Hi [[ session.user.profile.firstName ]]

Top 10 Security Best Practices for Azure

As organizations migrate to the cloud, they often start by replicating their existing network architecture. This approach can be costlier and more difficult to manage than an architecture that leverages cloud-native capabilities that are not available in the data center. Microsoft Azure enables development teams to rapidly build and deploy global-scale applications, but with this ease and speed comes increased risk.

In this webinar, you will learn more about the best practices for deploying network virtual appliances in Microsoft Azure, including:
Designing network security for high availability and auto-scaling with Virtual Machine Scale Sets (VMSS) and Azure Load Balancer
Implement Accelerated Networking and deploy VM-Series virtualized firewalls with multiple NICs to increase throughput and performance
Automate virtualized firewall deployment configuration to ensure best practices are consistently implemented

Rise above the noise and confusion by using VM-Series virtualized firewall on Microsoft Azure that provides complete visibility across all of your workloads in Azure, and helps you automate security controls.
Recorded Jul 23 2019 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jigar Shah
Presentation preview: Top 10 Security Best Practices for Azure
  • Channel
  • Channel profile
  • Network Security’s Future is in the Cloud Feb 5 2020 11:00 am UTC 60 mins
    Joakim Ullgren
    Cloud adoption and user mobility are shifting the locations of applications, data and users. These changes create new vectors for cybersecurity risk. Organizations need a way to securely enable digital business transformation and innovation. We believe that this requires a fundamentally different approach: both security and networking must be delivered in the cloud.

    Join this discussion and explore best practices to secure your cloud initiatives with Prisma Access, a Secure Access Service Edge (SASE) platform, by bringing together industry-leading security and SD-WAN capabilities in the cloud.
  • Machine Learning 101: Streamline Security and Improve Response Time Feb 4 2020 11:00 am UTC 60 mins
    Harri Ruuttila
    Machine learning is changing the way we live our lives. It can reduce errors and even achieve the impossible by accomplishing tasks that cannot be performed manually.

    But how does it change the cybersecurity landscape? And, perhaps more importantly, how will it impact your career in security?

    You will come away understanding:

    -Where machine learning is used today in security
    -How it will be leveraged in the future
    -How you can simplify security operations with automation and machine learning
  • EMEA cybersecurity predictions 2020 Jan 22 2020 11:00 am UTC 60 mins
    Haider Pasha
    Wondering what 2020 will bring to the cybersecurity world?

    Join us for our Cybersecurity Predictions Webinar, where you’ll hear from Palo Alto Networks experts. This is an opportunity to learn about what awaits us in the upcoming year, from both an EMEA and Benelux standpoint.

    Join our chief security officer for:

    -Predicted trends for 2020
    -Global and local cybersecurity developments
    -A brief recap of the Ignite Europe conference and announcements

    Register today to get fully prepared for the new year.
  • Data Center and Hybrid Cloud Security Best Practices Jan 16 2020 6:00 pm UTC 60 mins
    Alex Berger and Christer Swartz, with Host Karin Shopen
    The modern data center is complex. A variety of workload types - from mainframes to virtual machines, bare metal servers to containers, physical desktops to virtual desktops - are commingled across multiple data centers, branch locations, and public clouds. They are connected by a combination of physical and virtual networks, all managed by different teams within IT. And as the cliche goes, “complexity is the enemy of security”.

    In this webinar, our experts will:
    explore the reality of securing modern data centers and hybrid clouds
    discuss best practices for holistically and consistently securing physical, virtual and public cloud environments
    offer practical insights into use cases and scenarios that we’ve encountered from our years of guiding customers through their cloud transformation journeys.
  • Want to troubleshoot your NGFW? Learn the Basic NGFW Troubleshooting Techniques Jan 15 2020 8:00 am UTC 60 mins
    Alaa Amarin
    As organisations cannot afford long service interruption, IT specialists don’t have time to open a TAC ticket every time - they need a solution to help them understand and fix issues faster.

    This webinar focuses on basic troubleshooting methodologies on the Palo Alto Networks NGFW, from analysing logs and global counters to collecting packet captures on both the Dataplane and Management Plane. It also focuses on what needs to be collected before opening a TAC Support Case for faster resolution. Moreover, we will be covering our Severity Definitions, SLAs and different support offerings.
  • Build Security In: Cloud Security mit DevOps Geschwindigkeit umsetzen Jan 9 2020 11:00 am UTC 60 mins
    Christopher Feussner
    In zunehmendem Maße werden Public Cloud Dienste durch Unternehmen genutzt, zugleich verwenden mehr und mehr Organisationen DevSecOps um ihre Applikationen und Dienste sicher zur Verfügung zu stellen. Dieser Ansatz führt zu einer fundamentalen Veränderung in der Zusammenarbeit und Kultur zwischen Security-, Development- und Operationsteams.

    In diesem Webinar tauchen wir in die Arbeitswelt von SecOps und DevOps ein, beleuchten ob die Zusammenarbeit zwischen den beiden Disziplinen, mit ihren unterschiedlichen Zielen zu einem gemeinsamen Ergebnis führen oder ob sie in alte Muster verfallen und überholte Sicherheitsmaßnahmen implementieren.

    Kann DevOps und SecOps einfach und ohne Weiteres miteinander kombiniert werden und was gilt es bei diesem Zusammenschluss zu beachten? Wir sprechen über die Notwendigkeit von DevOps, Security und IT. Mit Hilfe von fünf Prinzipien helfen wir ihnen, wie sie mit der Geschwindigkeit der Cloud Schritt halten können, ohne das ihre Security Lücken bekommt oder abgehängt wird.
  • Prisma Cloud - Die perfekte Security Suite für ihre Public Cloud Umgebungen Recorded: Dec 12 2019 59 mins
    Dirk Thelen und Marcus Stahlhacke
    Unternehmen gehen immer häufiger mit klassischen On-Premise Workloads in Public-Cloud-Umgebungen wie Azure, GCP oder AWS. Solch agile und dynamische Umgebungen brauchen auch ebenso flexible und angepasste Security Tools, um den Anforderungen an Sicherheit und Compliance solch hoch komplexer Umgebungen gerecht zu werden.

    Die Security-Spezialisten Marcus Stahlhacke und Dirk Thelen zeigen Ihnen, wie einfach Sie die Übersicht über Ihre Public-Cloud-Strukturen behalten, Security integrieren wo es darauf ankommt und stets Herr der Lage sind. Selbst Compliance Standards wie GDPR, Hippa oder PCI DSS haben Sie mit Prisma Cloud im Griff!
  • A Cloud Native Approach Demands Cloud Native Security Recorded: Dec 12 2019 43 mins
    Ashley Ward
    The Cloud Native Computing Foundation's charter describes how cloud native technologies empower organisations for modern and dynamic environments. Cloud Native security has to operate in the same way.

    In this talk we'll go through what this means, what you need to look out for, and how to achieve democratised cloud native security.
  • Securing Cloud Workloads in Public Sector Recorded: Dec 11 2019 55 mins
    Chris Fago, Audrey Namba
    Your organization is starting to adopt public cloud, and while the cloud might not be scary, the change is something you have to learn. What worked in the old data centers days simply will not translate to the public cloud. Which also means you have different things to worry about.

    Prisma Cloud is a multi-cloud API based public cloud security platform for AWS, Azure and Google Cloud Platform that is helping hundreds of the world's largest public cloud adopters to gain control of their cloud visibility, enforce governance and achieve continuous compliance.

    Any security vendor can show you a solution that is good at generating alerts, but join us on December 11th to learn how Prisma Cloud can show you what could go wrong, what is going wrong, and what alerts you need to prioritize immediately so that you can get back to work.
  • Alert Fatigue? Automate and Respond Faster with Demisto Recorded: Dec 11 2019 46 mins
    Abdullah Alshaer
    It seems like every security operations team faces the same challenges when it comes to incident management. Isn’t it about time someone came up with a solution?



    In this webinar, we will talk about our Security Orchestration, Automation and Response (SOAR) Solution, Demisto and how it helps solving pain points security teams face on a daily basis.



    You can also look forward to a demo to showcase the different features of the solution with a focus on a use case of how you can easily extract IOCs from email, enrich with threat intelligence, and then take the required action on the different security solutions your organization has.
  • Automatiser le déploiement d'infrastructures +sécurité +opérations dans le cloud Recorded: Dec 6 2019 65 mins
    Thomas Beaumont
    La transition vers AWS, Azure ou Google Cloud crée de nouveau modèles d'architectures et d'applications dont la structure est en perpétuel mouvement. La seule manière que l'infrastructure, la sécurité et les opérations puissent suivent ce rythme est l'automatisation. Dans cette session, Thomas Beaumont, Cloud Consulting Engineer, va détailler les différents outils qui peuvent etre utilises pour déployer de l'infrastructure (as code), expliquer comment ajouter les vm-series pour protéger des menaces de sécurité (security as code) pour enfin modifier les règles de sécurité en se basant sur des outils tiers partie et externes (operations as code). Une brève démonstration conclut la session.
  • Secure SD-WAN: Critical Mistakes to Avoid Recorded: Dec 5 2019 38 mins
    Palo Alto Networks, ClougGenix & ESG
    Enterprises are looking to gain 50%-70% cost savings on their WAN, access multi-cloud with high performance and secure the remote office in a Zero-trust model. However, combining security and SD-WAN can result in operational challenges and security exposures that can derail your project. There are four decisions that enterprises must make to ensure success with Secure SD-WAN. Hear from ESG Analyst Alex Arcilla about current trends impacting a Secure SD-WAN and learn how a new joint solution that combines CloudGenix Autonomous WAN with Palo Alto Networks security addresses these challenges! See how you can deploy best-of-breed Secure SDWAN that is pre-integrated, requires no additional hardware or software to deploy at the remote office and lays the foundation for a Zero-trust security architecture.
  • [Cloud Security Alliance] Network Security’s Future is in the Cloud Recorded: Dec 3 2019 52 mins
    Jason Georgi, Field Chief Technology Officer for Prisma Access, Palo Alto Networks
    Cloud adoption and user mobility are shifting the locations of applications, data and users. These changes create new vectors for cybersecurity risk. Organizations need a way to securely enable digital business transformation and innovation. We believe that this requires a fundamentally different approach: both security and networking must be delivered in the cloud.

    Join this discussion with Jason Georgi, Field CTO for Prisma Access at Palo Alto Networks, and explore best practices to secure your cloud initiatives with Prisma Access, a Secure Access Service Edge (SASE) platform, by bringing together industry-leading security and SD-WAN capabilities in the cloud.
  • SSL decryption: Stronger security, better visibility Recorded: Dec 3 2019 55 mins
    John Harrison
    Over the last few years, we’ve seen a marked increase in the amount of encrypted traffic. Unfortunately, along with the obvious benefits of encryption, this also provides an opportunity for attackers to hide malicious activity, which has created an even more pressing need for effective decryption.

    In this webcast, you’ll learn about:

    -PAN-OS® 9.0 innovations to streamline SSL decryption
    -Best practices and getting full visibility into protocols like HTTP/2
    -The right SSL decryption implementation strategy
  • Das kleine Einmaleins des Threat Hunting Recorded: Nov 27 2019 65 mins
    Bastian Schwittay
    In diesem exklusiven Webinar lernen Sie, wie Sie verborgene Bedrohungen aufdecken und Warnmeldungen schneller nachgehen können.
  • Déchiffrement SSL : Meilleure visibilité, Sécurité renforcée Recorded: Nov 27 2019 40 mins
    Jean-Baptiste Guglielmine
    Ces dernières années, une forte croissance du trafic chiffré a été constaté.
    Malheureusement, malgré les bénéfices certains du chiffrement, c'est également une opportunité pour les attaquants de masquer leurs activités malicieuses.
    Plus que jamais, une stratégie de déchiffrement du trafic doit être mise en place.

    Dans ce webcast, vous allez découvrir :

    -Les innovations de PAN-OS 9.0 pour améliorer le déchiffrement SSL.
    -Les bonnes pratiques pour obtenir une visibilité complète sur des protocoles tels que HTTP/2
    -Notre stratégie d'implémentation
  • Securing Your Serverless Journey Recorded: Nov 26 2019 49 mins
    Ron Harnik
    With serverless, the cloud provider is responsible for securing the underlying infrastructure, from the data centers all the way up to the container and runtime environment. This relieves much of the security burden from the application owner, however, it also poses many unique challenges when it comes to securing the application layer. In this presentation, we will discuss the most critical challenges related to securing serverless applications - from development to deployment. We will also walk through a live demo of a realistic serverless application that contains several common vulnerabilities, and see how they can be exploited by attackers, and how to secure them. We’ll then go over how Prisma Cloud can be used to secure serverless workloads.
  • Network Security for the Modern Data Center-- Deep Dive With Arista Recorded: Nov 21 2019 45 mins
    Christer Swartz and Shyam Kota, with Host Karin Shopen
    Arista Networks Macro-Segmentation Service (MSS), a capability within Arista CloudVision and Arista Data Center Switches, addresses a growing gap in security deployment for modern data centers. Arista MSS extends the concept of fine-grained security for VMs to the rest of the data center by enabling dynamic firewall services insertion by integrating with leading Palo Alto Networks Next-Generation Firewalls (NGFW) in the data center.

    Join our security experts and learn how you can deploy Arista MSS together with Palo Alto Networks NGFWs to inspect traffic and deliver robust security across a secure, resilient, and high-performance Arista data center fabric.

    In this webinar you will:

    · See a demo on how best to deploy Palo Alto Networks firewalls across Arista MSS enabled next-generation data center
    · Learn about design considerations for firewall insertion
    · Hear real world deployment use cases and best practices
    · Get your questions answered in our live Q&A

    Learn how to protect your applications workloads across an Arista MSS enabled modern data center.
  • 3 Ways to Speed Up Response with Threat Intel Recorded: Nov 20 2019 50 mins
    Bryan Lee, Unit 42 Principal Researcher, AJ Shipley, VP Product Management, Vidya Gopalakrishnan, SOC Engineer
    Threat intel needs to change. Current approaches force security analysts to manually integrate and work across too many low-value feeds, often slowing down investigations.

    The benefit of added clarity and context is clear. Yet, there has to be a better way to use intel to boost investigations and response efforts without complicating your existing processes.

    Join a candid discussion led by Palo Alto Networks Unit 42 threat researchers, SOC experts, and product leaders as they break down the reality of today’s threat intelligence offerings, and what needs to change.

    Leave with:
    Three tricks every practitioner should know when considering how to use threat intelligence to protect their enterprise
    Why threat intel should be embedded into the tools you’re already using, and how to make that possible.
    The future of threat intelligence, including bold new innovations from Palo Alto Networks
  • Debunking the Myth Around Implementing Zero Trust Recorded: Nov 5 2019 45 mins
    Trevor Dearing
    One of the mythologies surrounding Zero Trust is that it is difficult and expensive to implement. Not true! In this webcast we will debunk this myth once and for all.

    Join us for this webcast and learn:

    -How Zero Trust is easy to implement using an iterative approach designed to mitigate disruption or downtime
    -The five key steps to implementation
    -Why Zero Trust is easy to measure, including maturity metrics for Zero Trust
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Top 10 Security Best Practices for Azure
  • Live at: Jul 23 2019 5:00 pm
  • Presented by: Jigar Shah
  • From:
Your email has been sent.
or close