Date

By Technology

By Services

By Audience

Displaying 2461 to 2490 of 2560

Traps PCI Compliance

The theft of credit card data continues to grow at an alarming rate. It is costly to credit card companies and merchants, and it undermines consumer confidence. The Payment Card Industry has developed the PCI Data Security Standard (PCI DSS), which includes 12 requirements for protecting cardholder data. Despite substantial investments made in securing their networks, organizations are realizing that being PCI compliant does not mean an enterprise is protected against advanced cyberattacks.

  • 1
  • 2945

Palo Alto Networks and SafeNet

As more and more daily business practices are conducted online, organizations face a growing challenge of ensuring that only authorized users may carry out transactions and access its most sensitive online resources. Moreover, businesses must protect access to network and web-based applications amid a rapidly changing security landscape of complex identity management—especially resulting from proliferation of mobile devices. Palo Alto Networks is partnering with SafeNet to provide a multi-factor authentication solution to protect user identities.

  • 0
  • 203

60 Minutes: Next Generation Firewalls in the Real World

Join Nir and Mark Bouchard of AimPoint Group as they share candid interviews with customer about lessons learned, benefits gained, and advice they have for their peers in the industry. As usual, you should expect a lively event as Nir and Mark debate the impacts and implications of these customer experiences, and incorporate your questions and comments over the course of the conversation.

  • 0
  • 77

Verizon and Palo Alto Networks: Partnering for True Next-Generation Security Solutions

Verizon and Palo Networks have partnered to offer you the most advanced security technology combined with world-leading managed services.

  • 0
  • 699

Palo Alto Networks and Enterasys Partnership

Enterprise Mobility and BYOD trends are causing significant disruption to traditional network security practices. The growth and diversity of mobile device usage combined with the requirement of anytime, anywhere access to applications and data, has presented significant operational challenges and security risk to the IT organization. Typical legacy enterprise LAN infrastructures were not architected with adequate management, visibility, and awareness necessary to adapt to today’s application security and mobile provisioning requirements.

  • 0
  • 215

Revealing the Secrets – Advances in Android & iOS Attacks

Join us for this no-cost webinar to get vital details on how the rapidly changing threat landscape may affect your organization. You’ll also get comprehensive strategies for securing your mobile workforce.

  • 0
  • 94

Palo Alto Networks and Solera Networks

Palo Alto Networks and Solera Networks are combining next generation firewalls with active network forensics to enable security administrators to “see” critical attacks, uncover their root cause and quickly adapt their infrastructure to prevent recurrence and mitigate risk.

  • 0
  • 329

Palo Alto Networks for Advanced Threats

In this webinar we will talk about what Advanced Persistent Threats are and how they target Enterprises. We will also talk about our Lifecycle approach to APT mitigation and the power of WildFire.

  • 0
  • 74

Palo Alto Networks and Interface Masters Partnership

On mission critical network segments, customers may prefer to deploy a tap/bypass switch to maintain network continuity to mitigate the risks of scheduled or unscheduled downtime of an inline appliance for configuration changes, maintenance, or repair.

  • 0
  • 182

Firewall de Próxima Geração: Tudo o que você Precisa saber

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Portuguese.

  • 3
  • 586

Business Case for Next-Generation Firewalls - Video

Using a Palo Alto Networks next-generation firewall, your security team can strike an appropriate balance between blocking all personal-use applications and allowing them. Secure application enablement begins with first knowing exactly which applications are being used and by whom. This knowledge is then effectively translated into positive control model firewall policies that extend beyond traditional 'allow or deny.' The final component in our solution is giving you the ability to securely enable applications without degrading your firewall's performance.

  • 1
  • 2013

Defeat APTs and Improve Your Security Posture in Real-Time

Level the playing field by using next generation security technologies from Palo Alto Networks and Splunk. Watch this webinar to learn new innovations that will help you detect and defeat cyberthreats in real-time, perform incident investigations faster, reduce costs, and improve your overall security and compliance posture.

  • 0
  • 821

Next-Generation Security For your Next-Generation Data Center

Watch to learn what network security challenges to consider when building your private cloud, why existing data center security solutions do not work, and how our next-generation security platform can help.

  • 0
  • 1132

Next-Generation Firewall Management from Tuffin- Webinar & Demo

Please join, Michael Hamelin - Tufin Chief Security Architect and Mike Schuricht - Palo Alto Networks Product Manager, to learn more about Tufin's comprehensive firewall management and auditing solution - specifically tailored to next-generation firewalls.

  • 0
  • 419

Traps PCI Compliance - Compensating Controls for Increased Security and Prevention of Advanced Threats

The theft of credit card data continues to grow at an alarming rate. Not only is it costly to credit card companies and merchants, but it undermines consumer confidence. In response, the Payment Card Industry has developed the PCI Data Security Standard (PCI DSS), which includes 12 requirements for protecting cardholder data. Despite substantial investments made in securing their networks, organizations are realizing that being PCI compliant does not mean an enterprise is protected against advanced cyberattacks.

  • 1
  • 194

Migrating from Cisco ASA to Palo Alto Networks

Watch this webinar to learn how easy it is to move to a next-generation security platform. Our product experts and Consulting Services team will explain the fundamental differences between Cisco ASA and Palo Alto Networks and share migration best practices, examples and case studies.

  • 1
  • 1878

Network Segmentation Solution Brief

Organizations require a network security platform capable of creating relevant security policies by application, user and content for all of their network segments. Learn more about the need for effective network segmentation, and how a Palo Alto Networks security platform can be at the center of any segmented network.

  • 0
  • 904

Threat Review Series: Verizon Report - What You Need to Know Now

In this series we’ll analyze the recent Verizon Data Breach Investigation Report (DBIR) and malware findings from WildFire.

  • 0
  • 97

Transform Network Security With the Software Defined Data Center

VMware and Palo Alto Networks have partnered to deliver a solution that combines fast provisioning of network and security services with next-generation security in the data center.

  • 0
  • 654

Nir Zuk on Modern Malware Part 2 - Video

Nir Zuk presents on Modern Malware and how it impacts your network security.

  • 0
  • 271

Nir Zuk on Modern Malware Part 1 - Video

Nir Zuk presents on Modern Malware and how it impacts your network security.

  • 0
  • 512

Palo Alto Networks and Q1 Labs

Palo Alto Networks and Q1 Labs have partnered to jointly deliver the only next generation security intelligence and control solution. QRadar’s best-in-class data collection, analysis, correlation and auditing capabilities coupled with Palo Alto Networks unique application, user and threat control enable organizations to quickly and easily implement a next-generation security management program to meet current and emerging network security challenges. The combined solution enables security professionals to comprehensively identify, defend against, and remediate exploits and policy violations.

  • 0
  • 1861

Firewall Nowej Generacji: wszystko co musisz wiedzieć

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Polish.

  • 3
  • 572

Threat Review Series: Key Lessons from WildFire and APT1

In this series, we review the latest happenings from the world of malware including trends and techniques in modern and evasive malware, and specific recommendations you can use in your network.

  • 0
  • 84

Introducing the PA-7050 – The Fastest Next-Generation Firewall

Your business groups have a seemingly insatiable need for more bandwidth. Recent high profile attacks that use port 80, or SSL to hide, and leverage commonly used applications like FTP and RDP for exfiltration are driving the need to increase your security posture. Which do you choose? Performance or security? Easy – Both. Watch this webcast and find out how Palo Alto Networks can improve your security posture without compromising on performance.

  • 0
  • 125

Webcast: Stopping the Hemorrhaging of Personal Health Information

In the face of government regulation such as the Health Insurance Portability and Accountability Act (HIPAA), personal health information (PHI) continues to leak into the public domain at an alarming rate, resulting in fraudulent insurance claims, identity theft and other costs to the health care industry. Research indicates PHI can easily be found on peer-to-peer (P2P) filesharing networks. But why?

Santa Clara
  • 0
  • 97

Next-Generation Firewalls – Restoring Effectiveness Through Application Visibility and Control

This paper explores a combination of ongoing and emerging factors that are exposing a variety of deficiencies with current firewall designs. These issues and flaws are then used to establish the criteria that define the ideal solution: a next-generation firewall that incorporates application inspection at its core.

  • 1
  • 791

Palo Alto Networks and Splunk

Hand in hand with the deployment of a robust security architecture is the need for a monitoring and response system that allows enterprises to continuously monitor and process security data efficiently and proactively act upon this data if suspicious network activity is found. Palo Alto Networks has partnered with Splunk® to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis.

  • 0
  • 1439

Познакомьтесь с PA7050 Самый быстрый межсетевой экран нового поколения

Надежность и эффективность – теперь вместе Потребность ваших рабочих групп в увеличении пропускной способности каналов кажется просто неутолимой. Недавние получившие широкую огласку атаки через порт 80 или SSL, и использовавшие для проникновения популярные приложения, например, FTP и RDP, еще раз подчеркивают необходимость в укреплении безопасности. Что вы выберете? Эффективность или надежность? Ответ прост – и то, и другое.

  • 0
  • 203

Palo Alto Networks and Lancope

Performance and accountability of enterprise IT infrastructure has shifted from an incidental focus to one that requires real-time visibility for proactive monitoring and compliance. Traditional network security devices posed a blind spot for network monitoring and management solutions for basic network parameters such as NAT tables and traffic sessions.

  • 0
  • 405
Displaying 2461 to 2490 of 2560