge.

    As a result, data and applications now live in multiple cloud environments, including private and public clouds, spanning infrastructure, platform and software as a service. This complexity can result in poor visibility and an increase in vulnerabilities without an appropriate security and compliance strategy in place.

    In this webinar, we’ll cover:
    * Common speed bumps your security and DevOps teams face
    * Innovative security strategies to tackle a wide range of cloud risks
    * Security automation and integration within the development lifecycle
    * Achieving consistent and advanced multi-cloud protections

    Learn how to secure your cloud applications using advanced protections delivered via a frictionless approach.
  • [PANEL] Multiple Clouds, Multiple Concerns - Best Practices for Cloud Security Recorded: Sep 23 2019 48 mins
    Clarify360 | Nuvalo| Optimized Channel | Palo Alto Networks | SonicWall
    According to Forrester's Cloud Security Solutions Forecast 2018 to 2023 report, the global spend for cloud security technologies will reach $12.7 billion by 2023, mostly driven by financial services organizations. This spend likely won't flow into a single vendor, as organizations are increasingly relying on several options for securing their clouds.

    Join this keynote panel of experts to learn more about the biggest trends in cloud security, as well as the best practices for securing your multi clouds:
    - Crucial steps companies should be taking as they move data and processes to multiple cloud environments
    - Understanding the shared responsibility model in the context of infrastructure-as-a-service (IaaS), software-as-a-service (SaaS), and platform-as-a-service (PaaS)
    - Protecting and planning for the future

    - Jo Peterson, Vice President, Cloud and Security Services, Clarify360

    - Manon Buettner, CEO & Co-Founder, Nuvalo
    - Michelle Ruyle, CEO & Founder, Optimized Channel
    - Fred Streefland, Chief Security Officer (CSO) for North & East-Europe (NEEUR), Palo Alto Networks
    - John Aarsen, Benelux & Nordics Solutions Architect, SonicWall

    Join BrightTALK's LinkedIn Group for IT Security: http://bit.ly/2IsbauU
  • To Get Google Cloud Security Right, Retailers Shift Left Recorded: Sep 19 2019 55 mins
    Matt Helin, Sr Mngr. of security engineering at Wayfair, Rob Sadowski, trust & security marketing lead at Google Cloud
    To stay competitive, retailers are facing tremendous pressure to digitally transform their operations and accelerate the delivery of new business capabilities. Customers increasingly expect more personalized, differentiated experiences, both in-store and online.

    Leveraging the cloud as a strategic enabler helps retailers accelerate this innovation and provides the flexibility to securely scale during peak buying periods like Black Friday, Cyber Monday or over busy holiday seasons.

    Not long ago, Wayfair was like most companies – managing co-located data centers full of VMs and physical machines. Today, they’ve expanded their infrastructure footprint to Google Cloud Platform which houses Wayfair’s storefront application and serves thousands of customers every hour.

    Join our live webinar with Wayfair’s senior manager of cloud security, Matt Helin, and learn about Wayfair’s move to the public cloud and how they addressed challenges around securing their Google Cloud environments by basically shifting security left in their journey.

    Matt will be joined by Rob Sadowski, trust and security product lead for Google Cloud and Keith Mokris, product marketing manager for Prisma Cloud at Palo Alto Networks. Together, they’ll cover:

    - How the cloud helps retailers accelerate innovation with flexibility to scale as needed
    - Strategies for securely implementing infrastructure as code and containers
    - Accelerating app development by taking a more CI/CD-based DevOps style approach
  • Is security the #1 obstacle in your journey to the cloud? Recorded: Sep 17 2019 54 mins
    Jason Georgi, Field Chief Technology Officer for Prisma Access and SaaS at Palo Alto Networks
    Cloud adoption has led to branch locations and mobile users going direct-to-internet, often without connecting to remote-access VPNs. The patchwork days of backhauling data over a VPN (or MPLS) to HQ then hair pinning it to the cloud to keep up with users are over. But, it doesn't mean maintaining consistent security at different locations has to be an obstacle. To keep up, you need to use the cloud to your advantage. By building security policies directly in the cloud, you create consistent protection wherever your users are, at headquarters, branch offices, or on the go as well as your applications, in the data center, and the cloud.

    Join the webinar and learn key requirements for complete cloud security and walk away with confidence knowing you can:

    - Protect any data stored within cloud applications
    - Control access to the cloud from anywhere
    - Secure access to all applications built in the cloud
  • Protect your business with Security delivered from the cloud Recorded: Sep 11 2019 36 mins
    Brian Tokuyoshi, Sr. Product Marketing Manager, Palo Alto Networks
    Your security should be consistent wherever your users are, whether at headquarters, branch offices, or on the go. The same goes for your applications, whether in your data center or the cloud. However, maintaining consistent security at different locations, while also ensuring optimum networking and performance, is difficult, especially given the limitations of most networking and security technologies. First-generation cloud-delivered security, such as proxies, DNS filtering, and cloud access security broker proxies provide only limited security capabilities and often result in latency and other performance limitations.

    Join this webinar for an in depth overview of how Prisma Access delivers protection from over 100 locations around the world from a cloud-native infrastructure that dramatically simplifies cloud access and networking – without compromising on security or performance. Key security and networking outcomes include:

    - Secure traffic across all ports and all applications
    - Support for complete networking and security needs for both mobile and remote networks
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cloud Native Security: What’s Missing?
  • Live at: Mar 21 2019 6:00 pm
  • Presented by: Speaker: Tim Prendergast, Chief Cloud Officer at Palo Alto Networks
  • From:
Your email has been sent.
or close