Date

Education and Professional Services

Displaying 2941 to 2970 of 4236

Bringing Security to Mobile Computing

ทุกวันนี้อุปกรณ์พกพา ได้เข้ามามีบทบาทในการทำงานของพนักงานในองค์กรและก่อให้เกิดการเปลี่ยนแปลง ที่คุณจำเป็นต้องทำให้องค์กรมีความปลอดภัย. ตอนนี้เราเผชิญกับคำถามที่ว่า จะทำอย่างไรให้พนักงานสามารถใช้เครื่องมือที่พวกเขาต้องการ โดยในขณะเดียวกันจะต้องดูแลเรื่องความปลอดภัยของทั้งเครือข่าย, ข้อมูล และแอพพลิเคชั่นบนอุปกรณ์
  • 0
  • 209

The Harsh Reality of Cyber Protection

The endpoint is where the security war is now taking place; attackers are getting more advanced, deploying unknown exploits and unique malware that current day security is simply not equipped to prevent or even detect. Join Palo Alto Networks as we walk you through the shortcomings of existing endpoint security, and why it's leaving your enterprise vulnerable to sophisticated and zero-day attacks, waiting for detection and remediation to step in, which is too little too late.
  • 0
  • 381

Scareware App Downloaded Over a Million Times from Google Play

We have recently been investigating an antivirus app in the Google Play store that was displaying fake virus detection results to scare users into purchasing a premium service. According to the Google Play store statistics, users have downloaded “AntiVirus for Android™” more than one million times and the app was listed in Top 100 free
Claud Xiao,
  • 0

How Tennis Australia is using information to improve the game

Mahir imagines capturing this data in a central warehouse, which could also monitor players' engagement, how often they are playing, to make sure they don't give up on the game. He wants one million players, one million fans and one grand slam champion in "the next couple of years". He hopes a multimillion dollar budget, an IT department that grows from 24 staff during the year to 170 around the Australian Open, and partnerships with several technology companies including IBM, Optus, Avaya, Palo Alto Networks, Aruba and InfoReady, will help Tennis Australia get there.
  • 0
  • 1984

Our Favorite Presentations from ShmooCon 2015

We were fortunate enough to attend this year’s ShmooCon, an annual hacker conference held in Washington, DC. It is organized by The Shmoo Group, which was founded in the late 1990s as an international non-profit security think tank. It invariably sells out every year, with tickets from each of three rounds of sales gone in
Phil Da SilvaJen Miller-Osborn,
  • 0

Security Trend Report 2015

  • 0
  • 2131

Dridex Banking Trojan Begins 2015 with a Bang

In October, we called out a series of attacks installing the Dridex Trojan using macros in Microsoft Word documents. Those attacks continued over the last few months and in first two weeks of the new calendar year we’ve seen another new campaign. To refresh your memory, Dridex is the latest version of the Bugat/Feodo/Cridex banking
Ryan Olson,
  • 0

Palo Alto Networks and Citrix: Securing your Virtual Desktop Infrastructure

Read how deploying Citrix NetScaler with Palo Alto Networks security platforms can ensure performance and scalability in virtual desktop infrastructures.
  • 0
  • 564

Palo Alto Networks VM-Series and Citrix NetScaler Deployment Guide

Read this guide to learn how to accelerate and secure your Citrix XenDesktop environment using Citrix NetScaler and Palo Alto Networks next-generation firewalls.
  • 2
  • 1888

The cyber threat alliance

  • 0
  • 2150

Cyber Threats 2015

  • 0
  • 2290

Palo Alto Networks Appoints Steven Redman as Vice President for Asia Pacific

Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, today announced the appointment of Steve Redman as Vice President for Asia Pacific (APAC).
Singapore
  • 0
  • 1030

Advanced attacks on big data analyses

  • 0
  • 2335

McLean County School District

McLean County Unit School District No. 5 employs approximately 1,650 full and part time staff members to educate more than 13,600 students. The district consists of more than 214 square miles, with 16 elementary, 4 junior high and 2 high school buildings, 1 early learning center, and 1 vocational training site.
  • 2
  • 1058

Security Predictions 2015 - Finance

  • 0
  • 2305

Don’t Miss A Single Threat Intelligence Update from Unit 42!

Unit 42 is the Palo Alto Networks threat intelligence team. Made up of accomplished cybersecurity researchers and industry experts, Unit 42 gathers, researches, analyzes, and provides insights into the latest cyber threats, then shares them with Palo Alto Networks customers, partners and the broader community to better protect enterprise, service provider, and government computing environments. You
Chad Berndtson,
  • 0

Приглашаем на эксклюзивный вебинар о защите ЦОД с Palo Alto Networks

Никогда еще обеспечение безопасности центров обработки данных не было столько актуальным. Количество кибератак, нацеленных на важные ресурсы центров обработки данных, растет. Стратегия атаки на важные ресурсы ЦОД из внутренних сетей становится правилом. В то же время, защита от угроз не должна влиять на производительность ЦОД. Наконец то, это становится возможным! Вашему вниманию предлагается инфраструктура, которая защищает информационные потоки центров обработки данных, предотвращает распространение вредоносного ПО внутри ЦОД и защищает от утечек данных.
  • 0
  • 421

CyrptoLocker’u Palo Alto Networks Olarak Nasıl Blokluyoruz?

Son zamanlarda gündemi çokça meşgul eden ve kullanıcıların bilgisayarlarını şifreleyip para karşılığında açmayı vaad eden Cryptolocker malware kötü yazılımının proaktif olarak nasıl engelleneceğini, bu ve benzeri sıfırıncı gün ataklara karşı her zaman koruma sağlamanın yollarını webinerimizde anlatıyoruz. Canlı demo ile bu zararlı yazılım bulaşmış örnek dosyayı Palo Alto Networks End Point Security (Traps) çözümü ile nasıl blokladığımızı göstebilirsiniz.
  • 0
  • 945
Displaying 2941 to 2970 of 4236