Date

Education and Professional Services

Displaying 3151 to 3180 of 3187

Maintain Performance with Security Services Enabled

IT Security teams are often forced to choose between security and performance. See how the unique design of our Palo Alto Networks next-generation firewall addresses this challenge and how it has performed in independent 3rd party testing.
  • 1
  • 1558

Palo Alto Networks and Network Critical

Learn how the Network Critical’s tap/bypass switch optimizes full-functionality of the Next-Generation Firewall without impacting latency or availability.
  • 0
  • 563

次世代ファイアウォール : オンラインセミナー

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Japanese.
  • 2
  • 1336

Palo Alto Networks and MobileIron

Intelligent tablets and smartphones are now the primary personal communications and computing platform for Mobile IT business operations and apps. As a result, IT needs to consider how to provide secure network access to both enterprise and end user owned mobile devices. Moreover, an exponential increase in the number and usage of mobile apps is creating new threat vectors that must be addressed by IT to safeguard mobile devices and prevent data loss.
  • 0
  • 1687

Hosting a webinar - ASEAN traps

How the recent advanced threats execute on your endpoints and the Palo Alto Networks prevention advisory Traps replaces legacy antivirus and secures endpoints with a multi-method prevention approach that blocks malware and exploits, both known and unknown, before they compromise endpoints, such as laptops, desktops and servers. •Challenges with AV today •Difference between exploits and malware What is malware? What is an exploit? How to prevent against both attack vectors •Prevention is better than a cure Having a multiple method approach against APTs •Automated Prevention Platform via Palo Alto Networks Demo of live hack against Traps 4.1
  • 0
  • 130

Controlling SSL and SSH

A brief discussion and demo on the increasing need to securely enable applications that use SSL and control SSH by enforcing native usage.
  • 5
  • 8135

60 Minutes with Security Visionary Nir Zuk

Join Nir Zuk, network security visionary and founder and CTO of Palo Alto Networks, for a live interactive online interview with security analyst Mark Bouchard, CISSP. Nir Zuk has been delivering innovation to the information security industry for the last 20+ years. He was one of the developers of stateful inspection firewall technology, worked on the world's first intrusion prevention and detection appliance and is now pioneering next-generation firewalls. Watch Nir speak about the state of the information security industry and then pose your toughest questions to him.
  • 0
  • 353

Taming the Social Network Beast

Social networks are pervasive among most of today's Internet users. They are also important tools used by employees and organizations for outreach. Unfortunately, social networks are also rife with risk that can lead to exploitation of accounts, end points and loss of reputation. In this webcast, learn the risks social networking brings to enterprises, including targeted attacks, phishing, exploitation of accounts, spread of malware and loss of company reputation. Then learn how to enable valuable social networking tools securely.
  • 0
  • 362

Nir Zuk on Modern Malware Part 2 - Video

Nir Zuk presents on Modern Malware and how it impacts your network security.
  • 0
  • 510

Palo Alto Networks and Lancope

Performance and accountability of enterprise IT infrastructure has shifted from an incidental focus to one that requires real-time visibility for proactive monitoring and compliance. Traditional network security devices posed a blind spot for network monitoring and management solutions for basic network parameters such as NAT tables and traffic sessions.
  • 0
  • 712

Nir Zuk on Modern Malware Part 1 - Video

Nir Zuk presents on Modern Malware and how it impacts your network security.
  • 0
  • 846

Palo Alto Networks & Citrix Executive Introduction - Video

Palo Alto Networks and Citrix have forged a long-term, strategic partnership to deliver the essential functionality needed for building your next-generation cloud networks. Unlike piecemeal approaches that introduce complexities and inefficiencies, our integrated solutions uniquely deliver the application intelligence and awareness required for you to safely enable application access with the fastest application performance and greatest availability.
  • 0
  • 1009

User-ID Tech Brief

Overview of our User-ID technology that can gather user identity from multiple sources including VPNs, WLAN controllers, captive portals, directory servers, proxies and more.
  • 3
  • 6856

Palo Alto Networks and Enterasys Partnership

Enterprise Mobility and BYOD trends are causing significant disruption to traditional network security practices. The growth and diversity of mobile device usage combined with the requirement of anytime, anywhere access to applications and data, has presented significant operational challenges and security risk to the IT organization. Typical legacy enterprise LAN infrastructures were not architected with adequate management, visibility, and awareness necessary to adapt to today’s application security and mobile provisioning requirements.
  • 1
  • 459

Palo Alto Networks and Garland Technology Partnership

When customers deploy inline appliances on mission critical network segments, they have the option to mitigate the risks of scheduled or unscheduled downtime of an inline appliance for configuration changes, maintenance, or repair scenarios by adding a tap/bypass switch to maintain network continuity. Palo Alto Networks has partnered with Garland Technology to provide the ability to install Palo Alto Networks next-generation firewall inline without compromising network uptime.
  • 0
  • 546

Identify and Control Circumventors

Hackers and end-users are armed with a variety of technologies that allow them to hide their traffic from traditional network security solutions. See how the unique capabilities of our App-ID allow you to find and control these applications.
  • 1
  • 1296

60 Minutes: Coming to Grips with Consumerization

How or why is consumerization happening is almost irrelevant. All that really matters is how to deal with it. Today it's users, rather than IT departments, that are choosing the laptops, smart phones and tablets that they want to use. The resulting challenge for you is not trivial: how to integrate consumer devices in your business, yet still put adequate controls in place to manage the associated risks ­- not the least of which is the risk of exposing your applications and sensitive data to the wrong people. In this live video broadcast, hear Nir Zuk, CTO and co-founder of Palo Alto Networks, and Rich Mogull, Analyst and CEO of Securosis, provide insights and recommendations on how to handle consumerization and the proliferation of devices.
  • 0
  • 277

Defeat Apts and Improve Your Security Posture

Level the playing field by using next generation security technologies from Palo Alto Networks and Splunk. Watch this webinar to learn new innovations that will help you detect and defeat cyberthreats in real-time, perform incident investigations faster, reduce costs, and improve your overall security and compliance posture.
  • 1
  • 1566

Presentación de la serie PA-7050 - El firewall de nueva generación más rápido

Las empresas parecen tener una necesidad insaciable de más ancho de banda. Los recientes y sofisticados ataques que utilizan el puerto 80, o el SSL para ocultarse, y se aprovechan de aplicaciones de uso común como el FTP y el RDP para entrar en las redes le están obligando a aumentar sus medidas de seguridad al respecto.
  • 0
  • 263

Next-Generation Firewall Management from Tuffin- Webinar & Demo

Please join, Michael Hamelin - Tufin Chief Security Architect and Mike Schuricht - Palo Alto Networks Product Manager, to learn more about Tufin's comprehensive firewall management and auditing solution - specifically tailored to next-generation firewalls.
  • 0
  • 840

Palo Alto Networks and NitroSecurity

Palo Alto Networks and NitroSecurity have partnered to deliver unprecedented visibility, analysis and correlation of security events, user activity, and application usage. Palo Alto Networks next-generation firewalls capture rich user and application context providing increased control of applications and prevention of advanced threats.
  • 0
  • 409

Traps PCI Compliance - Compensating Controls for Increased Security and Prevention of Advanced Threats

The theft of credit card data continues to grow at an alarming rate. Not only is it costly to credit card companies and merchants, but it undermines consumer confidence. In response, the Payment Card Industry has developed the PCI Data Security Standard (PCI DSS), which includes 12 requirements for protecting cardholder data. Despite substantial investments made in securing their networks, organizations are realizing that being PCI compliant does not mean an enterprise is protected against advanced cyberattacks.
  • 1
  • 575

Next Generation Firewall: alles was Sie wissen müssen

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in German.
  • 1
  • 1419

Function Control

A quick discussion on why application function control is critical to enabling applications, followed by a demonstration of how Palo Alto Networks can control functions.
  • 1
  • 1367

Pragmatic Network Security for Virtualized Datacenter Environments

This webcast provides an over-arching framework and concise set of best practices organizations can use to address the network security challenges created by ongoing adoption of popular virtualization technologies.
  • 0
  • 330
Displaying 3151 to 3180 of 3187