Date

By Source

By Technology

By Services

By Audience

Displaying 11011 to 11040 of 11115

Control your Own Cyberspace: Migrating Threat Response Teams To Threat Intelligence Teams

Vishaal Hariprasad - Threat Intelligence Architect with Palo Alto Networks explores and explains the prevailing shift in mindset from one of signature-based defence security models to more abstract ‘Indicators of Compromise’ and knowing where and how to identify them within your own network security stack.
  • 0
  • 400

Application Visibility and Control

How Palo Alto Networks delivers application visibility and control more effectively than other port-based offerings.
  • 1
  • 4709

Asia-Pacific Government Authority

As the Government Authority responsible for driving growth in the information technology sector, this agency understands technology. With a globalized economy and considered one of the most competitive countries in the world, this Asian country has one of the highest internet penetration rates in the greater Asia-Pacific region.
  • 0
  • 404

次世代ファイアウォール : オンラインセミナー

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Japanese.
  • 2
  • 1241

Firewall de Próxima Geração: Tudo o que você Precisa saber

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Portuguese.
  • 3
  • 1183

Comparing Palo Alto Networks with Web Application Firewalls (WAF)

Comparison of next generation firewall technology with Web Application Firewalls (WAF).
  • 0
  • 25844

Palo Alto Networks and Interface Masters Partnership

On mission critical network segments, customers may prefer to deploy a tap/bypass switch to maintain network continuity to mitigate the risks of scheduled or unscheduled downtime of an inline appliance for configuration changes, maintenance, or repair.
  • 0
  • 325

Migrating from Cisco ASA to Palo Alto Networks - Polish

Prezentacja poświęcona porównaniu rozwiązań Cisco ASA z firewallami firmy Palo Alto Networks wraz z wyjaśnieniem w jaki sposób dokonać bezpiecznej i bezbolesnej migracji z tych urządzeń do rozwiązań następnej generacji (NGFW).
  • 0
  • 473

Palo Alto Networks and Q1 Labs

Palo Alto Networks and Q1 Labs have partnered to jointly deliver the only next generation security intelligence and control solution. QRadar’s best-in-class data collection, analysis, correlation and auditing capabilities coupled with Palo Alto Networks unique application, user and threat control enable organizations to quickly and easily implement a next-generation security management program to meet current and emerging network security challenges. The combined solution enables security professionals to comprehensively identify, defend against, and remediate exploits and policy violations.
  • 0
  • 2455

Function Control

A quick discussion on why application function control is critical to enabling applications, followed by a demonstration of how Palo Alto Networks can control functions.
  • 1
  • 1180

Next Generation Firewall: alles was Sie wissen müssen

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in German.
  • 1
  • 1258

Migrating from Cisco ASA to Palo Alto Networks - Russian

Посмотрите вебинар, чтобы понять, насколько простой переход на платформу нового поколения для сетевой безопасности. Наши продакт менеджер и консультанты расскажут о фундаментальной разнице между Cisco ASA и Palo Alto Networks, а также поделятся лучшими кейсами и практиками миграции.
  • 0
  • 948

Palo Alto Networks and Swivel

IT Managers are facing ever-increasing demands to secure remote access to corporate applications and data. The proliferating use of personal devices such as smartphones, laptops or tablets within the corporate environment introduces additional security issues. Palo Alto Networks is partnering with Swivel Secure Ltd. to provide its mutual customers with an extremely secure, flexible, and easy to manage remote access solution.
  • 0
  • 294

Webcast: Stopping the Hemorrhaging of Personal Health Information

In the face of government regulation such as the Health Insurance Portability and Accountability Act (HIPAA), personal health information (PHI) continues to leak into the public domain at an alarming rate, resulting in fraudulent insurance claims, identity theft and other costs to the health care industry. Research indicates PHI can easily be found on peer-to-peer (P2P) filesharing networks. But why?
Santa Clara
  • 0
  • 234

Lightboard Series: VM-Series on Google Cloud Platform Overview

A quick summary of the different ways in which you can deploy the VM-Series next-generation firewall on Google Cloud Platform to protect your applications and data.
  • 0
  • 20

Assuming a Platform Approach to Cybersecurity

Pamela Warren, Director of Government and Industry Initiatives at Palo Alto Networks, shares her thoughts on why a platform approach is critical to effective cybersecurity within the government space. Warren explains that government organizations make four common mistakes when trying to secure their information systems. The most basic error, she said, is failing to have visibility to what is happening on your network: "What we're seeing is that many organizations are unaware of what applications they are even running on their network." This ends up being a major barrier to effective cybersecurity because it leaves unseen gaps in security for attackers to target.
  • 0
  • 291

Control the Risks in Allowed Applications

How Palo Alto Networks provides secure application enablement—first by allowing the application and then scanning it for threats to protect users and your network.
  • 3
  • 3310

下一代防火墙 : 你需要了解的任何事情

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Simplified Chinese.
  • 2
  • 2145

Mobile Security - Russian

Mobile Security in Russian Language
  • 0
  • 356

Exploit Kits: How to Protect Your Organization

Today’s attackers are using exploit kits to automatically find vulnerabilities in common systems. As the use of these attacks increase, so does your chance of being compromised. In order to better protect your organization, you’ll need to understand the inner workings of exploit kits.
  • 0
  • 147

Palo Alto Networks and Arista Networks

Palo Alto Networks and Arista Networks have partnered to offer the highest performance next-generation firewall implementation in the industry. The modern data center has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network must be able to meet those demands. The combination of Arista Networks’ Datacenter Switches along with Palo Alto Networks’ next-generation firewalls provides unmatched security in high-performance data centers without impacting throughput.
  • 0
  • 2742

Palo Alto Networks and Solera Networks

Palo Alto Networks and Solera Networks are combining next generation firewalls with active network forensics to enable security administrators to “see” critical attacks, uncover their root cause and quickly adapt their infrastructure to prevent recurrence and mitigate risk.
  • 0
  • 470

Palo Alto Networks and NitroSecurity

Palo Alto Networks and NitroSecurity have partnered to deliver unprecedented visibility, analysis and correlation of security events, user activity, and application usage. Palo Alto Networks next-generation firewalls capture rich user and application context providing increased control of applications and prevention of advanced threats.
  • 0
  • 297

Palo Alto Networks and FireMon

Palo Alto Networks and FireMon have partnered to jointly deliver a total lifecycle security solution for enterprise and service provider customers. FireMon provides software that facilitates change management and control of Palo Alto Networks firewalls, increasing management visibility and reducing the total cost of making changes.
  • 0
  • 1523

Best of Black Hat 2013

Hear the top takeaways, including noteworthy new research, tools, and techniques, from a week at Black Hat during this recap of the 2013 conference.
  • 0
  • 184

3 Ways to Protect Your Datacenter Against Modern Threats

Learn three ways to integrate better security into critical, highly available networks while keeping the primary mission of the datacenter (serving available, high-performance applications) at the forefront.
  • 0
  • 201

Palo Alto Networks and Symantec

Palo Alto Networks and and Symantec have partnered to enable organizations to produce executive, technical, and audit-level reports with granular per user and application usage data that are highly effective at communicating risk levels and the security posture of the organization.
  • 0
  • 2454
Displaying 11011 to 11040 of 11115