网络直播

Filter Results By

Filter by Type

  • 网络直播 (90)
  • 视频 (22)

Filter by Topic

Filter by Industry

Filter by Product

Viewing All Results

Most Viewed

September 2, 2014, 08:00 AM

Unit 42, the Palo Alto Networks threat intelligence team, has identified a series of attacks codenamed “Silver Spaniel”, emanating from Nigerian actors against our customers. These attackers, formerly associated with 419 scams targeted at unsuspecting individuals, are now using many of the same tools that cyber crime and espionage groups have deployed in the past. These actors represent an emerging threat to the enterprise.

34 视图
网播
September 8, 2014, 08:00 AM

7月と8月に上半期のセキュリティ市場の振り返りのWebセミナーを実施しました。

実際の被害例をあげて実施したため、参加者の方に高評価されるセミナーとなりました。

网播
September 8, 2014, 08:00 AM

〜最近メディアを騒がせている情報漏えい事件について〜

『ゼロトラストネットワークセキュリティ』を構築してシステム面から企業を守る!!

緊急Webセミナーと銘打って、国内大手教育事業者様の情報漏えい事件を参考に、システム面から企業を徹底的に守る方法についてご紹介しました。

网播
September 2, 2014, 08:00 AM

Unit 42, the Palo Alto Networks threat intelligence team, has identified a series of attacks codenamed “Silver Spaniel”, emanating from Nigerian actors against our customers. These attackers, formerly associated with 419 scams targeted at unsuspecting individuals, are now using many of the same tools that cyber crime and espionage groups have deployed in the past. These actors represent an emerging threat to the enterprise.

网播
August 12, 2014, 08:00 AM

In this segment, Palo Alto Networks and CSC discuss Continuous Diagnostic and Mitigation (CDM) and the importance of an integrated platform to improve response times to zero days and APTs.

网播
August 12, 2014, 08:00 AM

In this segment, Palo Alto Networks and CSC discuss how Continuous and Diagnostic Mitigation (CDM) relates to the existing Einstein program.

网播
August 12, 2014, 08:00 AM

In this segment, Palo Alto Networks and CSC discuss Continuous Diagnostic and Mitigation (CDM) requirements and how Palo Alto Networks and CSC work together to meet them.

网播
July 30, 2014, 08:00 AM

Today’s cyber threats hide in plain sight amidst your network traffic, making them nearly impossible to defend against. These advanced threats use applications as their infiltration vector, exhibit application-like evasion tactics and they leverage commonly used network applications for exfiltration.

In this webinar we analyze the intertwined relationship between cyber attacks and applications based on recent data collected from over 2,200 networks in North and South America.

网播
July 13, 2014, 08:00 AM

Today’s cyber threats hide in plain sight amidst your network traffic, making them nearly impossible to defend against. These advanced threats use applications as their infiltration vector, exhibit application-like evasion tactics and they leverage commonly used network applications for exfiltration.

Watch this webcast where we will analyze the intertwined relationship between cyber attacks and applications based on recent data collected from over 5,500 networks worldwide.

网播
July 11, 2014, 08:00 AM

Las Amenazas Persistentes Avanzadas (APTs) son usadas para comprometer organizaciones en todo el mundo con métodos de ataque cada vez más sofisticados, persistentes y evasivos.

资源
July 7, 2014, 08:00 AM

Palo Alto Networks hat heute neue Forschungsergebnisse darüber veröffentlicht, wie Cyber-Angreifer gängige Business-Anwendungen ausnutzen, um Sicherheitskontrollen zu umgehen. Unsere Studie basiert auf der Analyse erfasster Traffic-Informationen von 5.500 Netzwerken und Milliarden von Logdaten über einen Zeitraum von zwölf Monaten. Sie liefert Unternehmen und Sicherheitsexperten wertvolle Einblicke, wie ihre Sicherheitsstrategie neu bewertet und verstärkt werden sollte.

Bitte loggen Sie sich auf der rechten Seite ein um sich das Webinar jetzt anzusehen!

资源
July 1, 2014, 08:00 AM

En se fondant dans votre trafic réseau, les cyber menaces actuelles sont presque impossible à éliminer. Ces menaces avancées utilisent les applications comme vecteur d'infiltration, adoptent des technique 
d'évasion typiques et utilisent des protocoles réseau standards pour l'exfiltration de données. 

Nous vous invitons à visualiser notre webinar pendant lequel nous analyserons les relations intimes qui nouent applications et cyber-attaques grâces aux données collectées sur 5500 réseaux informatiques dans le monde entier.

资源
June 20, 2014, 08:00 AM

Nachrichten über Malware, Cyber-Attacken und Sicherheitshinweise erscheinen mittlerweile fast täglich in den Medien. Sei es der Cyber Angriff auf das deutsche Zentrum für Luft- und Raumfahrt oder das SSL-gesicherte Server plötzlich von einer Schwachstelle betroffen sind. Als „normaler“ Anwender steht man diesen modernen Bedrohungen eher hilflos gegenüber und versucht mit einzelnen Hilfsmitteln die Sicherheit wieder herzustellen. Unser Webinar soll Ihnen einen Überblick über moderne Bedrohungen geben und Lösungsmöglichkeiten aufzeigen, wie sich ein Unternehmen gegen moderne Angriffe heutzutage schützen kann.

网播
May 30, 2014, 08:00 AM

APTs are hard to find and an increasing threat to enterprise security. Finding them takes coordination between device feeds combined with the intelligence to connect those dots. Where along the chain of attack can these threats be detected and stopped? How does the threat spread if left unchecked and what would it cost? Is your network secure enough? The answers to these enterprise-critical security questions will be discussed in this webcast.

网播
May 28, 2014, 08:00 AM

Advanced Persistent Threats (APTs) are being used to compromise organizations around the globe with increasing sophistication, persistence, and evasive attack methods. Join Palo Alto Networks® for a live webcast with Q&A that will take you straight to the heart of the cyber underground.

网播
April 10, 2014, 12:00 AM

How to Safely Enable Mobile Devices for Business Use There’s no question that mobile devices are making an impact to how and where we work. However, the risks that mobile devices face continues to grow, which drives a corresponding set of requirements for security. So what are the most critical priorities in mobile security today? In this session, take a look at the big picture in mobile security, dive into the specifics for the risks that mobile devices face and learn about how to safely enable mobile devices for use in business environments.

网播
April 2, 2014, 12:41 PM

Bei der Modernisierung von Rechenzentren spielt Virtualisierung eine entscheidende Rolle. Hinzu kommen verschärfte Anforderungen in punkto Datenschutz und neue mobile Zugriffswege. Unser Webcast soll Ihnen einen Überblick über die Anforderungen und die Umsetzung konkreter Sicherungsmassnahmen im Rechenzentrum geben.

网播
April 2, 2014, 12:41 PM

Learn how the Palo Alto Networks enterprise security platform protects organizations from known threats, zero-day exploits, unknown malware, and the complete spectrum of APTs.

网播
April 2, 2014, 12:41 PM

Join us for the “Migrating from Juniper to Palo Alto Networks” webinar. We’ll show you how easy it is to move to a next-generation security platform. Our product experts and Consulting Services team will explain the fundamental differences between Juniper and Palo Alto Networks, and share migration best practices, examples and case studies.

网播
April 2, 2014, 12:41 PM

Компания Palo Alto Networks продолжает развитие своих продуктов безопасности, которые позволяют корпоративным Заказчикам противостоять современным кибератакам, угрозам и вирусам нулевого дня (ATP).

Релиз новой ОС Palo Alto Networks 6.0 добавил порядка 60 новых дополнительных функциональных возможностей для плотной интеграции и предоставления технологий защиты в сфере виртуализации, мобильных устройств и сетей SDN.

资源
September 9, 2013, 05:00 PM

In this webinar we'll show you how easy it is to move to a next-generation security platform. Our product experts and Consulting Services team will explain the fundamental differences between Cisco ASA and Palo Alto Networks, and share migration best practices, examples and case studies.

资源
May 1, 2013, 05:10 PM

Watch this technical webinar to learn how to implement network segmentation best practices with Palo Alto Networks Next-Generation Firewalls. Implemented effectively, network segmentation can reduce the scope of compliance, isolate vulnerable parts of the network and decrease the impact of security breaches.

资源

Facebook or SharePoint. Which is more valuable to your business? Which is safer to use? The answer is…it depends. Social media applications such as Facebook, LinkedIn, and Twitter are increasingly powering organizations, and, we are becoming more dependent on them. But security and compliance concerns remain paramount. One thing we know for certain, based on actual network traffic in enterprises, is that attempts to block social media applications can impede your business and are often futile anyway. So what should you do?

资源

This combined solution uses Palo Alto Networks WildFire and Bit9 capabilities to identify new malware across all network traffic including SSL and suspicious files originating from the endpoint or USB devices.

资源

Wildfire detecta y bloquea ataques dirigidos (APTs) y malware desconocido, así como las conexiones de mando y control (C&C) hacia el exterior. Convirtiendo rápidamente amenazas desconocidas en nuevas firmas reconocidas, Wildfire ofrece una protección casi en tiempo real a nivel mundial en tan sólo 30 minutos.

资源

In this webinar, we will identify security challenges in virtualized datacenters and show you Palo Alto Networks comprehensive approach to address them.

聊天
有问题吗?
与我们沟通寻求答案。
立即聊天