Date

Education and Professional Services

Displaying 4411 to 4440 of 4450

Revealing the Secrets- Advances in Android and IOS Attacks

Join us for this no-cost webinar to get vital details on how the rapidly changing threat landscape may affect your organization. You’ll also get comprehensive strategies for securing your mobile workforce.
  • 0
  • 427

Decrypting SSL forTraffic Inspection

SSL is a growing category of network traffic that delivers private and secure communications. However, it can also be used inappropriately to hide application usage, transfer data to unauthorized parties, and mask malicious activity.
  • 2
  • 2326

Firewall Expert Series: Extending Application Security Policies to Cover Users Everywhere

In this session, we closely examine application usage policies and how they apply to users in different locations. Watch it to learn how to identify challenges with conventional approaches, how you can extend application usage policies to cover remote users, and how to manage your policies from a central location.
  • 0
  • 380

Migrating from Cisco ASA to Palo Alto Networks - Polish

Prezentacja poświęcona porównaniu rozwiązań Cisco ASA z firewallami firmy Palo Alto Networks wraz z wyjaśnieniem w jaki sposób dokonać bezpiecznej i bezbolesnej migracji z tych urządzeń do rozwiązań następnej generacji (NGFW).
  • 0
  • 733

Migrating from Cisco ASA to Palo Alto Networks - Russian

Посмотрите вебинар, чтобы понять, насколько простой переход на платформу нового поколения для сетевой безопасности. Наши продакт менеджер и консультанты расскажут о фундаментальной разнице между Cisco ASA и Palo Alto Networks, а также поделятся лучшими кейсами и практиками миграции.
  • 0
  • 1185

Palo Alto Networks and Swivel

IT Managers are facing ever-increasing demands to secure remote access to corporate applications and data. The proliferating use of personal devices such as smartphones, laptops or tablets within the corporate environment introduces additional security issues. Palo Alto Networks is partnering with Swivel Secure Ltd. to provide its mutual customers with an extremely secure, flexible, and easy to manage remote access solution.
  • 0
  • 509

Palo Alto Networks & Citrix Executive Introduction - Video

Palo Alto Networks and Citrix have forged a long-term, strategic partnership to deliver the essential functionality needed for building your next-generation cloud networks. Unlike piecemeal approaches that introduce complexities and inefficiencies, our integrated solutions uniquely deliver the application intelligence and awareness required for you to safely enable application access with the fastest application performance and greatest availability.
  • 0
  • 1093

Webcast: Stopping the Hemorrhaging of Personal Health Information

In the face of government regulation such as the Health Insurance Portability and Accountability Act (HIPAA), personal health information (PHI) continues to leak into the public domain at an alarming rate, resulting in fraudulent insurance claims, identity theft and other costs to the health care industry. Research indicates PHI can easily be found on peer-to-peer (P2P) filesharing networks. But why?
Santa Clara
  • 0
  • 389

Palo Alto Networks and Plixer

Performance and accountability of Enterprise IT infrastructure has shifted from an incidental focus to real-time visibility for proactive monitoring and compliance mandates. Network security devices have traditionally posed a blind spot for network monitoring and management solutions by typically restricting output to basic network parameters such as NAT tables and traffic session. Palo Alto Networks breaks this barrier by providing unprecedented visibility of user and application usage information via Netflow, the industry standard protocol for network monitoring. Plixer’s™ Scrutinizer software collects and analyzes Netflow data to monitor and report on overall health of the network.
  • 0
  • 616

Threat Review Series: What the Enterprise Can Learn From WikiLeaks

The WikiLeaks saga has captured attention world-wide, with the majority of analysis focused on the actual leaked content. Yet while WikiLeaks is certainly the most high-profile breach in recent memory, the techniques used to exfiltrate and hide information are directly applicable to enterprises today. In this session we will summarize the key lessons of WikiLeaks and how security managers can protect their networks today.
  • 0
  • 354

Migrating from Cisco ASA to Palo Alto Networks - Italian

Guardate il ns. webcast sulla migrazione da Cisco ASA a Palo Alto Networks. Vi mostreremo quanto sia semplice passare ad una piattaforma di sicurezza di nuova generazione. Il nostro team di esperti vi spiegherà le differenze fondamentali fra Cisco ASA e Palo Alto Networks e condividerà le migliori best-practice di migrazione, alcuni esempi e case-study.
  • 0
  • 619

Palo Alto Networks and NetWitness

Palo Alto Networks and NetWitness have partnered to provide unified security event analysis and resolution. The combined solution validates application execution, speeds incident investigation and eliminates wasted time navigating disparate systems.
  • 0
  • 617

下一代防火墙 : 你需要了解的任何事情

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Simplified Chinese.
  • 2
  • 3163

Lightboard Series: VM-Series on Google Cloud Platform Overview

An overview of how the VM-Series can be deployed on Google Cloud Platform to protect apps and data.
  • 0
  • 226

Assuming a Platform Approach to Cybersecurity

Pamela Warren, Director of Government and Industry Initiatives at Palo Alto Networks, shares her thoughts on why a platform approach is critical to effective cybersecurity within the government space. Warren explains that government organizations make four common mistakes when trying to secure their information systems. The most basic error, she said, is failing to have visibility to what is happening on your network: "What we're seeing is that many organizations are unaware of what applications they are even running on their network." This ends up being a major barrier to effective cybersecurity because it leaves unseen gaps in security for attackers to target.
  • 0
  • 538

Control the Risks in Allowed Applications

How Palo Alto Networks provides secure application enablement—first by allowing the application and then scanning it for threats to protect users and your network.
  • 4
  • 3703

Firewall Expert Series: Application Function Control with Palo Alto Networks

Hear examples of how Palo Alto Networks can securely enable application features and functions while blocking others in this 30 minute Firewall Expert Series.
  • 0
  • 492

Pragmatic Network Security for Virtualized Datacenter Environments

This webcast provides an over-arching framework and concise set of best practices organizations can use to address the network security challenges created by ongoing adoption of popular virtualization technologies.
  • 0
  • 383

Maintain Performance with Security Services Enabled

IT Security teams are often forced to choose between security and performance. See how the unique design of our Palo Alto Networks next-generation firewall addresses this challenge and how it has performed in independent 3rd party testing.
  • 1
  • 1696

Palo Alto Networks and Solera Networks

Palo Alto Networks and Solera Networks are combining next generation firewalls with active network forensics to enable security administrators to “see” critical attacks, uncover their root cause and quickly adapt their infrastructure to prevent recurrence and mitigate risk.
  • 0
  • 693

Palo Alto Networks and Tufin

As organizations deploy multiple security solutions to safeguard corporate networks from wide-ranging threats, it becomes increasingly difficult to perform labor-intensive and error-prone tasks such as risk analysis, change management, auditing and compliance checks. Palo Alto Networks and Tufin® have partnered to help customers increase operational efficiency and reduce risk by intelligently automating firewall policy management.
  • 0
  • 1969

Firewall de Siguiente Generación: Todo lo que usted necesita saber

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Spanish.
  • 7
  • 3298

Nouvelle Génération de Pare feux: Tout ce que vous avez besoin de savoir

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in French.
  • 2
  • 1430

Traps PCI Compliance

The theft of credit card data continues to grow at an alarming rate. It is costly to credit card companies and merchants, and it undermines consumer confidence. The Payment Card Industry has developed the PCI Data Security Standard (PCI DSS), which includes 12 requirements for protecting cardholder data. Despite substantial investments made in securing their networks, organizations are realizing that being PCI compliant does not mean an enterprise is protected against advanced cyberattacks.
  • 1
  • 4433

Verizon and Palo Alto Networks: Partnering for True Next-Generation Security Solutions

Verizon and Palo Networks have partnered to offer you the most advanced security technology combined with world-leading managed services.
  • 0
  • 1381

次世代ファイアウォール : オンラインセミナー

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Japanese.
  • 2
  • 1388
Displaying 4411 to 4440 of 4450