Leading Maker of Precision Dispensing, Surface Treatment and Testing Equipment Deploys PA-4000 Series, Simplifies Management and Reporting, Improves Security with Granular Application Visibility and Control
Learn three ways to integrate better security into critical, highly available networks while keeping the primary mission of the datacenter (serving available, high-performance applications) at the forefront.
Palo Alto Networks and FireMon have partnered to jointly deliver a total lifecycle security solution for enterprise and service provider customers. FireMon provides software that facilitates change management and control of Palo Alto Networks firewalls, increasing management visibility and reducing the total cost of making changes.
Social networks are pervasive among most of today's Internet users. They are also important tools used by employees and organizations for outreach. Unfortunately, social networks are also rife with risk that can lead to exploitation of accounts, end points and loss of reputation. In this webcast, learn the risks social networking brings to enterprises, including targeted attacks, phishing, exploitation of accounts, spread of malware and loss of company reputation. Then learn how to enable valuable social networking tools securely.
Join Nir Zuk, network security visionary and founder and CTO of Palo Alto Networks, for a live interactive online interview with security analyst Mark Bouchard, CISSP. Nir Zuk has been delivering innovation to the information security industry for the last 20+ years. He was one of the developers of stateful inspection firewall technology, worked on the world's first intrusion prevention and detection appliance and is now pioneering next-generation firewalls. Watch Nir speak about the state of the information security industry and then pose your toughest questions to him.
Palo Alto Networks and and Symantec have partnered to enable organizations to produce executive, technical, and audit-level reports with granular per user and application usage data that are highly effective at communicating risk levels and the security posture of the organization.