Education and Professional Services

Displaying 3421 to 3450 of 4017

How to Fight Back Against Business Cyber Threats in 2014…

Over the last 24 months, the ICT industry has seen an increase in the number of websites hacking globally, with hackers having motives ranging from political reasons to malicious intent of stealing critical data. Ultimately, there are many ways to compromise websites as Anonymous and other politically motivated actors have done in the past.
  • 0
  • 1851

Le Conservatoire national des arts et métiers modernise ses équipements de sécurité avec Palo Alto Networks

CNAM has installed two firewalls PA5020 (active / passive) providing the dual function of firewall and VPN.These new-generation equipment Palo Alto Networks has enabled the creation of a VPN access easily accessible and friendly to users and the implementation of a filtering easier to administer, more efficient traffic based on applications and not more about variables classic type port or IP address. The Palo Alto Networks VPN service uses two protocols, SSL and IPSEC standard, allowing it to simply connect remote sites.
  • 0
  • 1892

Will Pre-installed Malware Protection on Personally Owned Devices Help Protect the Business?

Samsung announced last month that it will provide anti-virus protection on its Knox-enabled Android mobile devices. Knox provides security enhancements that include integrity checks, restricted access to container apps, and with the new announcement, the ability to detect mobile malware. The announcement for this news noted that the solution is geared for the workplace, and will be especially useful for BYOD scenarios.
  • 0
  • 1894

Video interview InfoSec NL: What would you recommend organizations to prevent cyber attacks and / or data leaks?

Rob Pronk, RSD Northern Europe, recommends our next-generation security platform approach! Check out his statement at 1:40.
  • 0
  • 2078

Palo Alto Networks CEO: 12 Reasons We're Set To Soar In 2014

Palo Alto Networks Chairman, President and CEO Mark McLaughlin is predicting that 2014 will be the year the company's next-generation firewall hits a "tipping point," moving from revolutionary breakthrough to "mainstream" adoption.
  • 0
  • 1838

GCHQ 'intercepted LinkedIn and Slashdot traffic to plant malware'

British Spy agency GCHQ set up fake LinkedIn and Slashdot pages to plant malware, according to German Newspaper Der Speigel. The report is based on documents provided by whistleblower Edward Snowden.
  • 0
  • 2887

Antonio Iannuzzi, Country Manager Italy & Malta, Palo Alto Networks - 13° Forum ICT Security 2013

Antonio Iannuzzi speaks about Palo Alto Networks approach, visions and trends.
  • 0
  • 2066

Anonymous targeting Asian government sites

Stealing passwords can be useful for an attacker in a variety of ways. The SEA attacks against the New York Times and variety of other sites provided a stark case in point earlier this year. In that case, instead of stealing passwords from the New York Times directly, the attackers targeted the DNS registrar that the Times uses for its websites. In short, the attackers didn't really attack the New York Times directly at all - they simply broke in to Melbourne IT (the DNS registrar for the New York Times) and changed the DNS record for to point to an IP address in Syria.
  • 0
  • 2154

Cloud and Virtualization, even safe fight

If risks change, security policies evolve according to the techniques, but the basic principles remain the same.
  • 0
  • 2065

The French “Conservatoire national des arts et metiers” modernises its security equipment with Palo Alto Networks

Palo Alto Networks® (NYSE: PANW), the leading network security company™, has been selected by the French Conservatoire national des arts et metiers, CNAM (“National Conservatory of Arts and Crafts”) to modernize its IT security equipment, including the replacement of its firewall and access to its private network.
Santa Clara, CA
  • 0
  • 310

Cyber Attacks: Australia and South East Asia on high alert

Australia and South East Asia are on high alert after sweeping cyber attack across the region by hacktivist group Anonymous. The hackers claimed they’ve already defaced more than 170 Australian websites in protest of reports of Canberra spying on Indonesia, and have threatened to do more of that on 5 November. In the past week, the government in Singapore and the Philippines have also been targeted.
  • 0
  • 2107

Cybercrime: Hidden backdoors to enterprise data

Alex Raistrick, vice president for Western Europe at Palo Alto Networks, has spotted an attack vector where backdoors are being exploited, though. "There is something of an intentional backdoor left open by mobile application developers," he says.The most common backdoor threats to organisational data come not from any technology but from complacency on the part of the user. "By installing software such as an SDK in the application itself, the app can reach out to the internet and pull the correct ad in order to get paid. But this embedded software then provides access to the application and the device itself."
  • 0
  • 1909

Palo Alto Networks to Announce Fiscal First Quarter 2014 Financial Results on November 25, 2013

Palo Alto Networks, Inc. (NYSE: PANW) today announced that it will release its financial results for its first quarter of fiscal year 2014 ended October 31, 2013 after U.S. markets close on Monday, November 25, 2013. Palo Alto Networks will host a conference call that day at 1:30 PM Pacific time (4:30 PM Eastern time) to discuss the results.
Santa Clara, CA
  • 0
  • 285

Business Determines and Pays ICT Security

Who determines pay for the security of ICT systems, is a matter of the business departments within an organization. Now, experts are saying that could change.
  • 0
  • 1854

Hit-and-Run-APTs –ein Widerspruch in sich?

Icefog or hit-and-run attacks are a fairly new phenomenon in the world of IT.Beginning of September saw governments, faced the media and technology companies in Japan and South Korea with such attacks. The unusual hacking method provides the IT security manufacturers with new challenges.
  • 0
  • 1911

The Top 25 Disrupters Of 2013

Palo Alto Networks has increasingly challenged industry giants such as Cisco Systems and McAfee with its next-generation firewall technology. As software-defined networking takes hold, look for the company to expand its presence with its security appliances beyond the perimeter into the corporate data center.
  • 0
  • 1892

A Combination of Efficiency And Safety

Network management and security of the employees planned to decrease the efficiency of unrestricted access.The Internet is now indispensable not only individuals but also became one of the government agencies and companies. Many companies are now fully networks and Internet-based business processes. The Company's employees anytime, anywhere access and companies' applications work independently of time and place.
  • 0
  • 1907

Means against targeted attacks – Multiple protection layers

How companies can best protect themselves against these targeted attacks leveraging technologies such as vulnerability management solutions and next-generation firewalls. Solutions from multiple vendors are being discussed in the article. The solution from Palo Alto Networks is granted the more space and is also explained in more detail compared with competitive solutions such as Check Point or Cisco.
  • 0
  • 1874

Palo Alto Networks' Jeff True

General counsel Jeff True had two primary missions when he joined the company in March 2011: prepare the company to go public, and build the intellectual property portfolio.The company was without a CEO at the time, and so the IPO was not set in stone, but it was an event for which the board wanted to be ready. As Palo Alto Network's first in-house attorney, True had his work cut out for him. "There was no process in place, no order in place," he says. "It was all mine to develop."
  • 0
  • 2216

The Dark Side of Data

Many computer users are few proposals in the activities of hackers. That the image of the pimply adolescent 'for sport' websites creaks, not (more) right, is generally clear, but further: what hackers do and why our data is so attractive? How great is the damage to businesses?
  • 0
  • 2057

A Guide to Safety in the Hybrid Cloud

With the increasing amount of critical applications, many companies seek private and public cloud as a way to find a safer solution. But like everything that brings a more particular also generates higher cost. The good news is that it is possible to maintain the balance between demand and budget with hybrid cloud computing environments, ie, with a mixed IT infrastructure.
  • 0
  • 1924

Infographic: Cloud computing & security

  • 0
  • 2121

Palo Alto Networks' market opportunity

Palo Alto Networks CEO Mark McLaughlin says his company has developed the next generation security platform that is rapidly displacing legacy technologies of its competitors.
  • 0
  • 1872

The Unsavory Side Effect of the Mobile Ad Boom

All the ad money coming into the mobile world has inspired a growing class of cybercriminals looking to cash in, security analysts say.“There’s a gold rush going on,” Wade Williamson, a senior security analyst at the security outfit Palo Alto Networks, in Santa Clara, Calif. tells WSJ’s Christopher S. Stewart. Because mobile is “an effective and lucrative place to do marketing, it is also an effective and lucrative place for the bad guys to show up.”
  • 0
  • 1984

Palo Alto Networks to Present at 13th Annual Cyber Security Symposium

Palo Alto Networks® (NYSE: PANW), the network security company™, today announced that Lee Klarich, the Company’s senior vice president of product management, will be presenting at the 13th Annual Cyber Security Symposium in Sacramento, California on October 10, 2013.
Santa Clara, CA
  • 0
  • 333

Handle cloud security with single appliance

WITH the evolution of cloud computing, enterprises of today need a comprehensive network security solution with integrated security functionalities, such as next-generation firewall, intrusion prevention, secure Web gateway and advanced persistent threat (APT) solution, in a single-engine appliance.
  • 0
  • 2196

Uninove implanta plataforma de segurança para garantir acesso em todos os campi

A Universidade Nove de Julho (Uninove) implantou recentemente a solução PA-5020 da Palo Alto Networks para permitir acesso de 4 mil computadores, que são usados ??por 120 mil alunos e funcionários, abrigados numa data center com 50 servidores físicos e cerca de 100 servidores virtuais. Além de estações de trabalho, muitos trazem seu próprio dispositivo acessando regularmente a rede.
  • 0
  • 2010

Palo Alto Networks Partners See Big Sales Gains For 2014

The high praise and ebullient mood of Palo Alto partners comes despite $49 billion networking leader Cisco (NSDQ:CSCO)'s $2.7 billion deal in July to acquire Palo Alto rival Sourcefire. And Cisco isn't the only large player trying to break into the market dominated by Palo Alto. Just this week, McAfee, a unit of $53 billion chip giant Intel, signaled its intent at its own partner conference to focus more squarely on the kind of next-generation firewall capabilities that Palo Alto has popularized in the security market.
  • 0
  • 1863
Displaying 3421 to 3450 of 4017