Date

By Type

  • Event (99)

By Event Type

By Language

  • English (99)
Displaying 1 to 30 of 99

Cyber Tuesday – Cyber Range Level 1

Welcome to the next step in security training. Part immersive video game, part skills workshop and part team-building exercise, Cyber Range is the antidote to standard, dry-as-dust, snooze-fest training. If you’re looking for a fast-paced, high-tech, FUN way to learn the very latest security strategies and techniques, then look no further! At the Cyber Range, you and your teams will: Master skills and techniques by identifying and preventing live attacks with best practices tips from our experienced instructors. Create and test different strategies by researching and responding to real-world threats. Strengthen your execution by building and testing end-to-end prevention processes while battling other teams during full-on cyberattack scenarios. What’s more, you’ll receive a course certificate after completing your Cyber Range session. Reserve your spot for this exciting, fun, no-cost training. Sessions are 6 hours long. Pre-requisite In order for you to get the most out of our Cyber Range event, it is required that you work regularly with firewall policies or take a Virtual Ultimate Test Drive to provide you with a guided, hands-on experience setting firewall policies prior to attending.
In Person Event
Reston, VA
  • 0
  • 2184

AWS Summit: NYC

AWS Global Summits are free events that bring the cloud computing community together to connect, collaborate, and learn about AWS. Summits are held in major cities around the world, and attract technologists from all industries and skill levels who want to discover how AWS can help them innovate quickly and deliver flexible, reliable solutions at scale. When attending an AWS Summit, you will hear from AWS Leaders, Experts, Partners, and Customers. Learn by attending technical breakout sessions, demonstrations, hands-on workshops, labs, and team challenges. Network with AWS Partners and your peers in our Partner and Solutions Expo.
In Person Event
New York, NY
  • 0
  • 2338

Advanced & Frictionless Security in a Multi-Cloud Environment

Today, organizations need higher performance and faster access to the latest innovative technologies in order to grab whatever competitive edge they can. This almost always means going to the cloud. Unfortunately, in the rush to get there, enterprises can find themselves with data and applications scattered across private and public clouds – often multiple public clouds – spanning IaaS, PaaS and SaaS. Without the appropriate security and compliance strategy in place, this often results in poor visibility and increased risk. The simple truth is that multi-cloud security isn’t intuitive. We can make it easier. This webinar will cover: •Common speed bumps your security and DevOps teams face •Innovative security strategies to tackle a wide range of cloud risks •Security automation and integration within the development lifecycle •Achieving consistent and advanced multi-cloud protections Register now and learn how to secure your multi-cloud environment with advanced, frictionless protection.
Webinar
  • 0
  • 657

Is your Office 365 data protected?

SaaS applications like Microsoft® Office 365® are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as: • Accidental data exposure with SharePoint® • Uncontrolled use of personal OneDrive® accounts • Data security violations in Exchange Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance. Our Security Operating Platform can help. Sign up for our webinar and learn what you need to meet your CASB needs as well as secure your cloud-based data against malware and accidental exposure. You’ll also find out how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.
Webinar
  • 0
  • 354

Is your Office 365 data protected?

SaaS applications like Microsoft® Office 365® are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as: • Accidental data exposure with SharePoint® • Uncontrolled use of personal OneDrive® accounts • Data security violations in Exchange Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance. Our Security Operating Platform can help. Sign up for our webinar and learn what you need to meet your CASB needs as well as secure your cloud-based data against malware and accidental exposure. You’ll also find out how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.
Webinar
  • 0
  • 346

Protecting and enabling 21st century industrial networks at scale

Modernization initiatives such as "Industry 4.0" and "Industrial IoT" are pushing industrial networks to be more connected as well as more complex and challenging to protect. In this session we will demonstrate how you can establish granular visibility and consistent security policy to your SCADA deployment, IIoT and remote sites in even the harsh environments. In other words, we can show you how to protect all of your IT AND OT infrastructure. Join this webinar to learn about: - Consistent and integrated deployment securing traffic across the SCADA core, remote sites, controlled/harsh environments, IIoT and industrial cloud - Zero-trust segmentation using the PA-220R ruggedized Next-Gen Firewall across IT and OT environments - Leveraging central management to increase administrative efficiency and provide cybersecurity and ICS network traffic intelligence to OT and IT
Webinar
  • 0
  • 361

Microsoft Ready

Microsoft Ready Las Vegas is the field readiness event that represents the evolution of our legacy events-MGX, S4, and TechReady-into a single integrated experience. It is where we have created a unified, annual marker signifying renewal, recognition, and the commencement of our engagement rhythm.
In Person Event
Las Vegas, NV
  • 0
  • 2318

Next Generation Firewall Live Demo

The live demo is a fast and easy way to see the Palo Alto Networks next-generation firewalls in action. Our next-generation firewalls are architected to safely enable applications and prevent modern threats. Our approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Join this live demo with a next-generation firewall expert and see how Palo Alto Networks can help protect your business. Register today.
Online Event
  • 0
  • 2118

Live Demo: Preventing Security Breaches on the Endpoint

Attackers are getting more targeted and advanced, deploying unknown exploits and unique malware that current day endpoint security is not equipped to prevent or even detect. Existing approaches simply can’t protect against these attacks because they don’t have known signatures, known strings –and in many cases, no previously known behavior-so they go straight through, resulting in compromised endpoints waiting for detection and remediation to step in, which is too little too late.  Palo Alto Networks Advanced Endpoint Protection is a complete paradigm shift from detection remediation to pure prevention, designed to close the door on these threats, which manage to evade detection by network-based security or take advantage of blind spots, well before any damage can be done.  Join Palo Alto Networks® for a Live Webinar to learn about the breakthrough advanced endpoint technology that redefines endpoint security as we know it.
Online Event
  • 0
  • 2108

Cloud Native (In)Security: A Practical Demonstration

During the course of research for Ignite 2018 we noticed a startling trend of inherently misconfigured off-the-shelf marketplace images which allowed for full compromise of the resource. During this discussion we will walk through a live example, explore native security pitfalls, and discuss potential mitigation techniques.
In Person Event
Maryland Heights, MO
  • 0
  • 416

Arizona Partner SE2SE

You are invited to attend the Palo Alto Networks® Partner SE2SE chapter event on July 18, 2018. This SE led meeting is an opportunity for partners to learn the latest Palo Alto Networks® product updates and technical topics. This session will cover the recent acquisition of Evident.io and discuss Ignite Conference announcements. AGENDA: 1:45 - 2:00 p.m. Arrive 2:00 - 4:00 p.m. Deep Dive into Evident for Public Cloud and Ignite discussion
In Person Event
Scottsdale, AZ
  • 0
  • 431

Del Mar Opening Day After Party

Palo Alto Networks® and ForeScout would like to invite you to the official After Party for Del Mar's Opening Day!! Join us as we celebrate at L'Auberge where you'll enjoy ocean views, drinks from mixologists, and food from Chef Nathan Lingle. Relax in our cabana and vibe to music by Southern California DJs FishFonics and Gabe Vega. This is the party you want to be at and we're the ones that want to get you in.
In Person Event
Del Mar, CA
  • 0
  • 961

Quick Start Training

You are invited to the Quick Start Training: Host-Based Protection, where you will get hands-on experience with Palo Alto Networks® Security Operating Platform. In this complimentary 2-hour training you will learn how to defeat the adversary at the endpoint. Our Quick Start Training program is designed to provide you with a guided hands-on experience of Palo Alto Networks® highly automated and natively integrated security platform. Each session presents a unique, hands-on experience with a different aspect of our highly automated security platform. Participating will give you the opportunity to fully understand how we can protect your organization against successful cyberattacks. During this training you will: Manage and operate the Traps solution Break down the sophisticated threat lifecycle Prevent successful execution of advanced attacks originating from executables, data files or network-based exploits Take on the roles of the targeted individual, attacker and security professional Understand the chain-like nature of exploits Experience the power of advanced execution control and cloud intelligence See the new Traps 5.0 UI Learn about the SecDo (EDR) acquisition and application framework
Online Event
  • 0
  • 421

America Movil Cybersecurity Day

Acompañanos en este evento exclusivo para Telcel y America Movil donde abordaremos temas estrategicos sobre cyberseguridad, como: - Vision para tecnologias de Seguridad de Palo Alto Networks - Estrategias de cyberseguridad en ambientes 5G - Seguridad en el Internet de las Cosas (IoT) Despues de las sesiones de seguridad, acompañanos a un divertido evento interactivo en el que probaremos y entenderemos los diferentes sabores y tecnicas utilizadas en la creacion de cervezas. Cupo Limitado.
In Person Event
Mexico DF, DF
  • 0
  • 384

Cybersavvy Leaders

CIO perspectives on maximising security As the most disruptive force in cybersecurity, Palo Alto Networks® continues to transform the security landscape. From the network to the endpoint to the cloud, we’re committed to protecting you and more than 50,000 customers like you around the world. Meet Naveen Zutshi, Palo Alto Networks senior vice president and chief information officer, for breakfast! Naveen will share inspiration, insights and thought leadership with a select group of fellow CIOs at this exclusive breakfast meeting. Join us for an insightful peer exchange of ideas. Among other topics, Naveen will discuss: How to cultivate information security experts within your company Palo Alto Networks own strategies for countering threats and attacks His priorities to keep both the company and our customers secure
In Person Event
  • 0
  • 376

I tuoi dati su Office 365 sono protetti?

Applicazioni SaaS come Microsoft® Office 365® sono molto apprezzate e sempre più diffuse nelle aziende, ma lo stesso può dirsi delle minacce che si nascondono in queste offerte: • Esposizione accidentale dei dati con SharePoint® • Uso non controllato di account personali di OneDrive® • Violazioni alla sicurezza dei dati in Exchange Sì, anche applicazioni SaaS affidabili come Office 365 possono far crescere il rischio di violazioni e problemi di conformità. La nostra Security Operating Platform può offrirti supporto. Registrati al webinar e scopri come soddisfare le tue esigenze CASB e proteggere i dati sul cloud da malware ed esposizione accidentale. Scopri anche come ottenere visibilità completa e reporting, classificazione dei dati e controllo granulare delle attività per utente, cartella e file, per una protezione efficace dei dati business-critical su Office 365.
Webinar
  • 0
  • 740

Virtual Ultimate Test Drive - Next Generation Firewall - Jul 23rd, 2018

JOIN US FOR THE ULTIMATE VIRTUAL TEST DRIVE, WHERE YOU'LL GET HANDS-ON EXPERIENCE WITH PALO ALTO NETWORKS NEXT-GENERATION FIREWALL. In this free, two-hour virtual workshop, you will configure security policies that will ultimately restore visibility and control over the applications, users and content traversing your network. During this workshop you will: Established policies to safely enable applications while restricting the others Enable sandbox threat analysis using WildFire to prevent unknown malware Configured policy that decrypts and inspects SSL Traffic Safely enable mobile devices using GlobalProtect *Please note: If the class is full, we have plenty of other dates to choose from. Click here to view other times
Online Event
  • 0
  • 2119

Watch & Learn: Advanced Next-Generation Firewall Deployment

This is the “Best of Ignite” Week. Day 1 will be the NGFW HOW presented by Diego & Michael. Designed for security and network engineers, this session dives deep into Palo Alto Networks security policies and network configuration. It is designed to enhance your understanding of how to configure and manage some of the more advanced features of Palo Alto Networks next-generation firewalls. This session will focus on firewall and Panorama features useful for deployments in large and complex networks.
Webinar
  • 0
  • 596

Interpreting the 2018 NSS Labs AEP 2.0 Test

NSS Labs® recently published the results of its 2018 Advanced Endpoint Protection (AEP) 2.0 Group Test, which examines vendors’ ability to protect endpoints from malware, ransomware and exploits. In the test, Palo Alto Networks® Traps™ advanced endpoint protection achieved both high Security Effectiveness and low Total Cost of Ownership, earning a Recommended rating. Join this webinar to hear vice president of Research Strategy at NSS Labs, Mike Spanbauer, and director of Product Marketing at Palo Alto Networks, Danny Milrad, discuss: - Advanced endpoint protection must-haves - Understanding the AEP 2.0 test results - What a Recommended rating means to you - How Palo Alto Networks performed on the test
Webinar
  • 0
  • 205

Your Office 365 data & apps secured

SaaS applications like Microsoft® Office 365® are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as: • Accidental data exposure with SharePoint® • Uncontrolled use of personal OneDrive® accounts • Data security violations in Exchange Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance. Our Security Operating Platform can help. Sign up for our webinar and learn what you need to meet your CASB needs as well as secure your cloud-based data against malware and accidental exposure. You’ll also find out how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.
Webinar
  • 0
  • 771

Interpreting the 2018 NSS Labs AEP 2.0 Test

NSS Labs® recently published the results of its 2018 Advanced Endpoint Protection (AEP) 2.0 Group Test, which examines vendors’ ability to protect endpoints from malware, ransomware and exploits. In the test, Palo Alto Networks® Traps™ advanced endpoint protection achieved both high Security Effectiveness and low Total Cost of Ownership, earning a Recommended rating. Join this webinar to hear vice president of Research Strategy at NSS Labs, Mike Spanbauer, and director of Product Marketing at Palo Alto Networks, Danny Milrad, discuss: - Advanced endpoint protection must-haves - Understanding the AEP 2.0 test results - What a Recommended rating means to you - How Palo Alto Networks performed on the test
Webinar
  • 0
  • 204

Google Next '18

This year, Google Cloud is taking over the largest conference center in San Francisco, transforming the Moscone Center into a physical and digital playground for your imagination. Here, you can form new relationships, expand your knowledge, fuel your mind, and join our community to build the future of cloud together.
In Person Event
San Francisco, CA
  • 0
  • 2301

Cyber Tuesday – Cyber Range Level 1

Welcome to the next step in security training. Part immersive video game, part skills workshop and part team-building exercise, Cyber Range is the antidote to standard, dry-as-dust, snooze-fest training. If you’re looking for a fast-paced, high-tech, FUN way to learn the very latest security strategies and techniques, then look no further! At the Cyber Range, you and your teams will: Master skills and techniques by identifying and preventing live attacks with best practices tips from our experienced instructors. Create and test different strategies by researching and responding to real-world threats. Strengthen your execution by building and testing end-to-end prevention processes while battling other teams during full-on cyberattack scenarios. What’s more, you’ll receive a course certificate after completing your Cyber Range session. Reserve your spot for this exciting, fun, no-cost training. Sessions are 6 hours long. Pre-requisite In order for you to get the most out of our Cyber Range event, it is required that you work regularly with firewall policies or take a Virtual Ultimate Test Drive to provide you with a guided, hands-on experience setting firewall policies prior to attending.
In Person Event
Santa Clara, CA
  • 0
  • 2133

Virtual Ultimate Test Drive - Migration Process - Jul 24th, 2018

JOIN US FOR THE ULTIMATE VIRTUAL TEST DRIVE, WHERE YOU'LL GET HANDS-ON EXPERIENCE WITH MIGRATION PROCESS. In this free, two-hour virtual workshop,you will learn Migrating to a Palo Alto Networks next-generation firewall is a critical step toward the prevention and detection of cyberattacks.  During this workshop you will learn: How to Simplify and accelerate the migration process with the migration tool. Easily convert legacy port-based policies to application-based policies. Optimize your security environment by identifying and removing unused policies. *Please note: If the class is full, we have plenty of other dates to choose from. Click here to view other times
Online Event
  • 0
  • 2133

Watch & Learn: Deep Dive with SSL Decryption

This is the “Best of Ignite” Week. Day 2 will be the SSL Decryption HOW presented by Spencer & Richard. More and more enterprise traffic is being obscured with SSL, including some of the applications and sites that introduce the most risk for your business. Palo Alto Networks firewalls provide the capability to decrypt and inspect traffic for visibility, control and granular security. This session will guide you in setting up SSL decryption for a forward proxy with deployment best practices. The demo will navigate you through understanding the various features available to support SSL decryption. Additionally, we will go through a troubleshooting exercise to learn how to overcome challenges you may face.
Webinar
  • 0
  • 583

Protecting and enabling 21st century industrial networks at scale

Modernization initiatives such as "Industry 4.0" and "Industrial IoT" are pushing industrial networks to be more connected as well as more complex and challenging to protect. In this session we will demonstrate how you can establish granular visibility and consistent security policy to your SCADA deployment, IIoT and remote sites in even the harsh environments. In other words, we can show you how to protect all of your IT AND OT infrastructure. Join this webinar to learn about: - Consistent and integrated deployment securing traffic across the SCADA core, remote sites, controlled/harsh environments, IIoT and industrial cloud - Zero-trust segmentation using the PA-220R ruggedized Next-Gen Firewall across IT and OT environments - Leveraging central management to increase administrative efficiency and provide cybersecurity and ICS network traffic intelligence to OT and IT
Webinar
  • 0
  • 205

Защищены ли ваши данные в Office 365?

Приложения SaaS, например Microsoft® Office 365®, набирают популярность. Всё больше компаний используют их в своей работе. Однако такая модель предоставления приложений таит в себе определенные угрозы: • случайное раскрытие данных через SharePoint® • неконтролируемое использование личных учетных записей OneDrive® • нарушение безопасности данных в Exchange Даже надежные приложения SaaS, такие как Office 365, повышают риск нарушения безопасности и несоблюдения нормативных требований. Наша платформа Security Operating Platform поможет избежать таких проблем. Зарегистрируйтесь для участия в вебинаре и узнайте, как обеспечить соответствие требованиям брокеров CASB и защитить облачные данные от вредоносного ПО и случайного раскрытия. Вы также узнаете, как обеспечить полную визуализацию, создание отчетов, систематизацию данных и гибкое применение правил для всех пользователей, папок и действий с файлами, чтобы защитить важные для бизнеса данные в Office 365.
Webinar
  • 0
  • 737

¿Están a salvo sus datos en Office 365?

Las aplicaciones de software como servicio (SaaS), como Microsoft® Office 365®, tienen mucho éxito y cada vez más empresas las utilizan. Sin embargo, también están aumentando los peligros que conllevan, como los siguientes: • Revelación accidental de datos con SharePoint® • Uso descontrolado de cuentas personales de OneDrive® • Violación de la seguridad de la información en Exchange Sí, incluso las aplicaciones SaaS de confianza como Office 365 pueden hacer que aumente el riesgo de sufrir fugas de datos y de incumplir las normativas de seguridad. Nuestra solución, Security Operating Platform, ayuda a combatir estos peligros. Inscríbase en nuestro seminario web e infórmese sobre el CASB que necesita para proteger sus datos en la nube frente al código dañino y las fugas fortuitas. Descubrirá cómo disfrutar de plena visibilidad y completas funciones de elaboración de informes y clasificación de datos, junto con la posibilidad de realizar ajustes detallados a nivel de usuarios, carpetas y operaciones de archivo, todo ello con el objetivo de proteger los datos cruciales alojados en Office 365.
Webinar
  • 0
  • 736

Protecting and enabling 21st century industrial networks at scale

Modernization initiatives such as "Industry 4.0" and "Industrial IoT" are pushing industrial networks to be more connected as well as more complex and challenging to protect. In this session we will demonstrate how you can establish granular visibility and consistent security policy to your SCADA deployment, IIoT and remote sites in even the harsh environments. In other words, we can show you how to protect all of your IT AND OT infrastructure. Join this webinar to learn about: - Consistent and integrated deployment securing traffic across the SCADA core, remote sites, controlled/harsh environments, IIoT and industrial cloud - Zero-trust segmentation using the PA-220R ruggedized Next-Gen Firewall across IT and OT environments - Leveraging central management to increase administrative efficiency and provide cybersecurity and ICS network traffic intelligence to OT and IT
Webinar
  • 0
  • 201

AWS Security Automation and Orchestration (SAO) DevOps and SecOps

This workshop is designed to teach how to leverage AWS Security Automation and Orchestration (SAO) processes to constraining, tracking, publishing continuous security configurations, integration, deployments and treatments which can be certified against common security frameworks (e.g. PCI, FedRAMP, DoD CC SRG, IRS 1075, etc.). The SAO process will facilitate the orientation and association of DevOps and SecOps practices, changes and coordination of Continuous Integration (CI), Continuous Delivery (CD) and Continuous Risk Treatment (CRT) of an AWS account or multiple accounts. Sponsors: Palo Alto Networks, Trend Micro, Splunk, Barracuda, Puppet, GitHub, Telos and CIS
Industry Event
New York, NY
  • 0
  • 393
Displaying 1 to 30 of 99