Date

Education and Professional Services

Displaying 3931 to 3960 of 3971

How to Detect and Stop Modern Cyberattacks

Modern threats are forcing businesses to fully examine the lifecycle of cyberattacks and advanced persistent threats (APTs). During this webcast we review real world data on cyberattacks and dissect the 5 steps of an advanced attack designed to evade security controls.
  • 0
  • 646

Palo Alto Networks and Citrix Partnership

The number of smartphones and tablets accessing data on the corporate networks is exploding. Some of these devices are enterprise owned, while many others are user owned. The new IT challenge deals with balancing security with end-user freedom, particularly on personally owned devices. These challenges intensify when considering the increasing demand for application and data access on smartphones and tablets. These devices and apps create new threat vectors that must be addressed by IT executives to prevent data leakage of sensitive corporate information.
  • 0
  • 376

Palo Alto Networks and Skybox

Identifying security risks proactively and systematically in a large network is like looking for a needle in a haystack. To address the challenge, it is imperative that the network firewall, as a first line of defense, is optimally configured for security, continuous compliance and high performance. Palo Alto Networks and Skybox® Security have partnered to monitor and prevent security or compliance gaps in an enterprise firewall deployment, and minimize overall firewall management costs.
  • 0
  • 1499

Palo Alto Networks and MobileIron

Intelligent tablets and smartphones are now the primary personal communications and computing platform for Mobile IT business operations and apps. As a result, IT needs to consider how to provide secure network access to both enterprise and end user owned mobile devices. Moreover, an exponential increase in the number and usage of mobile apps is creating new threat vectors that must be addressed by IT to safeguard mobile devices and prevent data loss.
  • 0
  • 1783

Product Privacy Data Sheets

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in the following datasheets. The purpose of these documents is to provide customers of Palo Alto Networks with information needed to assess the impact of these services on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the services. Prisma SaaS Privacy Datasheet AutoFocus Privacy Datasheet Prisma Access Privacy Datasheet Cortex Data Lake Privacy Cortex XDR Privacy Datasheet Traps Privacy Datasheet URL Filtering Privacy Datasheet WildFire Privacy Datasheet
  • 12
  • 6763

Migrating from Cisco ASA to Palo Alto Networks - French

Nous vous invitons à visualiser notre webinar sur la « migration de Cisco ASA vers Palo Alto Networks » Vous verrez lors de cette session comment il est facile de passer à une plate-forme de sécurité de nouvelle génération. Nous vous expliquerons les différences fondamentales entre Cisco ASA et Palo Alto Networks, avec les illustrations des meilleures pratiques migratoires, des exemples et des études de cas.
  • 0
  • 756

Networking Imperatives in the Cloud Era - Video

Palo Alto Networks and Citrix have come together to deliver best-in-class functionality upon which you can build next-generation Cloud Networks. In addition to sharing a common vision of how networks must evolve, each company is delivering best-in-class solutions that already meet these new requirements.
  • 0
  • 625

Palo Alto Networks and Net Optics

Palo Alto Networks and Net Optics have partnered to deliver a highly reliable and transparent threat prevention solution. In a high-availability network, the loss of a single device or power source must not be allowed to disrupt network connectivity. Adding a network security device to protect the network should not introduce any single point of failure. Combining Palo Alto Networks next-generation firewall with Net Optics’ Bypass Switches provides the necessary full threat prevention transparently and without reducing reliability.
  • 0
  • 1288

Migrating from Cisco ASA to Palo Alto Networks - Spanish

Mire esta “Migración del Cisco ASA hacia un Palo Alto Networks” Webcast. Le enseñaremos lo fácil que es moverse hacia una plataforma de Next Generneration Firewall. Nuestro equipo de ingenieros especializados le explicarán las diferencias fundamentales entre un Cisco ASA y un Palo Alto Networks y compartirán las mejores prácticas para la migración, con ejemplos y casos de éxito.
  • 0
  • 943

Presentación de la serie PA-7050 - El firewall de nueva generación más rápido

Las empresas parecen tener una necesidad insaciable de más ancho de banda. Los recientes y sofisticados ataques que utilizan el puerto 80, o el SSL para ocultarse, y se aprovechan de aplicaciones de uso común como el FTP y el RDP para entrar en las redes le están obligando a aumentar sus medidas de seguridad al respecto.
  • 0
  • 266

Defeat Apts and Improve Your Security Posture

Level the playing field by using next generation security technologies from Palo Alto Networks and Splunk. Watch this webinar to learn new innovations that will help you detect and defeat cyberthreats in real-time, perform incident investigations faster, reduce costs, and improve your overall security and compliance posture.
  • 1
  • 1674

Palo Alto Networks and Brocade Partnership

Data center network security demands are simple to understand—prevent threats, ensure compliance with regulations and enterprise policies, and support an agile business. Unfortunately, while the demands are straightforward, putting a solution into practice to meet these demands is anything but simple. As a result, most organizations have been forced to make significant compromises—trading security, functionality, and visibility for performance, simplicity, and efficiency.
  • 0
  • 543

Firewall de Próxima Geração: Tudo o que você Precisa saber

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Portuguese.
  • 4
  • 1740

Simplifying Security Management

A brief discussion and demo on how Palo Alto Networks can help you simplify security management while increasing control over applications, users and content traversing your network.
  • 2
  • 1532

Traps PCI Compliance - Compensating Controls for Increased Security and Prevention of Advanced Threats

The theft of credit card data continues to grow at an alarming rate. Not only is it costly to credit card companies and merchants, but it undermines consumer confidence. In response, the Payment Card Industry has developed the PCI Data Security Standard (PCI DSS), which includes 12 requirements for protecting cardholder data. Despite substantial investments made in securing their networks, organizations are realizing that being PCI compliant does not mean an enterprise is protected against advanced cyberattacks.
  • 1
  • 615

Palo Alto Networks and FireMon

Palo Alto Networks and FireMon have partnered to jointly deliver a total lifecycle security solution for enterprise and service provider customers. FireMon provides software that facilitates change management and control of Palo Alto Networks firewalls, increasing management visibility and reducing the total cost of making changes.
  • 0
  • 2300

Controlling SSL and SSH

A brief discussion and demo on the increasing need to securely enable applications that use SSL and control SSH by enforcing native usage.
  • 5
  • 8601

차세대 방화벽 : 당신이 알아야 할 모든

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Korean.
  • 3
  • 920

Palo Alto Networks and Symantec

Palo Alto Networks and and Symantec have partnered to enable organizations to produce executive, technical, and audit-level reports with granular per user and application usage data that are highly effective at communicating risk levels and the security posture of the organization.
  • 0
  • 3100

Network Segmentation Solution Brief

Organizations require a network security platform capable of creating relevant security policies by application, user and content for all of their network segments. Learn more about the need for effective network segmentation, and how a Palo Alto Networks security platform can be at the center of any segmented network.
  • 1
  • 2954

Taming the Social Network Beast

Social networks are pervasive among most of today's Internet users. They are also important tools used by employees and organizations for outreach. Unfortunately, social networks are also rife with risk that can lead to exploitation of accounts, end points and loss of reputation. In this webcast, learn the risks social networking brings to enterprises, including targeted attacks, phishing, exploitation of accounts, spread of malware and loss of company reputation. Then learn how to enable valuable social networking tools securely.
  • 0
  • 414

60 Minutes with Security Visionary Nir Zuk

Join Nir Zuk, network security visionary and founder and CTO of Palo Alto Networks, for a live interactive online interview with security analyst Mark Bouchard, CISSP. Nir Zuk has been delivering innovation to the information security industry for the last 20+ years. He was one of the developers of stateful inspection firewall technology, worked on the world's first intrusion prevention and detection appliance and is now pioneering next-generation firewalls. Watch Nir speak about the state of the information security industry and then pose your toughest questions to him.
  • 0
  • 412

ICS/SCADA INDUSTRY Solutions Brief

Get an overview of how Palo Alto Networks security platform can help protect your critical assets and enable a least privilege access control model in your control networks.
  • 4
  • 6764

Migrating from Cisco ASA to Palo Alto Networks - Polish

Prezentacja poświęcona porównaniu rozwiązań Cisco ASA z firewallami firmy Palo Alto Networks wraz z wyjaśnieniem w jaki sposób dokonać bezpiecznej i bezbolesnej migracji z tych urządzeń do rozwiązań następnej generacji (NGFW).
  • 0
  • 702

Decrypting SSL forTraffic Inspection

SSL is a growing category of network traffic that delivers private and secure communications. However, it can also be used inappropriately to hide application usage, transfer data to unauthorized parties, and mask malicious activity.
  • 2
  • 2283
Displaying 3931 to 3960 of 3971