In this short video Palo Alto Networks security experts talk about GDPR and TLS/SSL Decryption. Is it allowed? Are you at risk if you aren't decrypting SSL traffic? Watch to learn how an NGFW can help you implement a strong GDPR strategy for your business.
In this 20 minute on demand webinar, John Morello, formerly CTO at Twistlock and now Prisma VP of Product, provides a look at challenges with traditional security strategies--especially for organizations leveraging microservices. He then shares why and how your organization can adopt a proactive security stance by leveraging containers and other cloud native technologies.
DNS Security service applies predictive analytics and infinite cloud scale to disrupt attacks that use DNS for command and control or data theft. Using shared threat intelligence and machine learning, DNS Security enables teams to quickly identify threats hidden in DNS traffic.
Policy Optimizer strengthens security by closing dangerous policy gaps left by legacy firewall policies. Policy Optimizer makes migration from port-based rules to App-ID based rules easy, fast, and accurate. Taking complexity out by removing scores of legacy rules reduces human error, which is a leading cause of data breaches.
Prisma helps your organization deploy consistent protection for your mobile workforce, no matter where they are in the world. It replaces the traditional remote access VPN with an architecture designed for access to internet, public cloud, private cloud and SaaS applications.
With the adoption of cloud-based applications, organizations are reevaluating their traditional wide area networking. Using Prisma to protect your branch offices and mobile users with consistent security delivered from the cloud.
The principles of zero trust play an important role in the protection of data in the cloud. Use Prisma to implement zero trust across your cloud environments and stay on top of who has access to your applications and data.
Prisma continuously monitors your distributed multi-cloud environments and SaaS applications, proactively alerting you of any misconfigurations or compliance violations and even automates remediation so you can embrace the cloud with confidence.
Hear what’s top of mind for Scott Howitt, CISO of MGM Resorts International. Scott discusses his top business concerns, aligning security to the business, what he looks for when evaluating security tools and technologies and much more.
In the APAC Service Provider markets, visibility becomes one of the higher value capabilities for 5G network deployments. As government and regulatory bodies enforce security requirements, 5G Security has become one of the most important conversations for new service developments. Learn more about this with Peter Molloy, Head of SP sales at Palo Alto Networks.
With changing security landscape and increasing compute power and threat vectors, 5G security needs to embrace a holistic protection approach, that includes not just the networks, but the end user and IoT devices. Learn about Palo Alto Networks approach to 5G security with Scott Stevens, CTO for Service Providers at Palo Alto Networks
Displaying 1 to 30 of 229
Be the first to know.
As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.