Hi [[ session.user.profile.firstName ]]

Die Zwei um Zwölf: Automatisierung der VM-Series in der Public Cloud

Der Wechsel in die Cloud wird stark von den Geschäftsbereichen bestimmt und die Geschwindigkeit ist so hoch, dass in einigen Fällen die Sicherheit in den Hintergrund tritt. Ihre Anwendungen und Daten müssen aber in Public Cloud Umgebungen genauso sorgfältig geschützt werden, wie lokale Anwendungen und Daten. Deshalb gilt: Zero Trust Security Modell must be everywhere!

Wir zeigen Ihnen in dieser Ausgabe von „Die Zwei um Zwölf“, wie mit Automatisierungstools Public Cloud Umgebungen auf Knopfdruck mit virtuellen Firewalls (Prisma VM-Series) eingerichtet, verwaltet und abgesichert und wie Workloads und Sicherheitsmaßnahmen in wenigen Minuten bereitgestellt werden können.
Recorded Jul 19 2019 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dirk Thelen und Dirk Schüler
Presentation preview: Die Zwei um Zwölf: Automatisierung der VM-Series in der Public Cloud
  • Channel
  • Channel profile
  • Technology Deep Dive for the Hybrid DC: Arista MSS and Palo Alto Networks Nov 21 2019 6:00 pm UTC 60 mins
    Christer Swartz and Mohanad Elamim
    Arista Networks Macro-Segmentation Service (MSS), a capability within Arista CloudVision and Arista Data Center Switches, addresses a growing gap in security deployment for hybrid data centers. Arista MSS extends the concept of fine-grained security for VMs to the rest of the data center by enabling dynamic firewall services insertion by integrating with leading Palo Alto Networks Next-Generation Firewalls (NGFW) in the data center.

    Join our security experts and learn how you can deploy Arista MSS together with Palo Alto Networks NGFWs to inspect traffic and deliver robust security across a secure, resilient, and high-performance Arista data center fabric.

    In this webinar you will:

    · See demos on how best to deploy Palo Alto Networks firewalls across Arista MSS enabled next-generation data center
    · Learn about design considerations for firewall insertion
    · Hear real world deployment use cases and best practices
    · Get your questions answered in our live Q&A

    Learn how to protect your applications workloads across an Arista MSS enabled modern hybrid data center.
  • Technology Deep Dive for the Hybrid Data Center:Cisco ACI and Palo Alto Networks Sep 26 2019 5:00 pm UTC 60 mins
    Christer Swartz and Mohanad Elamin
    For organizations like yours considering Cisco Application Centric Infrastructure (ACI) for the modern next-generation data center, you need to know the key requirements for security and how Palo Alto Networks is solving security challenges in a Cisco ACI fabric.

    Join our security experts and learn what every networking or security professional should know about how Palo Alto Networks firewalls can be integrated with Cisco ACI fabric to protect your application workloads across a Cisco ACI enabled hybrid data center.

    In this webinar you will:

    · See demos on how best to deploy Palo Alto Networks firewalls within Cisco ACI
    · Learn about design considerations for firewall insertion
    · Hear real world deployment use cases and best practices
    · Get your questions answered in our live Q&A

    Learn how best to deploy Cisco ACI and Palo Alto Networks technologies in your modern hybrid data center.
  • Best Practices For Stopping Theft and Abuse of Employee Credentials Sep 18 2019 5:00 pm UTC 60 mins
    Ryan Barrett and Jen Miller Osborn, with Host Karin Shopen
    The theft and use of stolen passwords is a common attack for adversaries, mostly because passwords are the weakest link in security. Plus, stealing credentials is much faster, cheaper and easier than having to find and exploit a vulnerability in a system.

    Once done, an adversary can bypass the entire attack lifecycle – impersonating a valid user – and move freely through the network. With inside access, an attacker can quickly move laterally to set up a broader footprint, compromise additional systems and steal other credentials along the way.

    In our new webcast, Best Practices for Stopping Theft and Abuse of Employee Credentials, our experts will:
    *Outline the common techniques attackers use
    *Provide best practices to prevent further credential attacks
    *Showcase Palo Alto Networks features you can enable now to protect your organization

    Get your questions answered, and learn how to stop credential theft and abuse in your organization today.
  • Is security the #1 obstacle in your journey to the cloud? Sep 17 2019 5:00 pm UTC 60 mins
    Jason Georgi, Field Chief Technology Officer for Prisma Access and SaaS at Palo Alto Networks
    Cloud adoption has led to branch locations and mobile users going direct-to-internet, often without connecting to remote-access VPNs. The patchwork days of backhauling data over a VPN (or MPLS) to HQ then hair pinning it to the cloud to keep up with users are over. But, it doesn't mean maintaining consistent security at different locations has to be an obstacle. To keep up, you need to use the cloud to your advantage. By building security policies directly in the cloud, you create consistent protection wherever your users are, at headquarters, branch offices, or on the go as well as your applications, in the data center, and the cloud.

    Join the webinar and learn key requirements for complete cloud security and walk away with confidence knowing you can:

    - Protect any data stored within cloud applications
    - Control access to the cloud from anywhere
    - Secure access to all applications built in the cloud
  • Protect your business with Security delivered from the cloud Sep 11 2019 5:00 pm UTC 60 mins
    Palo Alto Networks
    Your security should be consistent wherever your users are, whether at headquarters, branch offices, or on the go. The same goes for your applications, whether in your data center or the cloud. However, maintaining consistent security at different locations, while also ensuring optimum networking and performance, is difficult, especially given the limitations of most networking and security technologies. First-generation cloud-delivered security, such as proxies, DNS filtering, and cloud access security broker proxies provide only limited security capabilities and often result in latency and other performance limitations.

    Join this webinar for an in depth overview of how Prisma Access delivers protection from over 100 locations around the world from a cloud-native infrastructure that dramatically simplifies cloud access and networking – without compromising on security or performance. Key security and networking outcomes include:

    - Secure traffic across all ports and all applications
    - Support for complete networking and security needs for both mobile and remote networks
  • Protecting Data in Your Cloud Applications Sep 5 2019 5:00 pm UTC 60 mins
    Venkat Krishnamoorthi, Director, Product Management, Palo Alto Networks
    Cloud-based collaboration applications enhance your employees’ productivity and enable collaboration with partners and others. However, this may also result in increased risk for data exposure – whether accidental or malicious. In addition, regulatory compliance requirements drive data protection needs. In this session, we will dive deep into how you can secure your data for various SaaS apps using our current and upcoming DLP capabilities, that can be used for all your SaaS data protection needs – whether it is data-in-motion or data-at-rest!
  • Comment choisir le meilleur EDR disponible sur le marché? Sep 4 2019 9:00 am UTC 60 mins
    Jean-Philippe Resca
    Sélectionner son outil de Endpoint Detection & Response (EDR) est complexe.

    Le standard de modélisation MITRE ATT&CK est utilisé pour évaluer l'efficacité et l'efficience des meilleures offres EDR disponibles aujourd'hui.

    Comprenez comment vos outils EDR actuels se comparent dans ce standard grâce aux résultats l’évaluation de la première ronde de MITRE, qui teste plusieurs fournisseurs à travers une liste exhaustive de capacités et de techniques utilisées par les adversaires dans des attaques réels..

    Rejoignez-nous pour apprendre de nos experts lors de ce webinaire en direct :

    · L'explication des techniques utilisées dans le cadre MITRE ATT&CK
    · Examiner les résultats des tests, leurs implications et leur lien pour la sélection d'un EDR.
    · Examiner comment notre approche XDR a donné des résultats qui se distinguent des offres EDR traditionnelles.
  • Unpacking the MITRE ATT&CK Evaluation featuring Forrester Aug 29 2019 6:00 pm UTC 60 mins
    Josh Zelonis, Peter Havens & Scott Simkin
    An Expert's View on the MITRE ATT&CK Evaluation featuring Josh Zelonis

    MITRE, the world's largest collector of real attack techniques, provides organizations with in-depth detail across 12 categories of tactics, how they're used, and how to mitigate them. Pulling from this data, the ATT&CK evaluation has quickly become the standard by which endpoint detection and response (EDR) offerings are judged through a real-world red/blue team exercise.

    Join guest speaker Josh Zelonis, Forrester, Senior Analyst, and Peter Havens, Palo Alto Networks, as they dive into first-round evaluation results using techniques sourced from APT3, a sophisticated Chinese threat group. MITRE used APT3's playbook to test the ten leading EDR vendors, including leveraging post-exploit behavior, credential harvesting, on-keyboard commands, scripting techniques, and anti-EDR capabilities. This packed session will provide a deep-dive on:

    * How security emulation and testing tools were used to break into systems
    * The details with real screen shots and specific outcomes of tested attack techniques across different products
    * Why Forrester's ranking system is becoming the standard to evaluate EDR products and how you can use it
    * How to objectively choose the right EDR based on Forrester's research
  • SSL Decryption Deep Dive Recorded: Aug 15 2019 73 mins
    Mandeep Singh Sandhu and Sandeep Ghosh, with Host Karin Shopen
    Recent technology trends have led to a marked increase in the amount of TLS traffic, as it provides confidentiality and trust. However, this also presents an opportunity for attackers to hide malicious activity and calls for an even more pressing need for SSL Decryption.

    In this session, you will:
    -Hear about recent innovations in PAN-OS 9.0 that help customers streamline SSL Decryption best practices and get full visibility into protocols like HTTP/2
    -Learn about a best practice implementation strategy for SSL Decryption

    Bring your questions for our experts, and come get a look at SSL Decryption "under the hood."

    This is a 60-minute session with 15-minutes of live Q&A to follow.
  • Cortex XDR & Traps 6.1: Mit der führenden EDR-Lösung Security-Silos niederreißen Recorded: Aug 9 2019 61 mins
    Dirk Thelen und Bastian Schwittay
    Cortex XDR Detection and Response integriert Netzwerk-, Endpunkt- und Clouddaten, um komplexe Cyberangriffe abzuwehren. Dank rapider Weiterentwicklung wurden in Cortex XDR gerade einmal 5 Monate nach Erscheinen bereits zahlreiche Innovationen implementiert, die es Kunden immer besser ermöglichen, Bedrohungen aufzudecken, diese tiefgehend zu analysieren und darauf zu reagieren.

    In diesem Webinar werden wir Ihnen die wesentlichen Neuerungen in Cortex XDR & Traps 6.1 vorstellen, unter anderem:

    -Erweiterte XDR Datensammlungs- und Responsefunktionen für
    Windows und macOS
    -Optimierte Verwaltung von XDR Incidents
    -Integration von Threat Intelligence und Demisto per API
  • Secure Access Control for Mobile Users Recorded: Jul 25 2019 60 mins
    Sarvesh Rao and Ron Dodge, with Host Karin Shopen
    With mobile workers now using the cloud and the internet to access critical applications, it is crucial that businesses secure beyond their data center. However, with threats continuously advancing, traditional remote access VPN is just simply not enough.

    In this session, our team of experts will discuss how with Global Protect businesses can:
    · Extend consistent security policies to all workers regardless of their location
    · Implement a zero trust architecture
    · Protect against advanced threats

    Learn how GlobalProtect can eliminate remote access blind spots while strengthening security.

    Bring your questions for our experts. Hope you'll join us.
  • Top 10 Security Best Practices for Azure Recorded: Jul 23 2019 60 mins
    Jigar Shah
    As organizations migrate to the cloud, they often start by replicating their existing network architecture. This approach can be costlier and more difficult to manage than an architecture that leverages cloud-native capabilities that are not available in the data center. Microsoft Azure enables development teams to rapidly build and deploy global-scale applications, but with this ease and speed comes increased risk.

    In this webinar, you will learn more about the best practices for deploying network virtual appliances in Microsoft Azure, including:
    Designing network security for high availability and auto-scaling with Virtual Machine Scale Sets (VMSS) and Azure Load Balancer
    Implement Accelerated Networking and deploy VM-Series virtualized firewalls with multiple NICs to increase throughput and performance
    Automate virtualized firewall deployment configuration to ensure best practices are consistently implemented

    Rise above the noise and confusion by using VM-Series virtualized firewall on Microsoft Azure that provides complete visibility across all of your workloads in Azure, and helps you automate security controls.
  • Die Zwei um Zwölf: Automatisierung der VM-Series in der Public Cloud Recorded: Jul 19 2019 49 mins
    Dirk Thelen und Dirk Schüler
    Der Wechsel in die Cloud wird stark von den Geschäftsbereichen bestimmt und die Geschwindigkeit ist so hoch, dass in einigen Fällen die Sicherheit in den Hintergrund tritt. Ihre Anwendungen und Daten müssen aber in Public Cloud Umgebungen genauso sorgfältig geschützt werden, wie lokale Anwendungen und Daten. Deshalb gilt: Zero Trust Security Modell must be everywhere!

    Wir zeigen Ihnen in dieser Ausgabe von „Die Zwei um Zwölf“, wie mit Automatisierungstools Public Cloud Umgebungen auf Knopfdruck mit virtuellen Firewalls (Prisma VM-Series) eingerichtet, verwaltet und abgesichert und wie Workloads und Sicherheitsmaßnahmen in wenigen Minuten bereitgestellt werden können.
  • How to Select the Best EDR in the market Recorded: Jul 18 2019 60 mins
    Mitchell Bezzina, Dir, PMM. SecOps Strategy & Scott Simkin, Director of Cortex
    Making a decision on endpoint detection and response (EDR) tools is complex. The MITRE ATT&CK framework is used to evaluate the efficacy and efficiency of the top EDR offerings available today.

    Understand where your current EDR tools stand as you learn from MITRE’s Round 1 evaluation, which tests multiple vendors across an extensive list of capabilities and techniques adversaries use in real-world attacks.

    Join us to hear from senior product research analysts,Mitchell Bezzina & Scott Simkin in this live webinar as they:
    · Explain the techniques used in the MITRE ATT&CK framework
    · Review test results, their implications and how they relate to evaluation considerations
    · Examine how an XDR approach yielded results that stand apart from legacy EDR offerings
    Watch the live webinar!
  • Prisma Public Cloud for Higher Education Recorded: Jul 17 2019 53 mins
    Christopher Fago, Technical Sales Manager, Prisma Public Cloud, Palo Alto Networks
    Prisma Public Cloud (formerly RedLock) helps public cloud adopters at Higher Education Institutions with advanced protection and consistent security across their Amazon Web Services, Microsoft Azure and Google Cloud Platform environments. Through our 100% API-based platform, we can quickly help you monitor for risky configurations, anomalous user activities, suspicious network traffic, and host vulnerabilities.

    During the webinar, we’ll cover how Prisma Public Cloud can help you achieve the following:
    ● Visibility
    ● Compliance Assurance
    ● Security Governance
    ● Anomaly Detection and Remediation
  • Securing Public Cloud Workloads Recorded: Jul 17 2019 38 mins
    Charles Connolly, Sales Manager, Palo Alto Networks & Tom Mehok, Systems Engineer, Palo Alto Networks
    Palo Alto Networks® provides advanced protection for consistent security across all major clouds – Google® Cloud Platform (GCP), Amazon® Web Services (AWS), and Microsoft® Azure® – and our automation features minimize the friction of app development and security. You can protect and segment applications, deliver, continuous security and compliance, and achieve zero-day prevention.

    Join this webinar to learn how Prisma Public Cloud, and now part of Palo Alto Networks, can help you achieve the following:
    - Visibility
    - Compliance Assurance
    - Security Governance
    - Anomaly Detection and Remediation
  • Data Center Hybrid Cloud Overview Recorded: Jul 11 2019 51 mins
    Sam Rastogi, Senior Product Marketing Manager, Data Center Security
    Data is now everywhere. Application workloads are moving across multiple data centers as well as private, public and hybrid clouds. New trends in the data center and hybrid cloud IT help organizations deliver greater business opportunities, but introduce new risks.

    Watch this webinar and learn how to rethink your approach to security to better protect your data and workload in the data center and across multi-cloud environments.

    You will:
    •Hear about key trends, challenges, and Palo Alto Networks Data Center Security strategy
    •Get a security architecture overview and technology deep dive
    •Learn best practices and use cases to extend security everywhere across on-prem data centers, private clouds, and public clouds
    •Get your questions answered in our live Q&A
  • Safely enable your SaaS applications Recorded: Jul 10 2019 53 mins
    Chris Morosco, Product Marketing Director – Cloud Security, Palo Alto Networks
    SaaS applications have greatly enhanced workplace productivity and collaboration, while also saving IT money and resources. Businesses rely on apps like Office 365 and Google G Suite to store and share data across their remote locations and employees. However, without proper control and visibility, users can unknowingly expose the organization to data loss, loss of compliance and threats being let in.

    Learn how to discover the hidden risks and threats of SaaS applications, protecting your data through visibility and protections that are consistent across all your SaaS applications.
  • Die Zwei um Zwölf: Automatisierung der VM-Series in der Public Cloud Recorded: Jul 5 2019 50 mins
    Dirk Thelen und Dirk Schüler
    Der Wechsel in die Cloud wird stark von den Geschäftsbereichen bestimmt und die Geschwindigkeit ist so hoch, dass in einigen Fällen die Sicherheit in den Hintergrund tritt. Ihre Anwendungen und Daten müssen aber in Public Cloud Umgebungen genauso sorgfältig geschützt werden, wie lokale Anwendungen und Daten. Deshalb gilt: Zero Trust Security Modell must be everywhere!

    Wir zeigen Ihnen in dieser Ausgabe von „Die Zwei um Zwölf“, wie mit Automatisierungstools Public Cloud Umgebungen auf Knopfdruck mit virtuellen Firewalls (Prisma VM-Series) eingerichtet, verwaltet und abgesichert und wie Workloads und Sicherheitsmaßnahmen in wenigen Minuten bereitgestellt werden können.
  • Summer Series - Build Security In: Cloud Security at DevOps Speed Recorded: Jul 5 2019 54 mins
    Rick Collette, Cloud Architect at Palo Alto Networks; John Martinez, Director of Public Cloud R&D, Palo Alto Networks
    As DevSecOps adoption slowly goes mainstream among organizations, it is fundamentally changing the culture and collaboration semantics among security, development and operations teams.
    This webinar will explore whether SecOps and DevOps have been effective in fostering collaboration to align their different goals into a single effort or have they slipped into implementing primitive security models of the past. Is the union of DevOps and SecOps on rocky ground and in need of marriage counseling, or are they copacetic? In this webinar, we’ll explore the needs of DevOps, Security and IT and five principles that will help you move at the speed of cloud together without creating gaps in your security posture.
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Die Zwei um Zwölf: Automatisierung der VM-Series in der Public Cloud
  • Live at: Jul 19 2019 10:00 am
  • Presented by: Dirk Thelen und Dirk Schüler
  • From:
Your email has been sent.
or close