Protect your business with Security delivered from the cloud
Your security should be consistent wherever your users are, whether at headquarters, branch offices, or on the go. The same goes for your applications, whether in your data center or the cloud. However, maintaining consistent security at different locations, while also ensuring optimum networking and performance, is difficult, especially given the limitations of most networking and security technologies. First-generation cloud-delivered security, such as proxies, DNS filtering, and cloud access security broker proxies provide only limited security capabilities and often result in latency and other performance limitations.
Join this webinar for an in depth overview of how Prisma Access delivers protection from over 100 locations around the world from a cloud-native infrastructure that dramatically simplifies cloud access and networking – without compromising on security or performance. Key security and networking outcomes include:
- Secure traffic across all ports and all applications
- Support for complete networking and security needs for both mobile and remote networks
RecordedSep 11 201936 mins
Your place is confirmed, we'll send you email reminders
Alex Berger and Christer Swartz, with Host Karin Shopen
The modern data center is complex. A variety of workload types - from mainframes to virtual machines, bare metal servers to containers, physical desktops to virtual desktops - are commingled across multiple data centers, branch locations, and public clouds. They are connected by a combination of physical and virtual networks, all managed by different teams within IT. And as the cliche goes, “complexity is the enemy of security”.
In this webinar, our experts will:
explore the reality of securing modern data centers and hybrid clouds
discuss best practices for holistically and consistently securing physical, virtual and public cloud environments
offer practical insights into use cases and scenarios that we’ve encountered from our years of guiding customers through their cloud transformation journeys.
Des attaquants qualifiés et furtifs ont pénétré dans certaines des organisations les mieux protégées. Ils trompent les utilisateurs, compromettent les hôtes et utilisent plusieurs autres technique pour infiltrer des réseaux.
Rejoignez notre webinaire pour découvrir les dernières techniques permettant de rechercher plus efficacement les menaces et d'accélérer les enquêtes. Vous allez apprendre à:
- Découvrez rapidement les menaces cachées
- Enquêter en profondeur sur les alertes
- Évaluez la portée et la gravité d'une attaque avec précision
- Transformez les résultats de vos recherches en détection automatisée
Your organization is starting to adopt public cloud, and while the cloud might not be scary, the change is something you have to learn. What worked in the old data centers days simply will not translate to the public cloud. Which also means you have different things to worry about.
Prisma Cloud is a multi-cloud API based public cloud security platform for AWS, Azure and Google Cloud Platform that is helping hundreds of the world's largest public cloud adopters to gain control of their cloud visibility, enforce governance and achieve continuous compliance.
Any security vendor can show you a solution that is good at generating alerts, but join us on December 11th to learn how Prisma Cloud can show you what could go wrong, what is going wrong, and what alerts you need to prioritize immediately so that you can get back to work.
It seems like every security operations team faces the same challenges when it comes to incident management. Isn’t it about time someone came up with a solution?
In this webinar, we will talk about our Security Orchestration, Automation and Response (SOAR) Solution, Demisto and how it helps solving pain points security teams face on a daily basis.
You can also look forward to a demo to showcase the different features of the solution with a focus on a use case of how you can easily extract IOCs from email, enrich with threat intelligence, and then take the required action on the different security solutions your organization has.
Nir Zuk Founder and CTO; Lee Klarich Chief Product Officer
Join visionary Nir Zuk, Palo Alto Networks founder and chief technical officer, and Lee Klarich, chief product officer, as they introduce Cortex XDR™ 2.0, the bold evolution of the category-defining platform that put enterprise-scale detection and response on the map.
Join this fast-paced livestream event to get up to speed on:
How to supercharge detection and investigation with the groundbreaking integration of good data across endpoints, networks, clouds and third-party sources.
Updates to the most comprehensive platform for prevention, detection, investigation and response.
Our industry-leading endpoint protection innovations, including a new ML-driven local analysis engine.
We’ve booked 30 minutes for this event, but you’ll only need 18. Just think: now, you’ll have time to binge one more Netflix show.
La transition vers AWS, Azure ou Google Cloud crée de nouveau modèles d'architectures et d'applications dont la structure est en perpétuel mouvement. La seule manière que l'infrastructure, la sécurité et les opérations puissent suivent ce rythme est l'automatisation. Dans cette session, Thomas Beaumont, Cloud Consulting Engineer, va détailler les différents outils qui peuvent etre utilises pour déployer de l'infrastructure (as code), expliquer comment ajouter les vm-series pour protéger des menaces de sécurité (security as code) pour enfin modifier les règles de sécurité en se basant sur des outils tiers partie et externes (operations as code). Une brève démonstration conclut la session.
Enterprises are looking to gain 50%-70% cost savings on their WAN, access multi-cloud with high performance and secure the remote office in a Zero-trust model. However, combining security and SD-WAN can result in operational challenges and security exposures that can derail your project. There are four decisions that enterprises must make to ensure success with Secure SD-WAN. Hear from ESG Analyst Alex Arcilla about current trends impacting a Secure SD-WAN and learn how a new joint solution that combines CloudGenix Autonomous WAN with Palo Alto Networks security addresses these challenges! See how you can deploy best-of-breed Secure SDWAN that is pre-integrated, requires no additional hardware or software to deploy at the remote office and lays the foundation for a Zero-trust security architecture.
Jason Georgi, Field Chief Technology Officer for Prisma Access, Palo Alto Networks
Cloud adoption and user mobility are shifting the locations of applications, data and users. These changes create new vectors for cybersecurity risk. Organizations need a way to securely enable digital business transformation and innovation. We believe that this requires a fundamentally different approach: both security and networking must be delivered in the cloud.
Join this discussion with Jason Georgi, Field CTO for Prisma Access at Palo Alto Networks, and explore best practices to secure your cloud initiatives with Prisma Access, a Secure Access Service Edge (SASE) platform, by bringing together industry-leading security and SD-WAN capabilities in the cloud.
Over the last few years, we’ve seen a marked increase in the amount of encrypted traffic. Unfortunately, along with the obvious benefits of encryption, this also provides an opportunity for attackers to hide malicious activity, which has created an even more pressing need for effective decryption.
In this webcast, you’ll learn about:
-PAN-OS® 9.0 innovations to streamline SSL decryption
-Best practices and getting full visibility into protocols like HTTP/2
-The right SSL decryption implementation strategy
Ces dernières années, une forte croissance du trafic chiffré a été constaté.
Malheureusement, malgré les bénéfices certains du chiffrement, c'est également une opportunité pour les attaquants de masquer leurs activités malicieuses.
Plus que jamais, une stratégie de déchiffrement du trafic doit être mise en place.
Dans ce webcast, vous allez découvrir :
-Les innovations de PAN-OS 9.0 pour améliorer le déchiffrement SSL.
-Les bonnes pratiques pour obtenir une visibilité complète sur des protocoles tels que HTTP/2
-Notre stratégie d'implémentation
With serverless, the cloud provider is responsible for securing the underlying infrastructure, from the data centers all the way up to the container and runtime environment. This relieves much of the security burden from the application owner, however, it also poses many unique challenges when it comes to securing the application layer. In this presentation, we will discuss the most critical challenges related to securing serverless applications - from development to deployment. We will also walk through a live demo of a realistic serverless application that contains several common vulnerabilities, and see how they can be exploited by attackers, and how to secure them. We’ll then go over how Prisma Cloud can be used to secure serverless workloads.
Christer Swartz and Shyam Kota, with Host Karin Shopen
Arista Networks Macro-Segmentation Service (MSS), a capability within Arista CloudVision and Arista Data Center Switches, addresses a growing gap in security deployment for modern data centers. Arista MSS extends the concept of fine-grained security for VMs to the rest of the data center by enabling dynamic firewall services insertion by integrating with leading Palo Alto Networks Next-Generation Firewalls (NGFW) in the data center.
Join our security experts and learn how you can deploy Arista MSS together with Palo Alto Networks NGFWs to inspect traffic and deliver robust security across a secure, resilient, and high-performance Arista data center fabric.
In this webinar you will:
· See a demo on how best to deploy Palo Alto Networks firewalls across Arista MSS enabled next-generation data center
· Learn about design considerations for firewall insertion
· Hear real world deployment use cases and best practices
· Get your questions answered in our live Q&A
Learn how to protect your applications workloads across an Arista MSS enabled modern data center.
Bryan Lee, Unit 42 Principal Researcher, AJ Shipley, VP Product Management, Vidya Gopalakrishnan, SOC Engineer
Threat intel needs to change. Current approaches force security analysts to manually integrate and work across too many low-value feeds, often slowing down investigations.
The benefit of added clarity and context is clear. Yet, there has to be a better way to use intel to boost investigations and response efforts without complicating your existing processes.
Join a candid discussion led by Palo Alto Networks Unit 42 threat researchers, SOC experts, and product leaders as they break down the reality of today’s threat intelligence offerings, and what needs to change.
Three tricks every practitioner should know when considering how to use threat intelligence to protect their enterprise
Why threat intel should be embedded into the tools you’re already using, and how to make that possible.
The future of threat intelligence, including bold new innovations from Palo Alto Networks
One of the mythologies surrounding Zero Trust is that it is difficult and expensive to implement. Not true! In this webcast we will debunk this myth once and for all.
Join us for this webcast and learn:
-How Zero Trust is easy to implement using an iterative approach designed to mitigate disruption or downtime
-The five key steps to implementation
-Why Zero Trust is easy to measure, including maturity metrics for Zero Trust
Nithin Varam, Lior Kolnik, Stan Lee, with Host Karin Shopen
The theft and use of stolen passwords is a common attack for adversaries, mostly because passwords are the weakest link in security. Plus, stealing credentials is much faster, cheaper and easier than having to find and exploit a vulnerability in a system.
Once done, an adversary can bypass the entire attack lifecycle – impersonating a valid user – and move freely through the network. With inside access, an attacker can quickly move laterally to set up a broader footprint, compromise additional systems and steal other credentials along the way.
In our new webcast, Best Practices for Stopping Theft and Abuse of Employee Credentials, our experts will:
*Outline the common techniques attackers use
*Provide best practices to prevent further credential attacks
*Showcase Palo Alto Networks features you can enable now to protect your organization
Get your questions answered, and learn how to stop credential theft and abuse in your organization today.
Jason Georgi, Field Chief Technology Officer for Prisma Access and SaaS at Palo Alto Networks
Cloud adoption for some services is no longer optional, however security is what is overwhelmingly holding organizations back from doing more. Cloud and SaaS themselves are also evolving, which is changing the approach for securing access to them. The right security capabilities will allow you to address risk while having you ready for tomorrow.
Lakshmi Kandadai and Scott Stevens, with Host Karin Shopen
While the technological shift from a closed and proprietary model to dynamic and scalable architectures brings agility and flexibility through network modernization, it also introduces a new security paradigm. Mobile network operators are not only responsible for hardening and securing the platform, underlying OS and the software stack, but must secure the applications (virtual network functions), as well, making it much more cumbersome and time-consuming to manage.
Manual security operations are not keeping pace with the migration to public, private, hybrid clouds and SDN/NFV environments. Workloads are becoming much more dynamic, so making sure that security is in lockstep towards these dynamic workloads is critical. As mobile network operators prepare for their network transformation by building 5G-ready telco clouds, you will need a resilient network with robust security mechanisms in place to support the diverse requirements of 5G-enabled applications and services.
In this webcast, you will:
* Find out about security implications of cloud adoption in telco environments
* Learn about cloud-agnostic security enforcement at scale across distributed cloud architectures
* Hear how to build a proactive defense around your telco cloud environments
Bring your questions for our experts and join us for an interactive and informative session!
Die Attraktivität von SaaS-Anwendungen wie Office 365®️, G Suite™️, Box und Salesforce®️ nimmt immer weiter zu, mit ihr aber auch die verborgenen Bedrohungen in SaaS-Angeboten: teure Datenverluste, Compliance-Probleme, Verbreitung von Malware usw. Der SaaS-Sicherheitsdienst Prisma™️ SaaS ergänzt Ihre bestehenden Sicherheitstools durch Datenklassifizierung, Prävention von Datenverlust und Bedrohungserkennung – sodass Ihre SaaS-Anwendungen optimal geschützt sind.
In diesem Webcast zeigen unsere Spezialisten Markus Willmann und Michael Weisgerber wie Sie eine vollständige Transparenz über sämtliche Aktivitäten von Benutzern, Ordnern und Dateien erhalten. Durch die umfassende Auswertung des täglichen Nutzungsverhaltens erkennen Sie schnell, ob Datenrisiken oder rechtlich relevante Verstöße vorliegen.
Der interaktive Webcast beinhaltet:
-Eine Einführung in CASB Thematik
-Die Erklärung der Besonderheiten der marktführenden Lösung Prisma SaaS
-Einen praktischer Demo-Teil
-Fragen und Antworten
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.