Date

By Source

By Technology

By Services

By Audience

Displaying 10411 to 10440 of 10490

Assuming a Platform Approach to Cybersecurity

Pamela Warren, Director of Government and Industry Initiatives at Palo Alto Networks, shares her thoughts on why a platform approach is critical to effective cybersecurity within the government space. Warren explains that government organizations make four common mistakes when trying to secure their information systems. The most basic error, she said, is failing to have visibility to what is happening on your network: "What we're seeing is that many organizations are unaware of what applications they are even running on their network." This ends up being a major barrier to effective cybersecurity because it leaves unseen gaps in security for attackers to target.

  • 0
  • 246

Introducing the PA-7050 - The Fastest Next-Generation Firewall (Hebrew)

Your business groups have a seemingly insatiable need for more bandwidth. Recent high profile attacks that use port 80, or SSL to hide, and leverage commonly used applications like FTP and RDP for exfiltration are driving the need to increase your security posture. Which do you choose? Performance or security? Easy – Both.

  • 0
  • 143

Palo Alto Networks and Avaya Partnership

Palo Alto Networks and Avaya™ have partnered to provide high-performance next-generation security solutions for data center networks. The mission critical data centers of today have no tolerance for disruptions in throughput or availability. At the same time, the threats imposed on data centers by modern malware require a security solution that has next-generation firewall intelligence.

  • 0
  • 1373

Wireless Networks Solution Brief

Enterprise mobility is changing the ways that people work and the devices they use. It’s also changing the network infrastructure needed to support the devices on business networks. Wireless interfaces are the network connectivity standard for tablets and smartphones, and even some laptops such as ultrabooks and the Apple MacBook Air. As a result, wireless networking is now ubiquitous. It’s found at corporate and branch offices everywhere, including at organizations that have taken conservative positions on wireless networking in the past, such as hospitals, banks, and government offices. With all of this rapid growth, questions arise on whether the proper security is in place to protect the traffic and keep it free of malfeasance and impropriety.

  • 2
  • 1823

下一代防火墙 : 你需要了解的任何事情

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Simplified Chinese.

  • 2
  • 1711

Palo Alto Networks and Lancope

Performance and accountability of enterprise IT infrastructure has shifted from an incidental focus to one that requires real-time visibility for proactive monitoring and compliance. Traditional network security devices posed a blind spot for network monitoring and management solutions for basic network parameters such as NAT tables and traffic sessions.

  • 0
  • 517

GSA and CMAS Government Contracts

Information about the Palo Alto Networks products and services available on GSA CMAS contracts.

  • 0
  • 412

Palo Alto Networks and Tufin

As organizations deploy multiple security solutions to safeguard corporate networks from wide-ranging threats, it becomes increasingly difficult to perform labor-intensive and error-prone tasks such as risk analysis, change management, auditing and compliance checks. Palo Alto Networks and Tufin® have partnered to help customers increase operational efficiency and reduce risk by intelligently automating firewall policy management.

  • 0
  • 1240

Palo Alto Networks and Solera Networks

Palo Alto Networks and Solera Networks are combining next generation firewalls with active network forensics to enable security administrators to “see” critical attacks, uncover their root cause and quickly adapt their infrastructure to prevent recurrence and mitigate risk.

  • 0
  • 431

Traps PCI Compliance

The theft of credit card data continues to grow at an alarming rate. It is costly to credit card companies and merchants, and it undermines consumer confidence. The Payment Card Industry has developed the PCI Data Security Standard (PCI DSS), which includes 12 requirements for protecting cardholder data. Despite substantial investments made in securing their networks, organizations are realizing that being PCI compliant does not mean an enterprise is protected against advanced cyberattacks.

  • 1
  • 3594

Threat Review: The Anatomy of a Targeted Attack

Targeted attacks represent some of the most dangerous threats facing a modern enterprise. While these threats remain relatively rare, they often target your most valuable assets and intellectual property. The use of custom malware and attack strategies also makes them some of the most difficult IT security threats for you to detect. In this episode of the Threat Review, we will analyze a real-world example of a targeted attack exposed by WildFire, including an analysis of the malware industry that supports targeted attacks, and best practices to protect your network today.

  • 0
  • 454

Palo Alto Networks and AlgoSec Partnership

As organizations deploy multiple security solutions to safeguard corporate networks from a wide range of threats, they are realizing that the traditional manual process of performing risk analysis, change management, auditing and compliance are labor-intensive and error-prone. To increase operational efficiency and minimize risk, Palo Alto Networks and AlgoSec have partnered to reduce network security policy complexity by intelligently automating firewall policy management, from optimization to risk analysis to change management.

  • 0
  • 1198

How to Detect and Stop Modern Cyberattacks

Modern threats are forcing businesses to fully examine the lifecycle of cyberattacks and advanced persistent threats (APTs). During this webcast we review real world data on cyberattacks and dissect the 5 steps of an advanced attack designed to evade security controls.

  • 0
  • 417

Virtual Systems

Overview of virtual systems, their benefits, possible deployment scenarios and how to configure them.

  • 0
  • 1761

Palo Alto Networks and Skybox

Identifying security risks proactively and systematically in a large network is like looking for a needle in a haystack. To address the challenge, it is imperative that the network firewall, as a first line of defense, is optimally configured for security, continuous compliance and high performance. Palo Alto Networks and Skybox® Security have partnered to monitor and prevent security or compliance gaps in an enterprise firewall deployment, and minimize overall firewall management costs.

  • 0
  • 986

Palo Alto Networks and ArcSight

Palo Alto Networks and ArcSight have partnered to deliver unprecedented visibility and correlation of enterprise network security events. Utilizing the ArcSight Flexconnector and Common Event Format (CEF), Palo Alto Networks’ next-generation firewalls add rich context encompassing all user and application activity into ArcSight’s Enterprise Security Manager Platform. This integration allows ArcSight to correlate additional relevant data with other data sources into a single cohesive view, unifying critical user, application, and threat visibility.

  • 0
  • 2646

Traps Advanced Endpoint Protection Named a Gartner Visionary

Gartner has recognized Traps advanced endpoint protection as a Visionary among endpoint security products. Read the full report.

  • 3
  • 4966

Migrating from Cisco ASA to Palo Alto Networks - Spanish

Mire esta “Migración del Cisco ASA hacia un Palo Alto Networks” Webcast. Le enseñaremos lo fácil que es moverse hacia una plataforma de Next Generneration Firewall. Nuestro equipo de ingenieros especializados le explicarán las diferencias fundamentales entre un Cisco ASA y un Palo Alto Networks y compartirán las mejores prácticas para la migración, con ejemplos y casos de éxito.

  • 0
  • 679

Migrating from Cisco ASA to Palo Alto Networks

Watch this webinar to learn how easy it is to move to a next-generation security platform. Our product experts and Consulting Services team will explain the fundamental differences between Cisco ASA and Palo Alto Networks and share migration best practices, examples and case studies.

  • 4
  • 3001

Best of Black Hat 2013

Hear the top takeaways, including noteworthy new research, tools, and techniques, from a week at Black Hat during this recap of the 2013 conference.

  • 0
  • 159

3 Ways to Protect Your Datacenter Against Modern Threats

Learn three ways to integrate better security into critical, highly available networks while keeping the primary mission of the datacenter (serving available, high-performance applications) at the forefront.

  • 0
  • 176

Palo Alto Networks and Symantec

Palo Alto Networks and and Symantec have partnered to enable organizations to produce executive, technical, and audit-level reports with granular per user and application usage data that are highly effective at communicating risk levels and the security posture of the organization.

  • 0
  • 2165

Threat Review Series: Verizon Report - What You Need to Know Now

In this series we’ll analyze the recent Verizon Data Breach Investigation Report (DBIR) and malware findings from WildFire.

  • 0
  • 196

Palo Alto Networks and FireMon

Palo Alto Networks and FireMon have partnered to jointly deliver a total lifecycle security solution for enterprise and service provider customers. FireMon provides software that facilitates change management and control of Palo Alto Networks firewalls, increasing management visibility and reducing the total cost of making changes.

  • 0
  • 1290

Palo Alto Networks and Splunk

Hand in hand with the deployment of a robust security architecture is the need for a monitoring and response system that allows enterprises to continuously monitor and process security data efficiently and proactively act upon this data if suspicious network activity is found. Palo Alto Networks has partnered with Splunk® to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis.

  • 0
  • 2413

Migrating from Cisco ASA to Palo Alto Networks - Italian

Guardate il ns. webcast sulla migrazione da Cisco ASA a Palo Alto Networks. Vi mostreremo quanto sia semplice passare ad una piattaforma di sicurezza di nuova generazione. Il nostro team di esperti vi spiegherà le differenze fondamentali fra Cisco ASA e Palo Alto Networks e condividerà le migliori best-practice di migrazione, alcuni esempi e case-study.

  • 0
  • 331

Kurumunuz Hedefli Tehditlere Karşı Güvende mi?

Networkünüzdeki zararlı yazılımları görmek ve bunların hangilerinin 30-60 dk içinde önlenebileceğini bilmek ister misiniz? WildFire ile hızlı koruma detaylarını dinlemek ve şirketinize özel tehdit raporu isteğinde bulunmak için webinerimize bekliyoruz.

  • 0
  • 168

Managed Security Services Solution Brief

Demand for managed security services is on the rise as many enterprises and governments struggle to contend with an increasingly complex threat landscape, a shortage of skilled personnel, and the need to rapidly adapt to dynamic business conditions while still keeping security costs under control.

  • 1
  • 4031

Palo Alto Networks and NetWitness

Palo Alto Networks and NetWitness have partnered to provide unified security event analysis and resolution. The combined solution validates application execution, speeds incident investigation and eliminates wasted time navigating disparate systems.

  • 0
  • 303
Displaying 10411 to 10440 of 10490