Date

Education and Professional Services

Displaying 3271 to 3300 of 3326

60 Minutes: Coming to Grips with Consumerization

How or why is consumerization happening is almost irrelevant. All that really matters is how to deal with it. Today it's users, rather than IT departments, that are choosing the laptops, smart phones and tablets that they want to use. The resulting challenge for you is not trivial: how to integrate consumer devices in your business, yet still put adequate controls in place to manage the associated risks ­- not the least of which is the risk of exposing your applications and sensitive data to the wrong people. In this live video broadcast, hear Nir Zuk, CTO and co-founder of Palo Alto Networks, and Rich Mogull, Analyst and CEO of Securosis, provide insights and recommendations on how to handle consumerization and the proliferation of devices.
  • 0
  • 290

Palo Alto Networks and Garland Technology Partnership

When customers deploy inline appliances on mission critical network segments, they have the option to mitigate the risks of scheduled or unscheduled downtime of an inline appliance for configuration changes, maintenance, or repair scenarios by adding a tap/bypass switch to maintain network continuity. Palo Alto Networks has partnered with Garland Technology to provide the ability to install Palo Alto Networks next-generation firewall inline without compromising network uptime.
  • 0
  • 561

Palo Alto Networks and Skybox

Identifying security risks proactively and systematically in a large network is like looking for a needle in a haystack. To address the challenge, it is imperative that the network firewall, as a first line of defense, is optimally configured for security, continuous compliance and high performance. Palo Alto Networks and Skybox® Security have partnered to monitor and prevent security or compliance gaps in an enterprise firewall deployment, and minimize overall firewall management costs.
  • 0
  • 1443

Product Privacy Data Sheets

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in the following datasheets. The purpose of these documents is to provide customers of Palo Alto Networks with information needed to assess the impact of these services on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the services. Aperture Privacy Datasheet AutoFocus Privacy Datasheet GlobalProtect Cloud Service Privacy Datasheet Cortex Data Lake Privacy Cortex XDR Privacy Datasheet Traps Privacy Datasheet URL Filtering Privacy Datasheet WildFire Privacy Datasheet
  • 10
  • 5702

Identify and Control Circumventors

Hackers and end-users are armed with a variety of technologies that allow them to hide their traffic from traditional network security solutions. See how the unique capabilities of our App-ID allow you to find and control these applications.
  • 1
  • 1315

Palo Alto Networks and MobileIron

Intelligent tablets and smartphones are now the primary personal communications and computing platform for Mobile IT business operations and apps. As a result, IT needs to consider how to provide secure network access to both enterprise and end user owned mobile devices. Moreover, an exponential increase in the number and usage of mobile apps is creating new threat vectors that must be addressed by IT to safeguard mobile devices and prevent data loss.
  • 0
  • 1733

Palo Alto Networks and AlgoSec Partnership

As organizations deploy multiple security solutions to safeguard corporate networks from a wide range of threats, they are realizing that the traditional manual process of performing risk analysis, change management, auditing and compliance are labor-intensive and error-prone. To increase operational efficiency and minimize risk, Palo Alto Networks and AlgoSec have partnered to reduce network security policy complexity by intelligently automating firewall policy management, from optimization to risk analysis to change management.
  • 0
  • 1803

Comparing Palo Alto Networks with Web Application Firewalls (WAF)

Comparison of next generation firewall technology with Web Application Firewalls (WAF).
  • 0
  • 30751

Simplifying Security Management

A brief discussion and demo on how Palo Alto Networks can help you simplify security management while increasing control over applications, users and content traversing your network.
  • 2
  • 1487

Migrating from Cisco ASA to Palo Alto Networks - French

Nous vous invitons à visualiser notre webinar sur la « migration de Cisco ASA vers Palo Alto Networks » Vous verrez lors de cette session comment il est facile de passer à une plate-forme de sécurité de nouvelle génération. Nous vous expliquerons les différences fondamentales entre Cisco ASA et Palo Alto Networks, avec les illustrations des meilleures pratiques migratoires, des exemples et des études de cas.
  • 0
  • 724

Threat Review Series: Zeus and the Rise of the Banking Bots

In this edition of the threat review, we will follow the money with a dive into the world of banking malware and its growth into one of the most popular and lucrative avenues for professional hackers. We will take a closer look at Zeus, how it has evolved over time, and spawned a new generation of financial botnets that promise to cause even more damage. As always, we will cover the skills and intelligence you will need in order to protect your networks from these rapidly evolving threats.
  • 1
  • 528

Palo Alto Networks and Net Optics

Palo Alto Networks and Net Optics have partnered to deliver a highly reliable and transparent threat prevention solution. In a high-availability network, the loss of a single device or power source must not be allowed to disrupt network connectivity. Adding a network security device to protect the network should not introduce any single point of failure. Combining Palo Alto Networks next-generation firewall with Net Optics’ Bypass Switches provides the necessary full threat prevention transparently and without reducing reliability.
  • 0
  • 1236

Evolving Datacenter Network Security

Hear from Palo Alto Networks, Brocade and featured speaker John Kindervag of Forrester Research, Inc., for a discussion on how leading-edge organizations are addressing business imperatives by implementing next-generation datacenter architectures, infrastructures, and network security.
  • 1
  • 356

Migrating from Cisco ASA to Palo Alto Networks - Spanish

Mire esta “Migración del Cisco ASA hacia un Palo Alto Networks” Webcast. Le enseñaremos lo fácil que es moverse hacia una plataforma de Next Generneration Firewall. Nuestro equipo de ingenieros especializados le explicarán las diferencias fundamentales entre un Cisco ASA y un Palo Alto Networks y compartirán las mejores prácticas para la migración, con ejemplos y casos de éxito.
  • 0
  • 908

Networking Imperatives in the Cloud Era - Video

Palo Alto Networks and Citrix have come together to deliver best-in-class functionality upon which you can build next-generation Cloud Networks. In addition to sharing a common vision of how networks must evolve, each company is delivering best-in-class solutions that already meet these new requirements.
  • 0
  • 586

Presentación de la serie PA-7050 - El firewall de nueva generación más rápido

Las empresas parecen tener una necesidad insaciable de más ancho de banda. Los recientes y sofisticados ataques que utilizan el puerto 80, o el SSL para ocultarse, y se aprovechan de aplicaciones de uso común como el FTP y el RDP para entrar en las redes le están obligando a aumentar sus medidas de seguridad al respecto.
  • 0
  • 265

Next Generation Firewall: Tutto quello che devi sapere

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Italian.
  • 4
  • 1124

Hosting a webinar - ASEAN traps

How the recent advanced threats execute on your endpoints and the Palo Alto Networks prevention advisory Traps replaces legacy antivirus and secures endpoints with a multi-method prevention approach that blocks malware and exploits, both known and unknown, before they compromise endpoints, such as laptops, desktops and servers. •Challenges with AV today •Difference between exploits and malware What is malware? What is an exploit? How to prevent against both attack vectors •Prevention is better than a cure Having a multiple method approach against APTs •Automated Prevention Platform via Palo Alto Networks Demo of live hack against Traps 4.1
  • 0
  • 147

차세대 방화벽 : 당신이 알아야 할 모든

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Korean.
  • 3
  • 896

Security challenges in municipalities and counties and how we solve them

Security challenges in municipalities and counties and how we solve them.
  • 2
  • 439

Taming the Social Network Beast

Social networks are pervasive among most of today's Internet users. They are also important tools used by employees and organizations for outreach. Unfortunately, social networks are also rife with risk that can lead to exploitation of accounts, end points and loss of reputation. In this webcast, learn the risks social networking brings to enterprises, including targeted attacks, phishing, exploitation of accounts, spread of malware and loss of company reputation. Then learn how to enable valuable social networking tools securely.
  • 0
  • 379

Palo Alto Networks and NitroSecurity

Palo Alto Networks and NitroSecurity have partnered to deliver unprecedented visibility, analysis and correlation of security events, user activity, and application usage. Palo Alto Networks next-generation firewalls capture rich user and application context providing increased control of applications and prevention of advanced threats.
  • 0
  • 425

Palo Alto Networks and FireMon

Palo Alto Networks and FireMon have partnered to jointly deliver a total lifecycle security solution for enterprise and service provider customers. FireMon provides software that facilitates change management and control of Palo Alto Networks firewalls, increasing management visibility and reducing the total cost of making changes.
  • 0
  • 2180

Best of Black Hat 2013

Hear the top takeaways, including noteworthy new research, tools, and techniques, from a week at Black Hat during this recap of the 2013 conference.
  • 0
  • 289

Controlling SSL and SSH

A brief discussion and demo on the increasing need to securely enable applications that use SSL and control SSH by enforcing native usage.
  • 5
  • 8408

ICS/SCADA INDUSTRY Solutions Brief

Get an overview of how Palo Alto Networks security platform can help protect your critical assets and enable a least privilege access control model in your control networks.
  • 3
  • 6589

60 Minutes with Security Visionary Nir Zuk

Join Nir Zuk, network security visionary and founder and CTO of Palo Alto Networks, for a live interactive online interview with security analyst Mark Bouchard, CISSP. Nir Zuk has been delivering innovation to the information security industry for the last 20+ years. He was one of the developers of stateful inspection firewall technology, worked on the world's first intrusion prevention and detection appliance and is now pioneering next-generation firewalls. Watch Nir speak about the state of the information security industry and then pose your toughest questions to him.
  • 0
  • 378
Displaying 3271 to 3300 of 3326