Webcast

Filter Results By

Filter by Type

  • Webcast (91)
  • Video (22)

Filter by Topic

Filter by Industry

Filter by Product

Viewing All Results

Most Viewed

Guardate il ns. webcast sulla migrazione da Cisco ASA a Palo Alto Networks. Vi mostreremo quanto sia semplice passare ad una piattaforma di sicurezza di nuova generazione. Il nostro team di esperti vi spiegherà le differenze fondamentali fra Cisco ASA e Palo Alto Networks e condividerà le migliori best-practice di migrazione, alcuni esempi e case-study.

55 Viste
Webcast
December 19, 2014, 02:00 PM

Le APT sono usate per compromettere le organizzazioni in tutto il mondo con metodi di attacco sofisticati, persistenti ed elusivi. Guarda questo webcast dove faremo luce sul lato oscuro del mondo digitale.

Webcast
September 8, 2014, 08:00 AM

〜最近メディアを騒がせている情報漏えい事件について〜

『ゼロトラストネットワークセキュリティ』を構築してシステム面から企業を守る!!

緊急Webセミナーと銘打って、国内大手教育事業者様の情報漏えい事件を参考に、システム面から企業を徹底的に守る方法についてご紹介しました。

Webcast
September 8, 2014, 08:00 AM

7月と8月に上半期のセキュリティ市場の振り返りのWebセミナーを実施しました。

実際の被害例をあげて実施したため、参加者の方に高評価されるセミナーとなりました。

Webcast
September 2, 2014, 08:00 AM

Unit 42, the Palo Alto Networks threat intelligence team, has identified a series of attacks codenamed “Silver Spaniel”, emanating from Nigerian actors against our customers. These attackers, formerly associated with 419 scams targeted at unsuspecting individuals, are now using many of the same tools that cyber crime and espionage groups have deployed in the past. These actors represent an emerging threat to the enterprise.

Webcast
August 12, 2014, 08:00 AM

In this segment, Palo Alto Networks and CSC discuss how Continuous and Diagnostic Mitigation (CDM) relates to the existing Einstein program.

Webcast
August 12, 2014, 08:00 AM

In this segment, Palo Alto Networks and CSC discuss Continuous Diagnostic and Mitigation (CDM) and the importance of an integrated platform to improve response times to zero days and APTs.

Webcast
August 12, 2014, 08:00 AM

In this segment, Palo Alto Networks and CSC discuss Continuous Diagnostic and Mitigation (CDM) requirements and how Palo Alto Networks and CSC work together to meet them.

Webcast
July 30, 2014, 08:00 AM

Today’s cyber threats hide in plain sight amidst your network traffic, making them nearly impossible to defend against. These advanced threats use applications as their infiltration vector, exhibit application-like evasion tactics and they leverage commonly used network applications for exfiltration.

In this webinar we analyze the intertwined relationship between cyber attacks and applications based on recent data collected from over 2,200 networks in North and South America.

Webcast
July 13, 2014, 08:00 AM

Today’s cyber threats hide in plain sight amidst your network traffic, making them nearly impossible to defend against. These advanced threats use applications as their infiltration vector, exhibit application-like evasion tactics and they leverage commonly used network applications for exfiltration.

Watch this webcast where we will analyze the intertwined relationship between cyber attacks and applications based on recent data collected from over 5,500 networks worldwide.

Webcast
July 11, 2014, 08:00 AM

Las Amenazas Persistentes Avanzadas (APTs) son usadas para comprometer organizaciones en todo el mundo con métodos de ataque cada vez más sofisticados, persistentes y evasivos.

Risorsa
July 7, 2014, 08:00 AM

Palo Alto Networks hat heute neue Forschungsergebnisse darüber veröffentlicht, wie Cyber-Angreifer gängige Business-Anwendungen ausnutzen, um Sicherheitskontrollen zu umgehen. Unsere Studie basiert auf der Analyse erfasster Traffic-Informationen von 5.500 Netzwerken und Milliarden von Logdaten über einen Zeitraum von zwölf Monaten. Sie liefert Unternehmen und Sicherheitsexperten wertvolle Einblicke, wie ihre Sicherheitsstrategie neu bewertet und verstärkt werden sollte.

Bitte loggen Sie sich auf der rechten Seite ein um sich das Webinar jetzt anzusehen!

Risorsa
July 1, 2014, 08:00 AM

En se fondant dans votre trafic réseau, les cyber menaces actuelles sont presque impossible à éliminer. Ces menaces avancées utilisent les applications comme vecteur d'infiltration, adoptent des technique 
d'évasion typiques et utilisent des protocoles réseau standards pour l'exfiltration de données. 

Nous vous invitons à visualiser notre webinar pendant lequel nous analyserons les relations intimes qui nouent applications et cyber-attaques grâces aux données collectées sur 5500 réseaux informatiques dans le monde entier.

Risorsa
June 20, 2014, 08:00 AM

Nachrichten über Malware, Cyber-Attacken und Sicherheitshinweise erscheinen mittlerweile fast täglich in den Medien. Sei es der Cyber Angriff auf das deutsche Zentrum für Luft- und Raumfahrt oder das SSL-gesicherte Server plötzlich von einer Schwachstelle betroffen sind. Als „normaler“ Anwender steht man diesen modernen Bedrohungen eher hilflos gegenüber und versucht mit einzelnen Hilfsmitteln die Sicherheit wieder herzustellen. Unser Webinar soll Ihnen einen Überblick über moderne Bedrohungen geben und Lösungsmöglichkeiten aufzeigen, wie sich ein Unternehmen gegen moderne Angriffe heutzutage schützen kann.

Webcast
May 30, 2014, 08:00 AM

APTs are hard to find and an increasing threat to enterprise security. Finding them takes coordination between device feeds combined with the intelligence to connect those dots. Where along the chain of attack can these threats be detected and stopped? How does the threat spread if left unchecked and what would it cost? Is your network secure enough? The answers to these enterprise-critical security questions will be discussed in this webcast.

Webcast
May 28, 2014, 08:00 AM

Advanced Persistent Threats (APTs) are being used to compromise organizations around the globe with increasing sophistication, persistence, and evasive attack methods. Join Palo Alto Networks® for a live webcast with Q&A that will take you straight to the heart of the cyber underground.

Webcast
April 10, 2014, 12:00 AM

How to Safely Enable Mobile Devices for Business Use There’s no question that mobile devices are making an impact to how and where we work. However, the risks that mobile devices face continues to grow, which drives a corresponding set of requirements for security. So what are the most critical priorities in mobile security today? In this session, take a look at the big picture in mobile security, dive into the specifics for the risks that mobile devices face and learn about how to safely enable mobile devices for use in business environments.

Webcast
April 2, 2014, 12:41 PM

Bei der Modernisierung von Rechenzentren spielt Virtualisierung eine entscheidende Rolle. Hinzu kommen verschärfte Anforderungen in punkto Datenschutz und neue mobile Zugriffswege. Unser Webcast soll Ihnen einen Überblick über die Anforderungen und die Umsetzung konkreter Sicherungsmassnahmen im Rechenzentrum geben.

Webcast
April 2, 2014, 12:41 PM

Join us for the “Migrating from Juniper to Palo Alto Networks” webinar. We’ll show you how easy it is to move to a next-generation security platform. Our product experts and Consulting Services team will explain the fundamental differences between Juniper and Palo Alto Networks, and share migration best practices, examples and case studies.

Webcast
April 2, 2014, 12:41 PM

Компания Palo Alto Networks продолжает развитие своих продуктов безопасности, которые позволяют корпоративным Заказчикам противостоять современным кибератакам, угрозам и вирусам нулевого дня (ATP).

Релиз новой ОС Palo Alto Networks 6.0 добавил порядка 60 новых дополнительных функциональных возможностей для плотной интеграции и предоставления технологий защиты в сфере виртуализации, мобильных устройств и сетей SDN.

Webcast
April 2, 2014, 12:41 PM

Learn how the Palo Alto Networks enterprise security platform protects organizations from known threats, zero-day exploits, unknown malware, and the complete spectrum of APTs.

Risorsa
September 9, 2013, 05:00 PM

Grazie a questo webinar scoprirai com'è semplice passare a una piattaforma di sicurezza di nuova generazione. I nostri esperti dei prodotti e il team dei servizi di consulenza ti spiegheranno le differenze fondamentali fra Cisco ASA e Palo Alto Networks e illustreranno le best practice in materia di migrazione, nonché esempi e case study.

Risorsa
May 1, 2013, 05:10 PM

Segui questo webinar tecnico per apprendere a implementare le best practice di segmentazione della rete con i firewall Palo Alto Networks di nuova generazione. Implementata correttamente, la segmentazione della rete consente di circoscrivere l'ambito dei requisiti di conformità, isolare le zone vulnerabili della rete e ridurre l'impatto delle violazioni della sicurezza.

Risorsa

Proteggere la rete del data center è un'operazione sempre più complessa. Le recenti violazioni di dati pubblici che hanno coinvolto i data center, combinate con la necessità di supportare velocità più elevate, maggiori quantità di traffico e la virtualizzazione, stanno spingendo le aziende a rivalutare le proprie architetture di rete e sicurezza. Segui il webinar formativo di Palo Alto Networks e Arista sui requisiti essenziali per la protezione delle reti di data center di nuova generazione.

Risorsa

Guardate il ns. webcast sulla migrazione da Cisco ASA a Palo Alto Networks. Vi mostreremo quanto sia semplice passare ad una piattaforma di sicurezza di nuova generazione. Il nostro team di esperti vi spiegherà le differenze fondamentali fra Cisco ASA e Palo Alto Networks e condividerà le migliori best-practice di migrazione, alcuni esempi e case-study.

Risorsa

Sfruttare o meno i vantaggi della virtualizzazione dei desktop dipende dalla possibilità di garantire la sicurezza e la disponibilità dell'infrastruttura di desktop virtuali. Segui questo webinar di Palo Alto Networks e Citrix per apprendere le best practice sulla protezione delle implementazioni di Citrix XenApp e XenDesktop con Citrix NetScaler e i firewall Palo Alto Networks di nuova generazione.

CHAT
Domande?
Discutine con chi può darti le risposte.
Avvia la chat