Date

Education and Professional Services

Displaying 4441 to 4470 of 4510

Palo Alto Networks and ArcSight

Palo Alto Networks and ArcSight have partnered to deliver unprecedented visibility and correlation of enterprise network security events. Utilizing the ArcSight Flexconnector and Common Event Format (CEF), Palo Alto Networks’ next-generation firewalls add rich context encompassing all user and application activity into ArcSight’s Enterprise Security Manager Platform. This integration allows ArcSight to correlate additional relevant data with other data sources into a single cohesive view, unifying critical user, application, and threat visibility.
  • 0
  • 4525

Firewall Expert Series: Learn to Find the Unknowns in your Network

Proactively identify and manage abnormal, anomalous or unknown traffic in your network. In this webinar, we will take a hands-on look at the process of managing unknown traffic using our next-generation firewall, including recommended policies for tracking unknowns, how to properly identify your internally developed applications, and even how to disrupt modern threats by identifying and blocking abnormal traffic.
  • 0
  • 900

Migrating from Cisco ASA to Palo Alto Networks

Watch this webinar to learn how easy it is to move to a next-generation security platform. Our product experts and Consulting Services team will explain the fundamental differences between Cisco ASA and Palo Alto Networks and share migration best practices, examples and case studies.
  • 11
  • 5064

Traps PCI Compliance - Compensating Controls for Increased Security and Prevention of Advanced Threats

The theft of credit card data continues to grow at an alarming rate. Not only is it costly to credit card companies and merchants, but it undermines consumer confidence. In response, the Payment Card Industry has developed the PCI Data Security Standard (PCI DSS), which includes 12 requirements for protecting cardholder data. Despite substantial investments made in securing their networks, organizations are realizing that being PCI compliant does not mean an enterprise is protected against advanced cyberattacks.
  • 1
  • 645

3 Ways to Protect Your Datacenter Against Modern Threats

Learn three ways to integrate better security into critical, highly available networks while keeping the primary mission of the datacenter (serving available, high-performance applications) at the forefront.
  • 0
  • 366

Securing Your Serverless Journey

With serverless, the cloud provider is responsible for securing the underlying infrastructure, from the data centers all the way up to the container and runtime environment.
  • 0

Network Segmentation Solution Brief

Organizations require a network security platform capable of creating relevant security policies by application, user and content for all of their network segments. Learn more about the need for effective network segmentation, and how a Palo Alto Networks security platform can be at the center of any segmented network.
  • 1
  • 3202

Palo Alto Networks and Symantec

Palo Alto Networks and and Symantec have partnered to enable organizations to produce executive, technical, and audit-level reports with granular per user and application usage data that are highly effective at communicating risk levels and the security posture of the organization.
  • 0
  • 3231

Palo Alto Networks and Swivel

IT Managers are facing ever-increasing demands to secure remote access to corporate applications and data. The proliferating use of personal devices such as smartphones, laptops or tablets within the corporate environment introduces additional security issues. Palo Alto Networks is partnering with Swivel Secure Ltd. to provide its mutual customers with an extremely secure, flexible, and easy to manage remote access solution.
  • 0
  • 518

Migrating from Cisco ASA to Palo Alto Networks - Polish

Prezentacja poświęcona porównaniu rozwiązań Cisco ASA z firewallami firmy Palo Alto Networks wraz z wyjaśnieniem w jaki sposób dokonać bezpiecznej i bezbolesnej migracji z tych urządzeń do rozwiązań następnej generacji (NGFW).
  • 0
  • 744

Decrypting SSL forTraffic Inspection

SSL is a growing category of network traffic that delivers private and secure communications. However, it can also be used inappropriately to hide application usage, transfer data to unauthorized parties, and mask malicious activity.
  • 2
  • 2333

Migrating from Cisco ASA to Palo Alto Networks - Russian

Посмотрите вебинар, чтобы понять, насколько простой переход на платформу нового поколения для сетевой безопасности. Наши продакт менеджер и консультанты расскажут о фундаментальной разнице между Cisco ASA и Palo Alto Networks, а также поделятся лучшими кейсами и практиками миграции.
  • 0
  • 1193

Palo Alto Networks and Plixer

Performance and accountability of Enterprise IT infrastructure has shifted from an incidental focus to real-time visibility for proactive monitoring and compliance mandates. Network security devices have traditionally posed a blind spot for network monitoring and management solutions by typically restricting output to basic network parameters such as NAT tables and traffic session. Palo Alto Networks breaks this barrier by providing unprecedented visibility of user and application usage information via Netflow, the industry standard protocol for network monitoring. Plixer’s™ Scrutinizer software collects and analyzes Netflow data to monitor and report on overall health of the network.
  • 0
  • 622

Webcast: Stopping the Hemorrhaging of Personal Health Information

In the face of government regulation such as the Health Insurance Portability and Accountability Act (HIPAA), personal health information (PHI) continues to leak into the public domain at an alarming rate, resulting in fraudulent insurance claims, identity theft and other costs to the health care industry. Research indicates PHI can easily be found on peer-to-peer (P2P) filesharing networks. But why?
Santa Clara
  • 0
  • 391

Threat Review Series: What the Enterprise Can Learn From WikiLeaks

The WikiLeaks saga has captured attention world-wide, with the majority of analysis focused on the actual leaked content. Yet while WikiLeaks is certainly the most high-profile breach in recent memory, the techniques used to exfiltrate and hide information are directly applicable to enterprises today. In this session we will summarize the key lessons of WikiLeaks and how security managers can protect their networks today.
  • 0
  • 358

Firewall Expert Series: Extending Application Security Policies to Cover Users Everywhere

In this session, we closely examine application usage policies and how they apply to users in different locations. Watch it to learn how to identify challenges with conventional approaches, how you can extend application usage policies to cover remote users, and how to manage your policies from a central location.
  • 0
  • 385

Lightboard Series: VM-Series on Google Cloud Platform Overview

An overview of how the VM-Series can be deployed on Google Cloud Platform to protect apps and data.
  • 0
  • 236

Migrating from Cisco ASA to Palo Alto Networks - Italian

Guardate il ns. webcast sulla migrazione da Cisco ASA a Palo Alto Networks. Vi mostreremo quanto sia semplice passare ad una piattaforma di sicurezza di nuova generazione. Il nostro team di esperti vi spiegherà le differenze fondamentali fra Cisco ASA e Palo Alto Networks e condividerà le migliori best-practice di migrazione, alcuni esempi e case-study.
  • 0
  • 626

Palo Alto Networks & Citrix Executive Introduction - Video

Palo Alto Networks and Citrix have forged a long-term, strategic partnership to deliver the essential functionality needed for building your next-generation cloud networks. Unlike piecemeal approaches that introduce complexities and inefficiencies, our integrated solutions uniquely deliver the application intelligence and awareness required for you to safely enable application access with the fastest application performance and greatest availability.
  • 0
  • 1099

Assuming a Platform Approach to Cybersecurity

Pamela Warren, Director of Government and Industry Initiatives at Palo Alto Networks, shares her thoughts on why a platform approach is critical to effective cybersecurity within the government space. Warren explains that government organizations make four common mistakes when trying to secure their information systems. The most basic error, she said, is failing to have visibility to what is happening on your network: "What we're seeing is that many organizations are unaware of what applications they are even running on their network." This ends up being a major barrier to effective cybersecurity because it leaves unseen gaps in security for attackers to target.
  • 0
  • 548

下一代防火墙 : 你需要了解的任何事情

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Simplified Chinese.
  • 2
  • 3178

Firewall Expert Series: Application Function Control with Palo Alto Networks

Hear examples of how Palo Alto Networks can securely enable application features and functions while blocking others in this 30 minute Firewall Expert Series.
  • 0
  • 493

Control the Risks in Allowed Applications

How Palo Alto Networks provides secure application enablement—first by allowing the application and then scanning it for threats to protect users and your network.
  • 4
  • 3707

Maintain Performance with Security Services Enabled

IT Security teams are often forced to choose between security and performance. See how the unique design of our Palo Alto Networks next-generation firewall addresses this challenge and how it has performed in independent 3rd party testing.
  • 1
  • 1701

Palo Alto Networks and NetWitness

Palo Alto Networks and NetWitness have partnered to provide unified security event analysis and resolution. The combined solution validates application execution, speeds incident investigation and eliminates wasted time navigating disparate systems.
  • 0
  • 629

Pragmatic Network Security for Virtualized Datacenter Environments

This webcast provides an over-arching framework and concise set of best practices organizations can use to address the network security challenges created by ongoing adoption of popular virtualization technologies.
  • 0
  • 389
Displaying 4441 to 4470 of 4510