ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Palo Alto Networks

  • Solve the MTTR Challenge with ADEM

    Cloud complexity can create network security and performance issues – such as a lack of visibility and poor UX. But with the right monitoring tools, these issues can be mitigated. Watch this webinar to learn how autonomous digital experience management can help you solve the mean time to recovery (MTTR) challenge in your cloud environments.

  • The Next Generation of SD-WAN is Here

    According to Gartner, security and risk management leaders need a converged cloud-delivered secure access service edge (SASE) to address changes brought on by digital business and edge computing. Watch this video to learn more about how next generation SD-WAN can facilitate successful SASE adoption.

  • Why SASE is the Future of IoT Security

    As global headlines indicate, one of the biggest issues impacting organization today is vulnerable IoT devices. So, what do you do about it? You make sure that IoT security is an essential part of your SASE strategy. To learn how to successfully integrate IoT security into your SASE strategy – watch this video.

  • Internet Access, Security for all, Cloud-Delivered

    Organizations are now facing the challenge of secure, reliable connectivity in the era of continued remote/hybrid work. What can they do to stay ahead and keep their workforces productive? Watch this webinar to learn how SASE combines networking and security in the cloud to enable secure access for all users – wherever they are.

  • Demystifying SASE

    According to Gartner and various prediction reports, 43.3% of the global workforce will be mobile by 2023, and by 2024, 60% of enterprises will have implemented SD-WAN. To address this shift, many security leaders are turning to a converged cloud-delivered secure access service edge (SASE). In this video, explore SASE and all it has to offer.

  • Moving Beyond Traditional EDR

    Watch this webinar featuring CTO and former Forrester analyst Josh Zelonis as he presents the case for moving to extended detection and response (XDR) today. He covers key challenges and opportunities, the evolving state of EDR toward XDR, how XDR is changing SOC operations and how to use XDR within your current security architecture.

  • Conforming Network Security to Cloud Native Applications

    Cloud and cloud-native applications are revolutionizing SDLCs and challenging traditional network connectivity and security practices. Watch this presentation to learn more about the impacts of cloud apps on network security, the emergence of lateral movement threats, and best practices for protecting the modern network.

  • Customer Panel: Real-World Cloud Security Advice from the Front Lines

    Watch this webinar to join Alex Williams, Founder & Publisher of The New Stack, as he welcomes a panel of industry-recognized experts for a discussion around why organizations move to the cloud, how to design, build and sustain a cloud security strategy, and more.

  • Cloud Native Threat Matrix to Protect Hosts, Containers and Serverless

    As organizations grow to rely more on cloud capabilities, ensuring protection becomes paramount. Watch this webinar to learn more about the key trends and challenges in securing cloud-native applications and receive an exclusive look at Prisma Access’ new Attack Framework, designed to boost cloud security.

  • Securing Containers with NIST SP 800-190

    Traditional security processes often lack the speed, scale and automation to adequately protect modern containers – which is what led to the publication of NIST SP 800-190. Watch this presentation to learn more about common container security challenges and the importance of NIST SP 800-190.

  • Cloud Security Fundamentals: Why Visibility, Compliance and Governance is Essential in the Cloud

    Cloud computing has become an essential pillar of modern business – but achieving cloud security is an entirely different – and considerably more difficult – task. Watch this presentation to explore the cloud security fundamentals and discover why visibility, compliance and governance is essential in the cloud.

  • Shifting Security Left for a Secure CI/CD Pipeline

    Along with the modernization of cloud, shifting security left is dramatically transforming software development lifecycles. Watch this webinar to learn about modern DevSecOps and discover how to build a secure CI/CD pipeline.

  • Cortex XSOAR Threat Intelligence Management

    Access this white paper guide to learn which features organizations should look for when considering capabilities for threat intelligence management (TIM).

  • Palo Alto Networks Ml-Powered Next-Generation Firewall Feature Overview

    Download this white paper to explore a machine-learning (ML) powered next-gen firewall (NGFW) by Palo Alto Networks, which strives to help you identify new threats, devices and more without relying on fingerprinting or signatures.

  • Decryption: Why, Where, And How

    According to the Google Transparency Report, nearly 95% of traffic uses encryption depending on the platform. However, if uninspected, encrypted traffic leaves organizations blind to security risks contained inside. View this white paper to learn about TLS decryption and how a next-gen firewall (NGFW) can help you meet decryption needs.

  • Find and Stop Cryptojacking Attacks Cortex XSOAR Webinar

    Cryptojacking affects 23% of organizations globally. Organizations leveraging cryptocurrency must know how to defend from cryptojackers in order to protect their business. Watch this in-depth webinar to learn best practices for cryptojacking prevention built around security orchestration, automation and response (SOAR).

  • Has XDR Crossed the Chasm Webinar

    Watch this webinar to go through the evolution of extended detection and response (XDR) and learn why XDR has crossed the chasm as both a product and a product category. Then, see how Cortex XDR from Palo Alto Networks was evaluated against Forrester’s Wave report and round 3 of MITRE ATT&CK.

  • 2021 SANs Panel Discussion - Top Skills Analyst Need to Master

    With an employment rate growing 32% from 2018 to 2028, security analysts must become a master of all trades. But what are the technical and nontechnical skills required in this role? In this this SANS panel discussion, discover the top skills security analysts need to master to be effective at defending their organizations.

  • Carbanak+Fin7: Unpacking the MITRE Round 3 Results Webinar

    In the Round 3 MITRE ATT&CK Evaluation, Cortex XDR was assessed against attack tactics and techniques that have been leveraged by the threat actor groups known as Carbanak and FIN7. After watching this webinar, you will be able to make an unbiased decision on your next EDR-related purchase.

  • Rethinking Threat Intel Management feat. Dark Reading

    According to SANS, 88% of SOCs use cyber threat intelligence for threat detection, and nearly half of organizations with SOCs have a dedicated threat intel team. To learn more about the challenges, opportunities and trends of today’s threat intelligence approaches, watch this webinar.

  • Palo Alto Video – How a CASB Enables Strong SaaS Security

    With the proliferation of SaaS applications, stronger security techniques need to be evaluated. Watch this webinar featuring ESG Senior Analyst John Grady to learn how a CASB approach can help you keep pace with the explosion of SaaS apps and how Palo Alto Networks is aiming to provide the industry’s only integrated CASB.

  • Cloud Security Blind Spots: Detecting And Fixing Cloud Misconfigurations

    The deployment processes and tooling for cloud environments look basically the same as those of on-premises infrastructure, but there are a variety of nuanced differences that can be easy to overlook. Access this white paper to learn 5 common blind spots caused by misconfiguration in cloud security and how to fix them.

  • Complete Zero-Trust Network Security from Palo Alto Networks

    Today’s users need to be able to securely access resources from anywhere – from home, from their campus or on the go. Access this webinar to get a glimpse of a complete zero-trust network security platform offered by Palo Alto Networks. This platform strives to deliver consistent access control & security across all users and devices.

  • Guide To Cloud Security Posture Management Tools

    In the era of multi-cloud environments, ensuring cloud security hygiene starts with good security and compliance posture. This e-guide looks at cloud security posture management (CSPM) tools, unique challenges for multi-cloud CSPM, strategic recommendations, and more. Read on to get started.

  • Transitions Happening around Zero Trust

    We used to implicitly trust certain devices and users based on their location. As the market has shifted towards remote work, that has changed. We imperatively need to adopt the zero-trust architecture more now than ever. With this video, gain insights from experts in the field on how their approaching the challenges with Zero Trust.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences