Hi [[ session.user.profile.firstName ]]

Immediate Insight App Available on the Palo Alto Networks Application Framework

Optimized for the Palo Alto Networks Application Framework, Immediate Insight is an analytics-enabled app that enables security teams to seamlessly combine and analyze cloud-resident and private infrastructure data to accelerate discovery and response to security threats.
Recorded Oct 8 2018 18 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jeff Barker, Vice President, Product Management - Immediate Insight
Presentation preview: Immediate Insight App Available on the Palo Alto Networks Application Framework

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Achieve NERC CIP Compliance with FireMon Recorded: Dec 10 2018 12 mins
    Robert Rodriguez, Senior Sales Engineer | Brian Dixon, Sales Engineer | Elisa Lippincott, Director of Product Marketing
    Utilities need scalable solutions to help them adapt and comply with the constantly changing NERC CIP requirements. FireMon can partner with utilities to automate their security policy workflows, optimize their vulnerability management efforts, and get their networks under control with complete visibility, real-time monitoring and continuous compliance checks.
  • AWS Network Security Deep Dive: Providing Network Protection for AWS Cloud Recorded: Nov 6 2018 97 mins
    Randy Franklin Smith, Publisher, UltimatedWindowsSecurity.com | Tim Woods, FireMon | Sanjay Raja, Lumeta
    Running workloads in the cloud makes provisioning and setup easier—just spin up a VM. But you might be surprised by how many firewalls you’ll end up with in the cloud if you follow best practices. Cloud providers are clear on this point. Amazon says, “Security and Compliance is a shared responsibility between AWS and the customer… The customer assumes responsibility and management of the guest operating system (including updates and security patches), other associated application software as well as the configuration of the AWS provided security group firewall.” In short, cloud security is in your court.
    In this deep dive into network security in the AWS cloud, some of the security features we’ll explore are:
    •Security groups — Act as a firewall for associated Amazon EC2 instances, controlling both inbound and outbound traffic at the instance level
    •Network access control lists — Act as a firewall for associated subnets, controlling both inbound and outbound traffic at the subnet level
    •Flow logs — Capture information about the IP traffic going to and from network interfaces in your VPC
    •AWS WAF — Provides firewall protection for web applications (Web Application Firewall)
    •AWS Firewall Manager — Provides centralized management of AWS WAF
    •VPC Peering Connections — Enables networking connection between two VPCs so that you can route traffic between them
    •VPC Endpoints — Enables users to connect with AWS services that are outside the VPC through a private link
    •AWS VPN Connections — Allows you to connect your Amazon VPC to remote networks via VPN
    •AWS Direct Connect — Serves as a dedicated, private connection from a remote network to your VPC
    We will help you understand how networking security works within the Amazon cloud and with connections to the outside world. We will also discuss the need to keep all this straight, understood, consistent and configure to reflect your security intent accurately.
  • SCdemocast: Continuous Security for the Hybrid Enterprise Recorded: Oct 25 2018 30 mins
    Tim Woods - Vice President, Technology Alliances, FireMon
    The cloud is a notable business advantage, but it does bring numerous security concerns including: a lack of visibility across cloud or between on-premises and cloud environments, monitoring security controls and changes within cloud and multi-cloud environments, and maintaining compliance by monitoring cloud traffic for suspicious and non-compliant behavior. It becomes increasingly complex in hybrid environments because now you're managing security for on-premise, cloud, virtual, container environments, and more. The time commitment can feel staggering.

    It doesn't have to, however.

    Register for this webcast where we will show you the path to more effective cloud security in hybrid enterprises through a mix of:

    Vulnerability management: See how an attacker could exploit and prioritize your patches;
    Continuous compliance: Define your own cloud security controls and reduce the time spent on audit prep by making your cloud continuously audit-ready and adherent to the intentions and goals of the enterprise;
    Automation and orchestration: Ingest behavior details from your cloud, then command security controls to cloud systems from a single console. The idea is instant, worry-reducing cloud control.
  • Improve Visibility to Reduce Vulnerabilities and Protect Patient Data Recorded: Oct 11 2018 47 mins
    Sanjay Raja, CMO, Lumeta
    Cybercriminals target the data-rich healthcare industry disproportionately. Healthcare IT organizations, already burdened with budget constraints and the scarcity of technically proficient staff, must also contend with significant blind spots within their own networks. These blind spots occur everywhere, from endpoints into the cloud, and every blind spot increases the opportunity for attacks such as ransomware to be successful. Eliminating those blind spots requires healthcare organizations to identify all of their wired, wireless, mobile and medical devices in real-time. With comprehensive context available, organizations can help prevent breaches before, during and after an attack. Lumeta has been deployed at some of the largest enterprises and government agencies based on our ability to eliminate 100% of your IP network and connected device visibility gaps, improve your overall security posture, and reduce the risk of patient data theft.
  • Immediate Insight App Available on the Palo Alto Networks Application Framework Recorded: Oct 8 2018 18 mins
    Jeff Barker, Vice President, Product Management - Immediate Insight
    Optimized for the Palo Alto Networks Application Framework, Immediate Insight is an analytics-enabled app that enables security teams to seamlessly combine and analyze cloud-resident and private infrastructure data to accelerate discovery and response to security threats.
  • A Zero Trust Approach to Decoupling Intent from Implementation Recorded: Sep 20 2018 60 mins
    Chase Cunningham, Principal Analyst, Risk & Security, Forrester and Matt Dean, Vice President, Product Strategy, FireMon
    Adopting a Zero Trust model means taking the first steps to redesigning your network in order to strengthen data security, detection, and response.

    In such an ecosystem, it can no longer be about just writing security rules. Instead, enterprises must adopt a method of security intent and separate that desired goal of security from the specific implementation.

    This hierarchy allows you to set a single global policy that’s applied to any network resource with all its defining attributes – regardless of mutations in the network.

    At the same time, you can reduce the number of access requests that need to be managed manually and automatically ensure real-time compliance. And even more, business intent can be fully in line with security policy controlled at speed and scale.

    At most hybrid enterprises right now, these aren't realities -- but they can be, and that's where network security is headed.

    Join our guest, Forrester's Chase Cunningham, with FireMon's Vice President, Product Strategy at FireMon, Matt Dean for a look at the future of network security, which will ultimately enable each business team to fully own their security policies.
  • 3 Steps to Gain Control of Cloud Security Recorded: Sep 19 2018 61 mins
    Tim Woods - Vice President, Technology Alliances, FireMon
    The cloud is a notable business advantage, but it does bring numerous security concerns. Among them:

    - Lack of visibility across cloud or between on-premises and cloud environments
    - Monitoring security controls and changes within cloud and multi-cloud environments
    - Maintaining compliance by monitoring cloud traffic for suspicious and non-compliant behavior

    It becomes increasingly complex in hybrid environments because now you’re managing security for on-premise, cloud, virtual, container environments, and more. The time commitment can feel staggering.

    It doesn’t have to, however.

    In this webinar we will show you the path to more effective cloud security in hybrid enterprises through a mix of:

    1. Vulnerability management: See how an attacker could exploit and prioritize your patches
    2. Continuous compliance: Define your own cloud security controls and reduce the time spent on audit prep by making your cloud continuously audit-ready
    3. Automation and orchestration: Ingest behavior details from your cloud, then command security controls to cloud systems from a single console. The idea is instant, worry-reducing cloud control.
  • Migrating to the Cloud? Don’t Forget Your Firewalls Recorded: Sep 12 2018 103 mins
    Randy Franklin Smith, Publisher, UltimatedWindowsSecurity.com & Tim Woods, Vice President Technology Alliances, FireMon
    When we start using the cloud, it’s up to us to address these risks:

    Direct attacks from the Internet on resources in the cloud
    Infiltration of on-prem network from compromised resources in the cloud
    Attacks on cloud-based workloads from compromised endpoints in the on-prem network


    Cloud and firewall providers have been quick to identify this as a market and there is a plethora of virtual network security gear you can deploy including:

    Built-in network security controls (e.g. Network Security Groups in Azure virtual networks)
    Cloud firewalls (e.g. Azure Firewall)
    Network virtual appliances from well-known Next-Gen Firewall vendors offered in cloud marketplaces. This lets you quickly spin-up a traditional NGFW product on a pre-configured VM and you can potentially use the same firewall vendor in the cloud and on-prem.
    Firewall Infrastructure-as-a-Service offerings like CheckPoint CloudGuard which are delivered and run as part of the cloud infrastructure rather than as a VM


    In this webinar, we explore the expanding requirements for network controls (i.e. firewalls) as more workloads are spun up in the cloud and your network infrastructure becomes more dispersed. Here’s a few questions answer:

    Is cloud network security just a matter of more firewalls or are there nuances specific to cloud workloads?
    How to spot potential and unintended - Pathways to vulnerable cloud resources, Cross-premise pathways, “worm-holes” into highly secure on-prem resources, Ways to by-pass perimeter boundaries
    When should you implement multiple tiers to security cloud workloads?
    When are built-in security features (like Azure Network Security Groups) enough and when do you need more?


    We will also discuss the need to keep all this straight, understood, consistent and the configuration accurately reflecting your security intent. Managing all your on-prem firewalls is challenging enough, let alone the cloud.
  • GDPR: 4 Key Principles for Success Recorded: Aug 22 2018 60 mins
    Keith Brennan Director, Field Engineering FireMon
    In this webinar replay, we'll discuss 4 key principles your organization needs to be successful with the EU's demand for tighter data protection, along with the penalties for the violation. GDPR provides an example of how countless security professionals can be led to anxiety and dread with a looming stack of regulations on fast approach. Put the fears to rest.

    In this webinar, we’ll show you the principles needed for GDPR success:

    -Risk-based data protection
    -Measuring security effectiveness
    -Monitoring data protection
    -Orchestrating persistent compliance

    GDPR is a special instance of government regulations; you’ve seen this for decades. There is nothing to fear. Nothing.
  • Migrations Made Easy Recorded: Feb 28 2018 60 mins
    Tim Woods - Vice President, Technology Alliances, FireMon
    Firewall migration projects are filled with risk: cost overruns, misconfigurations, connectivity failures, and security risk. Every year, security teams review, test, and procure new technologies to keep data protected.

    So, there is no shortage of opportunity for migration headaches.

    In this webinar, we’ll show you how to avoid these traps. It’s time to make sure your migration is fast, simple, and secure.

    You’ll learn how to:

    Analyze Policies and Rules
    Remove Technical Errors
    Refine and Organize New Rules
    Automate and Orchestrate Change in the New Environment
    Join us and see how migrations do not have to bring disruptions, ballooned costs, or security risks. You can realize the benefits of leading-edge technologies, next-gen firewalls, and security devices with simple, repeatable essentials in your upcoming migration.
Continuous Security for the Hybrid Enterprise
The FireMon platform delivers continuous security for hybrid enterprises through a powerful fusion of vulnerability management, continuous compliance and orchestration. Since creating the first-ever network security management solution 15 years ago, FireMon solutions have continued to deliver visibility into and control over complex network security infrastructure, policies and risk for more than 1,500 customers around the world.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Immediate Insight App Available on the Palo Alto Networks Application Framework
  • Live at: Oct 8 2018 10:00 pm
  • Presented by: Jeff Barker, Vice President, Product Management - Immediate Insight
  • From:
Your email has been sent.
or close