Date

By Source

By Technology

By Services

By Audience

Displaying 9151 to 9180 of 9214

Palo Alto Networks and Tufin

As organizations deploy multiple security solutions to safeguard corporate networks from wide-ranging threats, it becomes increasingly difficult to perform labor-intensive and error-prone tasks such as risk analysis, change management, auditing and compliance checks. Palo Alto Networks and Tufin® have partnered to help customers increase operational efficiency and reduce risk by intelligently automating firewall policy management.

  • 0
  • 1030

Palo Alto Networks and MobileIron

Intelligent tablets and smartphones are now the primary personal communications and computing platform for Mobile IT business operations and apps. As a result, IT needs to consider how to provide secure network access to both enterprise and end user owned mobile devices. Moreover, an exponential increase in the number and usage of mobile apps is creating new threat vectors that must be addressed by IT to safeguard mobile devices and prevent data loss.

  • 0
  • 981

Threat Review: The Anatomy of a Targeted Attack

Targeted attacks represent some of the most dangerous threats facing a modern enterprise. While these threats remain relatively rare, they often target your most valuable assets and intellectual property. The use of custom malware and attack strategies also makes them some of the most difficult IT security threats for you to detect. In this episode of the Threat Review, we will analyze a real-world example of a targeted attack exposed by WildFire, including an analysis of the malware industry that supports targeted attacks, and best practices to protect your network today.

  • 0
  • 340

How to Detect and Stop Modern Cyberattacks

Modern threats are forcing businesses to fully examine the lifecycle of cyberattacks and advanced persistent threats (APTs). During this webcast we review real world data on cyberattacks and dissect the 5 steps of an advanced attack designed to evade security controls.

  • 0
  • 351

Traps PCI Compliance

The theft of credit card data continues to grow at an alarming rate. It is costly to credit card companies and merchants, and it undermines consumer confidence. The Payment Card Industry has developed the PCI Data Security Standard (PCI DSS), which includes 12 requirements for protecting cardholder data. Despite substantial investments made in securing their networks, organizations are realizing that being PCI compliant does not mean an enterprise is protected against advanced cyberattacks.

  • 1
  • 3255

Security challenges in municipalities and counties and how we solve them

Security challenges in municipalities and counties and how we solve them.

  • 2
  • 240

Palo Alto Networks for Advanced Threats

In this webinar we will talk about what Advanced Persistent Threats are and how they target Enterprises. We will also talk about our Lifecycle approach to APT mitigation and the power of WildFire.

  • 0
  • 103

Best of Black Hat 2013

Hear the top takeaways, including noteworthy new research, tools, and techniques, from a week at Black Hat during this recap of the 2013 conference.

  • 0
  • 124

Network Segmentation Solution Brief

Organizations require a network security platform capable of creating relevant security policies by application, user and content for all of their network segments. Learn more about the need for effective network segmentation, and how a Palo Alto Networks security platform can be at the center of any segmented network.

  • 0
  • 1144

3 Ways to Protect Your Datacenter Against Modern Threats

Learn three ways to integrate better security into critical, highly available networks while keeping the primary mission of the datacenter (serving available, high-performance applications) at the forefront.

  • 0
  • 131

Threat Review Series: Verizon Report - What You Need to Know Now

In this series we’ll analyze the recent Verizon Data Breach Investigation Report (DBIR) and malware findings from WildFire.

  • 0
  • 149

Threat Review Series: Key Lessons from WildFire and APT1

In this series, we review the latest happenings from the world of malware including trends and techniques in modern and evasive malware, and specific recommendations you can use in your network.

  • 0
  • 135

Nir Zuk on Modern Malware Part 2 - Video

Nir Zuk presents on Modern Malware and how it impacts your network security.

  • 0
  • 325

Firewall Nowej Generacji: wszystko co musisz wiedzieć

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Polish.

  • 3
  • 813

Decrypting SSL for Traffic Inspection

SSL is a growing category of network traffic that delivers private and secure communications. However, it can also be used inappropriately to hide application usage, transfer data to unauthorized parties, and mask malicious activity.

  • 1
  • 1187

Palo Alto Networks and Citrix Webinar: Best Practices to Secure Your Virtual Desktop Solutions

Realizing the benefits of desktop virtualization depends on ensuring the security and availability of the virtual desktop infrastructure. Watch this Palo Alto Networks and Citrix webinar to learn the best practices on how to secure Citrix XenApp and XenDesktop deployments using Citrix NetScaler and Palo Alto Networks next-generation firewalls.

  • 0
  • 752

Nir Zuk on Modern Malware Part 1 - Video

Nir Zuk presents on Modern Malware and how it impacts your network security.

  • 0
  • 558

Threat Review Series: What the Enterprise Can Learn From WikiLeaks

The WikiLeaks saga has captured attention world-wide, with the majority of analysis focused on the actual leaked content. Yet while WikiLeaks is certainly the most high-profile breach in recent memory, the techniques used to exfiltrate and hide information are directly applicable to enterprises today. In this session we will summarize the key lessons of WikiLeaks and how security managers can protect their networks today.

  • 0
  • 127

Palo Alto Networks & Citrix Executive Introduction - Video

Palo Alto Networks and Citrix have forged a long-term, strategic partnership to deliver the essential functionality needed for building your next-generation cloud networks. Unlike piecemeal approaches that introduce complexities and inefficiencies, our integrated solutions uniquely deliver the application intelligence and awareness required for you to safely enable application access with the fastest application performance and greatest availability.

  • 0
  • 696

Palo Alto Networks and Plixer

Performance and accountability of Enterprise IT infrastructure has shifted from an incidental focus to real-time visibility for proactive monitoring and compliance mandates. Network security devices have traditionally posed a blind spot for network monitoring and management solutions by typically restricting output to basic network parameters such as NAT tables and traffic session. Palo Alto Networks breaks this barrier by providing unprecedented visibility of user and application usage information via Netflow, the industry standard protocol for network monitoring. Plixer’s™ Scrutinizer software collects and analyzes Netflow data to monitor and report on overall health of the network.

  • 0
  • 210

Palo Alto Networks and Lancope

Performance and accountability of enterprise IT infrastructure has shifted from an incidental focus to one that requires real-time visibility for proactive monitoring and compliance. Traditional network security devices posed a blind spot for network monitoring and management solutions for basic network parameters such as NAT tables and traffic sessions.

  • 0
  • 454

下一代防火墙 : 你需要了解的任何事情

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Simplified Chinese.

  • 2
  • 1276

Assuming a Platform Approach to Cybersecurity

Pamela Warren, Director of Government and Industry Initiatives at Palo Alto Networks, shares her thoughts on why a platform approach is critical to effective cybersecurity within the government space. Warren explains that government organizations make four common mistakes when trying to secure their information systems. The most basic error, she said, is failing to have visibility to what is happening on your network: "What we're seeing is that many organizations are unaware of what applications they are even running on their network." This ends up being a major barrier to effective cybersecurity because it leaves unseen gaps in security for attackers to target.

  • 0
  • 181

60 Minutes: Coming to Grips with Consumerization

How or why is consumerization happening is almost irrelevant. All that really matters is how to deal with it. Today it's users, rather than IT departments, that are choosing the laptops, smart phones and tablets that they want to use. The resulting challenge for you is not trivial: how to integrate consumer devices in your business, yet still put adequate controls in place to manage the associated risks ­- not the least of which is the risk of exposing your applications and sensitive data to the wrong people. In this live video broadcast, hear Nir Zuk, CTO and co-founder of Palo Alto Networks, and Rich Mogull, Analyst and CEO of Securosis, provide insights and recommendations on how to handle consumerization and the proliferation of devices.

  • 0
  • 103

Palo Alto Networks and Garland Technology Partnership

When customers deploy inline appliances on mission critical network segments, they have the option to mitigate the risks of scheduled or unscheduled downtime of an inline appliance for configuration changes, maintenance, or repair scenarios by adding a tap/bypass switch to maintain network continuity. Palo Alto Networks has partnered with Garland Technology to provide the ability to install Palo Alto Networks next-generation firewall inline without compromising network uptime.

  • 0
  • 284

Palo Alto Networks and Skybox

Identifying security risks proactively and systematically in a large network is like looking for a needle in a haystack. To address the challenge, it is imperative that the network firewall, as a first line of defense, is optimally configured for security, continuous compliance and high performance. Palo Alto Networks and Skybox® Security have partnered to monitor and prevent security or compliance gaps in an enterprise firewall deployment, and minimize overall firewall management costs.

  • 0
  • 779

Palo Alto Networks and Solera Networks

Palo Alto Networks and Solera Networks are combining next generation firewalls with active network forensics to enable security administrators to “see” critical attacks, uncover their root cause and quickly adapt their infrastructure to prevent recurrence and mitigate risk.

  • 0
  • 380

Identify and Control Circumventors

Hackers and end-users are armed with a variety of technologies that allow them to hide their traffic from traditional network security solutions. See how the unique capabilities of our App-ID allow you to find and control these applications.

  • 1
  • 943

Next-Generation Firewall Management from Tuffin- Webinar & Demo

Please join, Michael Hamelin - Tufin Chief Security Architect and Mike Schuricht - Palo Alto Networks Product Manager, to learn more about Tufin's comprehensive firewall management and auditing solution - specifically tailored to next-generation firewalls.

  • 0
  • 495
Displaying 9151 to 9180 of 9214