Event Date: March 10, 2020
Hosted By: Palo Alto Networks
Location: Burlington, MA
As a result of cloud adoption, user mobility, and global expansion, your organization has inevitably changed. Now your branch offices and mobile users are going directly to the cloud for their app and data needs. To keep control of your apps and protect the data within them, your security architecture must match your rapid cloud transformation. The problem is, even though you may be ready, your security architecture may not.
Gartner estimates that 99% of all public cloud failures will be attributed to the customer's inability and lack of experience with securing workloads running in the public cloud. The public cloud creates issues with visibility, compliance drift, and challenges with preventing, identifying, and responding to threats.
Palo Alto Networks will reveal the steps necessary to fully protect your public cloud workloads and your container strategy. We will be hosting an in-person workshop in your area on March 10th.
Registration and Welcome
Presentation - Security Enable your Journey to the Cloud
Hands-on lab — Secure branch offices and mobile users
Mobile users go direct to Cloud
Branch offices go direct to Cloud
Prisma Access Administration
Lunch - Critical Steps to Protecting Your Public Cloud Workload
Hands-on-exercise: Capture the Flag
Your mission is to identify security issues and misconfigurations created in a public cloud environment.
Participants will use Prisma Cloud to identify unsecured configurations, policy violations, anomalous behavior, and other threats within a predetermined amount of time.
Hands-on lab – Secure SaaS applications
Cloud application visibility and control
Cloud application data protection and compliance
Prisma SaaS administration
Join our Cloud Security In Motion workshop for hands-on experience to learn how to accelerate your journey to the cloud, while gaining unrivaled risk visibility and governance across data and applications.
Palo Alto Networks(r) Traps(tm) advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks. Learn more about how to minimize endpoint infections by blocking malware, exploits and ransomware with Traps.
Organizations worldwide are expanding their cloud and virtualization initiatives beyond traditional data center and public cloud deployments. New initiatives include security as an NFV component or as a more complete multi-tenancy solution. The VM-Series supports the same next-generation firewall an...
Palo Alto Networks(r) Security Operating Platform prevents successful cyberattacks by harnessing analytics to automate routine tasks and enforcement. Tight integration across the platform, and with partners, simplifies security so you can secure users, applications and data.
Law enforcement agencies are adopting new digital technologies to combat crime trends, increase public safety and reduce operating costs. During this evolution, effective cybersecurity is critical to protecting law enforcement data and maintaining resilient operations. This use case reviews how seve...
As AWS becomes the dominant deployment platform for your business-critical applications, protecting the increased public cloud footprint from threats, data loss and business disruption remains challenging. The VM-Series on AWS solves these challenges, protecting your AWS workloads with next-generati...
The appeal of SaaS applications, such as Office 365®, G Suite, Box and Salesforce® is growing, but so are the hidden threats in SaaS offerings: costly data leaks, regulatory noncompliance, malware propagation and so on.
Global expansion, mobile workforces, and cloud computing are changing the ways organizations implement and deploy applications. Get the protection you need, where you need it, with Prisma™ Access (formerly GlobalProtect™ cloud service). A generational step forward in cloud-delivered security, Pr...
Palo Alto Networks lets organizations confidently deploy applications in the cloud by delivering the industry’s most advanced security and compliance capabilities across multi-cloud environments. Delivered through inline, API- and host-based protection technologies working together, these security...