Date

Education and Professional Services

Displaying 3061 to 3087 of 3087

Migrating from Cisco ASA to Palo Alto Networks

Watch this webinar to learn how easy it is to move to a next-generation security platform. Our product experts and Consulting Services team will explain the fundamental differences between Cisco ASA and Palo Alto Networks and share migration best practices, examples and case studies.
  • 5
  • 4145

차세대 방화벽 : 당신이 알아야 할 모든

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Korean.
  • 3
  • 823

ICS/SCADA INDUSTRY Solutions Brief

Get an overview of how Palo Alto Networks security platform can help protect your critical assets and enable a least privilege access control model in your control networks.
  • 3
  • 6096

Migrating from Cisco ASA to Palo Alto Networks - Polish

Prezentacja poświęcona porównaniu rozwiązań Cisco ASA z firewallami firmy Palo Alto Networks wraz z wyjaśnieniem w jaki sposób dokonać bezpiecznej i bezbolesnej migracji z tych urządzeń do rozwiązań następnej generacji (NGFW).
  • 0
  • 594

Migrating from Cisco ASA to Palo Alto Networks - Russian

Посмотрите вебинар, чтобы понять, насколько простой переход на платформу нового поколения для сетевой безопасности. Наши продакт менеджер и консультанты расскажут о фундаментальной разнице между Cisco ASA и Palo Alto Networks, а также поделятся лучшими кейсами и практиками миграции.
  • 0
  • 1035

Palo Alto Networks and Swivel

IT Managers are facing ever-increasing demands to secure remote access to corporate applications and data. The proliferating use of personal devices such as smartphones, laptops or tablets within the corporate environment introduces additional security issues. Palo Alto Networks is partnering with Swivel Secure Ltd. to provide its mutual customers with an extremely secure, flexible, and easy to manage remote access solution.
  • 0
  • 383

Webcast: Stopping the Hemorrhaging of Personal Health Information

In the face of government regulation such as the Health Insurance Portability and Accountability Act (HIPAA), personal health information (PHI) continues to leak into the public domain at an alarming rate, resulting in fraudulent insurance claims, identity theft and other costs to the health care industry. Research indicates PHI can easily be found on peer-to-peer (P2P) filesharing networks. But why?
Santa Clara
  • 0
  • 306

Function Control

A quick discussion on why application function control is critical to enabling applications, followed by a demonstration of how Palo Alto Networks can control functions.
  • 1
  • 1301

Palo Alto Networks and Plixer

Performance and accountability of Enterprise IT infrastructure has shifted from an incidental focus to real-time visibility for proactive monitoring and compliance mandates. Network security devices have traditionally posed a blind spot for network monitoring and management solutions by typically restricting output to basic network parameters such as NAT tables and traffic session. Palo Alto Networks breaks this barrier by providing unprecedented visibility of user and application usage information via Netflow, the industry standard protocol for network monitoring. Plixer’s™ Scrutinizer software collects and analyzes Netflow data to monitor and report on overall health of the network.
  • 0
  • 472

Next Generation Firewall: alles was Sie wissen müssen

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in German.
  • 1
  • 1366

Palo Alto Networks & Citrix Executive Introduction - Video

Palo Alto Networks and Citrix have forged a long-term, strategic partnership to deliver the essential functionality needed for building your next-generation cloud networks. Unlike piecemeal approaches that introduce complexities and inefficiencies, our integrated solutions uniquely deliver the application intelligence and awareness required for you to safely enable application access with the fastest application performance and greatest availability.
  • 0
  • 964

User-ID Tech Brief

Overview of our User-ID technology that can gather user identity from multiple sources including VPNs, WLAN controllers, captive portals, directory servers, proxies and more.
  • 3
  • 6635

Control the Risks in Allowed Applications

How Palo Alto Networks provides secure application enablement—first by allowing the application and then scanning it for threats to protect users and your network.
  • 4
  • 3482

Mobile Security - Russian

Mobile Security in Russian Language
  • 0
  • 443

Palo Alto Networks and Arista Networks

Palo Alto Networks and Arista Networks have partnered to offer the highest performance next-generation firewall implementation in the industry. The modern data center has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network must be able to meet those demands. The combination of Arista Networks’ Datacenter Switches along with Palo Alto Networks’ next-generation firewalls provides unmatched security in high-performance data centers without impacting throughput.
  • 0
  • 3041

Exploit Kits: How to Protect Your Organization

Today’s attackers are using exploit kits to automatically find vulnerabilities in common systems. As the use of these attacks increase, so does your chance of being compromised. In order to better protect your organization, you’ll need to understand the inner workings of exploit kits.
  • 0
  • 224

Palo Alto Networks and Brocade Partnership

Data center network security demands are simple to understand—prevent threats, ensure compliance with regulations and enterprise policies, and support an agile business. Unfortunately, while the demands are straightforward, putting a solution into practice to meet these demands is anything but simple. As a result, most organizations have been forced to make significant compromises—trading security, functionality, and visibility for performance, simplicity, and efficiency.
  • 0
  • 462

Comparing Palo Alto Networks with Web Application Firewalls (WAF)

Comparison of next generation firewall technology with Web Application Firewalls (WAF).
  • 0
  • 27829

Evolving Datacenter Network Security

Hear from Palo Alto Networks, Brocade and featured speaker John Kindervag of Forrester Research, Inc., for a discussion on how leading-edge organizations are addressing business imperatives by implementing next-generation datacenter architectures, infrastructures, and network security.
  • 1
  • 307

Palo Alto Networks and Net Optics

Palo Alto Networks and Net Optics have partnered to deliver a highly reliable and transparent threat prevention solution. In a high-availability network, the loss of a single device or power source must not be allowed to disrupt network connectivity. Adding a network security device to protect the network should not introduce any single point of failure. Combining Palo Alto Networks next-generation firewall with Net Optics’ Bypass Switches provides the necessary full threat prevention transparently and without reducing reliability.
  • 0
  • 1096

Threat Review Series: Zeus and the Rise of the Banking Bots

In this edition of the threat review, we will follow the money with a dive into the world of banking malware and its growth into one of the most popular and lucrative avenues for professional hackers. We will take a closer look at Zeus, how it has evolved over time, and spawned a new generation of financial botnets that promise to cause even more damage. As always, we will cover the skills and intelligence you will need in order to protect your networks from these rapidly evolving threats.
  • 1
  • 489
Displaying 3061 to 3087 of 3087