Date

Education and Professional Services

Displaying 4171 to 4200 of 4217

Zero Trust Network Architecture with John Kindervag - Video

In this video, John Kindervag, Principal Analyst at Forrester Research, defines the "Zero Trust” network architecture, the three key concepts, and the architecture elements that make up a Zero Trust network.
  • 3
  • 9564

Palo Alto Networks and SafeNet

As more and more daily business practices are conducted online, organizations face a growing challenge of ensuring that only authorized users may carry out transactions and access its most sensitive online resources. Moreover, businesses must protect access to network and web-based applications amid a rapidly changing security landscape of complex identity management—especially resulting from proliferation of mobile devices. Palo Alto Networks is partnering with SafeNet to provide a multi-factor authentication solution to protect user identities.
  • 0
  • 839

Palo Alto Networks and Arista Networks

Palo Alto Networks and Arista Networks have partnered to offer the highest performance next-generation firewall implementation in the industry. The modern data center has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network must be able to meet those demands. The combination of Arista Networks’ Datacenter Switches along with Palo Alto Networks’ next-generation firewalls provides unmatched security in high-performance data centers without impacting throughput.
  • 0
  • 3596

Palo Alto Networks and Enterasys Partnership

Enterprise Mobility and BYOD trends are causing significant disruption to traditional network security practices. The growth and diversity of mobile device usage combined with the requirement of anytime, anywhere access to applications and data, has presented significant operational challenges and security risk to the IT organization. Typical legacy enterprise LAN infrastructures were not architected with adequate management, visibility, and awareness necessary to adapt to today’s application security and mobile provisioning requirements.
  • 1
  • 508

Revealing the Secrets- Advances in Android and IOS Attacks

Join us for this no-cost webinar to get vital details on how the rapidly changing threat landscape may affect your organization. You’ll also get comprehensive strategies for securing your mobile workforce.
  • 0
  • 418

Recorded Webinar: Disrupting Credential-Based Attacks

Learn how to use the Palo Alto Networks® Next-Generation Security Platform to disrupt the unique attack lifecycle used in credential-based attacks. Get details about the strategies and key technologies for preventing both the theft and abuse of credentials. This session covers: Why the platform plays a critical role in disrupting credential-based attacks Preventing the theft of credentials, using new PAN-OS® 8.0 technologies Stopping the use of stolen credentials through new multi-factor authentication capabilities in PAN-OS 8.0
  • 0
  • 218

Palo Alto Networks and Citrix Partnership

The number of smartphones and tablets accessing data on the corporate networks is exploding. Some of these devices are enterprise owned, while many others are user owned. The new IT challenge deals with balancing security with end-user freedom, particularly on personally owned devices. These challenges intensify when considering the increasing demand for application and data access on smartphones and tablets. These devices and apps create new threat vectors that must be addressed by IT executives to prevent data leakage of sensitive corporate information.
  • 0
  • 382

Protect All Users

As users become more mobile, you must find new ways to secure your users, who expect to connect and work from any location. This video shows how you can extend the enterprise security for your users to provide consistent protection regardless of location.
  • 3
  • 1194

次世代ファイアウォール : オンラインセミナー

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Japanese.
  • 2
  • 1370

Verizon and Palo Alto Networks: Partnering for True Next-Generation Security Solutions

Verizon and Palo Networks have partnered to offer you the most advanced security technology combined with world-leading managed services.
  • 0
  • 1345

Traps PCI Compliance

The theft of credit card data continues to grow at an alarming rate. It is costly to credit card companies and merchants, and it undermines consumer confidence. The Payment Card Industry has developed the PCI Data Security Standard (PCI DSS), which includes 12 requirements for protecting cardholder data. Despite substantial investments made in securing their networks, organizations are realizing that being PCI compliant does not mean an enterprise is protected against advanced cyberattacks.
  • 1
  • 4387

Secure It All on Azure - Vietnamese

Sure, migrating your apps and data to Microsoft Azure should accelerate your business. But what about your security? That’s where our Next-Generation Security Platform comes in. With our network, cloud and endpoint security offerings, you can now seamlessly and securely deploy your enterprise apps and data on Azure.
  • 0
  • 186

Defeat Apts and Improve Your Security Posture

Level the playing field by using next generation security technologies from Palo Alto Networks and Splunk. Watch this webinar to learn new innovations that will help you detect and defeat cyberthreats in real-time, perform incident investigations faster, reduce costs, and improve your overall security and compliance posture.
  • 1
  • 1699

Next-Generation Firewall Management from Tuffin- Webinar & Demo

Please join, Michael Hamelin - Tufin Chief Security Architect and Mike Schuricht - Palo Alto Networks Product Manager, to learn more about Tufin's comprehensive firewall management and auditing solution - specifically tailored to next-generation firewalls.
  • 0
  • 900

Palo Alto Networks and ArcSight

Palo Alto Networks and ArcSight have partnered to deliver unprecedented visibility and correlation of enterprise network security events. Utilizing the ArcSight Flexconnector and Common Event Format (CEF), Palo Alto Networks’ next-generation firewalls add rich context encompassing all user and application activity into ArcSight’s Enterprise Security Manager Platform. This integration allows ArcSight to correlate additional relevant data with other data sources into a single cohesive view, unifying critical user, application, and threat visibility.
  • 0
  • 4378

Firewall Expert Series: Learn to Find the Unknowns in your Network

Proactively identify and manage abnormal, anomalous or unknown traffic in your network. In this webinar, we will take a hands-on look at the process of managing unknown traffic using our next-generation firewall, including recommended policies for tracking unknowns, how to properly identify your internally developed applications, and even how to disrupt modern threats by identifying and blocking abnormal traffic.
  • 0
  • 881

Palo Alto Networks and Brocade Partnership

Data center network security demands are simple to understand—prevent threats, ensure compliance with regulations and enterprise policies, and support an agile business. Unfortunately, while the demands are straightforward, putting a solution into practice to meet these demands is anything but simple. As a result, most organizations have been forced to make significant compromises—trading security, functionality, and visibility for performance, simplicity, and efficiency.
  • 0
  • 552

Firewall de Próxima Geração: Tudo o que você Precisa saber

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Portuguese.
  • 4
  • 1763

Palo Alto Networks and Interface Masters Partnership

On mission critical network segments, customers may prefer to deploy a tap/bypass switch to maintain network continuity to mitigate the risks of scheduled or unscheduled downtime of an inline appliance for configuration changes, maintenance, or repair.
  • 0
  • 492

Migrating from Cisco ASA to Palo Alto Networks

Watch this webinar to learn how easy it is to move to a next-generation security platform. Our product experts and Consulting Services team will explain the fundamental differences between Cisco ASA and Palo Alto Networks and share migration best practices, examples and case studies.
  • 11
  • 4863

Palo Alto Networks and Symantec

Palo Alto Networks and and Symantec have partnered to enable organizations to produce executive, technical, and audit-level reports with granular per user and application usage data that are highly effective at communicating risk levels and the security posture of the organization.
  • 0
  • 3151

3 Ways to Protect Your Datacenter Against Modern Threats

Learn three ways to integrate better security into critical, highly available networks while keeping the primary mission of the datacenter (serving available, high-performance applications) at the forefront.
  • 0
  • 348

Traps PCI Compliance - Compensating Controls for Increased Security and Prevention of Advanced Threats

The theft of credit card data continues to grow at an alarming rate. Not only is it costly to credit card companies and merchants, but it undermines consumer confidence. In response, the Payment Card Industry has developed the PCI Data Security Standard (PCI DSS), which includes 12 requirements for protecting cardholder data. Despite substantial investments made in securing their networks, organizations are realizing that being PCI compliant does not mean an enterprise is protected against advanced cyberattacks.
  • 1
  • 627

Network Segmentation Solution Brief

Organizations require a network security platform capable of creating relevant security policies by application, user and content for all of their network segments. Learn more about the need for effective network segmentation, and how a Palo Alto Networks security platform can be at the center of any segmented network.
  • 1
  • 3033

Migrating from Cisco ASA to Palo Alto Networks - Polish

Prezentacja poświęcona porównaniu rozwiązań Cisco ASA z firewallami firmy Palo Alto Networks wraz z wyjaśnieniem w jaki sposób dokonać bezpiecznej i bezbolesnej migracji z tych urządzeń do rozwiązań następnej generacji (NGFW).
  • 0
  • 713

Decrypting SSL forTraffic Inspection

SSL is a growing category of network traffic that delivers private and secure communications. However, it can also be used inappropriately to hide application usage, transfer data to unauthorized parties, and mask malicious activity.
  • 2
  • 2313

Firewall Expert Series: Extending Application Security Policies to Cover Users Everywhere

In this session, we closely examine application usage policies and how they apply to users in different locations. Watch it to learn how to identify challenges with conventional approaches, how you can extend application usage policies to cover remote users, and how to manage your policies from a central location.
  • 0
  • 370
Displaying 4171 to 4200 of 4217