Date

Education and Professional Services

  • Cybersecurity Academy (4)
  • Federal Government
Displaying 61 to 77 of 77

Government APT video series Part 1: THE ANATOMY OF AN ADVANCED THREAT

Governments have the unwelcome position of being among the most targeted organizations in the world. Attackers are taking advantage of the slow patching process of many government organizations to protect their networks from known vulnerabilities. But of course we know attackers also develop highly targeted or specialized zero-day exploits. Palo Alto Networks has a closed-loop threat prevention platform that addresses all of these threats without the need for a daisy chain of security products. It’s efficient, simplified and optimizes your resources. We invite you to a 3-part video series in which we explore and compare current options to Palo Alto Networks’ unique approach to thwart threats, particularly zero-days and APTs in today’s demanding government environments.
  • 0
  • 521

California Department of Water Resources, Securing NSX with VM-Series

In this video, you’ll hear Tony Morshed, Chief Technology Officer at California Department of Water Resources (DWR) discuss the state’s Software-Defined Data Center strategy. DWR leverages the Palo Alto Networks Next-Generation Security Platform, including WildFire and Panorama subscriptions. In addition, DWR takes advantage of the microsegmentation capability that VMware’s NSX solution provides.
  • 0
  • 983

Government APT video series Part 3: MULTI-LAYERED ADVANCED THREAT APPROACH

In Part 3, the last installment of Palo Alto Networks Government APT video series, we discuss Palo Alto Networks multi-layered approach to threat prevention using a positive security model. Enacting a positive security model allows government organizations to deflect any of the malicious content before it needs to hit WildFire®.
  • 0
  • 329

California Department of Water Resources

In this video, you’ll hear Tony Morshed, Chief Technology Officer at California Department of Water Resources (DWR) discuss the state’s Software-Defined Data Center strategy. DWR leverages the Palo Alto Networks Next-Generation Security Platform, including WildFire and Panorama subscriptions. In addition, DWR takes advantage of the microsegmentation capability that VMware’s NSX solution provides.
  • 0

How Palo Alto Networks Can Help With ASD's Top Cyber Intrusion Mitigation Strategies

The Australian Signals Directorate (ASD) plays a lead role in protecting Australia’s critical infrastructure from cyber intrusions that pose real and present threats to Australia’s national security. ASD has recommended 35 and mandated that four of the mitigation strategies be implemented in every government agency.
  • 2
  • 401

Federal CDM Video Series - Part 2

Steve Hoffman, Vice President of Sales for Palo Alto Networks Federal Josh Canary, Account General Manager for CSC - Department of Homeland Security, MPPD, and more importantly the CDM program. In this segment, Palo Alto Networks and CSC discuss Continuous Diagnostic and Mitigation (CDM) and the importance of an integrated platform to improve response times to zero days and APTs.
  • 0
  • 448

Federal CDM Video Series - Part 1

Steve Hoffman, Vice President of Sales for Palo Alto Networks Federal Josh Canary, Account General Manager for CSC - Department of Homeland Security, MPPD, and more importantly the CDM program. In this segment, Palo Alto Networks and CSC discuss Continuous Diagnostic and Mitigation (CDM) requirements and how Palo Alto Networks and CSC work together to meet them.
  • 0
  • 578

Federal CDM Video Series - Part 3

Steve Hoffman, Vice President of Sales for Palo Alto Networks Federal Josh Canary, Account General Manager for CSC - Department of Homeland Security, MPPD, and more importantly the CDM program. In this segment, Palo Alto Networks and CSC discuss how Continuous and Diagnostic Mitigation (CDM) relates to the existing Einstein program.
  • 0
  • 389

Thwarting APTs: Threat Visibility for Government Networks

Read about the Palo Alto Networks enterprise security platform, which prevents all known file types from traversing government networks in-line.
  • 1
  • 498

Defense in Depth: 5 Imperatives for Governments to Defeat APTs

Defense in Depth does not mean more security tools. The key to thwarting advanced attacks in today’s government networks is to reduce the attack surface to increase visibility to what matters: the anomalies in your network, across the kill chain.
  • 0
  • 563

Multinational Defense Agency

Large Multinational Defense Agency Fortifies its Network, Reduces Complexity and Saves Money with Palo Alto Networks® Next-generation Security
  • 0
  • 110

Assuming a Platform Approach to Cybersecurity

Pamela Warren, Director of Government and Industry Initiatives at Palo Alto Networks, shares her thoughts on why a platform approach is critical to effective cybersecurity within the government space. Warren explains that government organizations make four common mistakes when trying to secure their information systems. The most basic error, she said, is failing to have visibility to what is happening on your network: "What we're seeing is that many organizations are unaware of what applications they are even running on their network." This ends up being a major barrier to effective cybersecurity because it leaves unseen gaps in security for attackers to target.
  • 0
  • 494

GSA Government Contracts

Information about the Palo Alto Networks products and services available on GSA CMAS contracts.
  • 0
  • 987

Asia-Pacific Government Authority

As the Government Authority responsible for driving growth in the information technology sector, this agency understands technology. With a globalized economy and considered one of the most competitive countries in the world, this Asian country has one of the highest internet penetration rates in the greater Asia-Pacific region.
  • 0
  • 640

Webcast: Stopping the Hemorrhaging of Personal Health Information

In the face of government regulation such as the Health Insurance Portability and Accountability Act (HIPAA), personal health information (PHI) continues to leak into the public domain at an alarming rate, resulting in fraudulent insurance claims, identity theft and other costs to the health care industry. Research indicates PHI can easily be found on peer-to-peer (P2P) filesharing networks. But why?
Santa Clara
  • 0
  • 370

Managed Security Services Solution Brief

Demand for managed security services is on the rise as many enterprises and governments struggle to contend with an increasingly complex threat landscape, a shortage of skilled personnel, and the need to rapidly adapt to dynamic business conditions while still keeping security costs under control.
  • 1
  • 4624
Displaying 61 to 77 of 77