Vídeos

Filter Results By

Filter by Type

Filter by Topic

Filter by Product

Viewing All Results

Most Viewed

Cómo ofrece Palo Alto Networks control y visibilidad de aplicaciones de forma más eficaz que otros productos basados en puertos.

425 Vistas
Vídeo del cliente
Spyders Inc. | August 7, 2014, 05:00 PM

Spyders Inc. delivers business relevant IT security and networking expertise and solutions to over 500 mid and large size organizations across North America. Spyders delivers value to clients by supplying, designing, integrating and managing a portfolio of best-in-class solutions and services our clients want and need.

Vídeo del cliente
Exeter Finance | August 7, 2014, 05:00 PM

Exeter Finance works with thousands of franchised dealers nationwide to make car ownership possible for more people. The company works with its customers to become a trusted partner in car ownership – a partner who guides them along the way, provides tools to keep them informed, and helps them establish a payment history that can impact their credit score.

Vídeo del cliente
Burwood Group | August 7, 2014, 05:00 PM

Burwood Group is a consulting firm that bridges business strategy and technology solutions. Headquartered in Chicago, Illinois Burwood Group serves local, national, and international clients.

Vídeo del cliente
McLean County Unit School District No. 5 | August 7, 2014, 05:00 PM

McLean County Unit School District No. 5 employs approximately 1,650 full and part time staff members to educate more than 13,600 students. The district consists of more than 214 square miles, with 16 elementary, 4 junior high and 2 high school buildings, 1 early learning center, and 1 vocational training site.

Vídeo del cliente
Motorola Solutions | August 7, 2014, 05:00 PM

Motorola Solutions connects people through technology. Businesses and government agencies around the world turn to Motorola Solutions innovations when they want highly connected teams that have the information they need throughout their workdays and in the moments that matter most to them.

Vídeo del cliente
Brigham-Young University - Hawaii | August 7, 2014, 05:00 PM

Brigham-Young University – Hawaii (BYU–Hawaii) is a small campus of intercultural leadership development, where a diverse population of over 2,500 students representing over 70 countries live, study and work together.

Vídeo del cliente
Revera Inc. | August 7, 2014, 05:00 PM

Revera helps more than 30,000 seniors and other clients to live their lives to the fullest. With 50 years of experience, Revera has a deep understanding of the seniors they serve. Through its vibrant retirement communities, long term care homes, U.S. nursing and rehab centres, and dedicated home health team, Revera offers choices that enable its residents and clients to continue to be their best.

Webcast
July 30, 2014, 08:00 AM

Today’s cyber threats hide in plain sight amidst your network traffic, making them nearly impossible to defend against. These advanced threats use applications as their infiltration vector, exhibit application-like evasion tactics and they leverage commonly used network applications for exfiltration.

In this webinar we analyze the intertwined relationship between cyber attacks and applications based on recent data collected from over 2,200 networks in North and South America.

Webcast
July 13, 2014, 08:00 AM

Today’s cyber threats hide in plain sight amidst your network traffic, making them nearly impossible to defend against. These advanced threats use applications as their infiltration vector, exhibit application-like evasion tactics and they leverage commonly used network applications for exfiltration.

Watch this webcast where we will analyze the intertwined relationship between cyber attacks and applications based on recent data collected from over 5,500 networks worldwide.

Vídeo de demostración
Palo Alto Networks | Santa Clara, CA | July 11, 2014, 02:41 PM

If you’re serious about security for mobile devices, learn more about GlobalProtect from Palo Alto Networks. In this demonstration, get an overview of the technology and a demonstration of how it works to manage the device, protect the device and control the data.

Recurso
July 7, 2014, 08:00 AM

Palo Alto Networks hat heute neue Forschungsergebnisse darüber veröffentlicht, wie Cyber-Angreifer gängige Business-Anwendungen ausnutzen, um Sicherheitskontrollen zu umgehen. Unsere Studie basiert auf der Analyse erfasster Traffic-Informationen von 5.500 Netzwerken und Milliarden von Logdaten über einen Zeitraum von zwölf Monaten. Sie liefert Unternehmen und Sicherheitsexperten wertvolle Einblicke, wie ihre Sicherheitsstrategie neu bewertet und verstärkt werden sollte.

Bitte loggen Sie sich auf der rechten Seite ein um sich das Webinar jetzt anzusehen!

Recurso
July 1, 2014, 08:00 AM

En se fondant dans votre trafic réseau, les cyber menaces actuelles sont presque impossible à éliminer. Ces menaces avancées utilisent les applications comme vecteur d'infiltration, adoptent des technique 
d'évasion typiques et utilisent des protocoles réseau standards pour l'exfiltration de données. 

Nous vous invitons à visualiser notre webinar pendant lequel nous analyserons les relations intimes qui nouent applications et cyber-attaques grâces aux données collectées sur 5500 réseaux informatiques dans le monde entier.

Recurso
June 20, 2014, 08:00 AM

Nachrichten über Malware, Cyber-Attacken und Sicherheitshinweise erscheinen mittlerweile fast täglich in den Medien. Sei es der Cyber Angriff auf das deutsche Zentrum für Luft- und Raumfahrt oder das SSL-gesicherte Server plötzlich von einer Schwachstelle betroffen sind. Als „normaler“ Anwender steht man diesen modernen Bedrohungen eher hilflos gegenüber und versucht mit einzelnen Hilfsmitteln die Sicherheit wieder herzustellen. Unser Webinar soll Ihnen einen Überblick über moderne Bedrohungen geben und Lösungsmöglichkeiten aufzeigen, wie sich ein Unternehmen gegen moderne Angriffe heutzutage schützen kann.

Vídeo del cliente
SPAR Austria Group | January 13, 2014, 03:25 PM

SPAR Austria Group, one of the most renowned grocery store chains in Austria, has selected and deployed Palo Alto Networks security platforms to identify, control, and safely enable applications on their network.

Vídeo del cliente
Palo Alto Networks | January 13, 2014, 09:15 AM

Palo Alto Networks customers talk about WildFire, automated threat protection and the platform advantage.

Vídeo del cliente
Palo Alto Networks | January 13, 2014, 09:00 AM
Recurso
TecnaEditrice | November 11, 2013, 12:00 AM

Antonio Iannuzzi habla acerca del enfoque, visiones y tendencias de Palo Alto Networks.

Historial del cliente
Olav Thon Group | April 5, 2013, 03:27 PM

Olav Thon Group is Norway's largest private property owner and developer. The Group owns 420 properties in Norway and 25 abroad. "Palo Alto is user friendly, easy to operate and first among firewalls. It gives total overview of all applications running on our network. It is very easy to provide certain applications to specified user or group."

Recurso

Los hackers y los usuarios finales disponen de una serie de tecnologías que les permiten ocultar su tráfico de las soluciones de seguridad de red tradicionales. Vea cómo las capacidades únicas de nuestra App-ID le permiten encontrar y controlar estas aplicaciones.

Recurso

Reed es el sitio web de búsqueda de empleo líder del Reino Unido. Más de 2 millones de solicitantes de empleo visitan reed.co.uk cada mes, y cada día se publican más de 45.000 solicitudes de empleo. "Lo que hace Palo Alto Networks me permite poner todo en la misma 'caja'. Tengo un gasto, tengo un gasto de gestión y puedo reducir el gasto total de propiedad".

Recurso

Este es un vídeo de demostración y descripción general del firewall de nueva generación de Palo Alto Networks

Recurso

Cómo ofrece Palo Alto Networks la habilitación de aplicaciones de forma segura, primero autorizando la aplicación y a continuación explorándola para buscar amenazas y proteger de este modo a los usuarios y a su red.

Vídeo de demostración

Habilite su plataforma para empezar a enviar malware a un entorno virtual centralizado basado en la nube en el que se pueden ejecutar y observar activamente archivos nuevos y desconocidos en busca de conductas maliciosas.

Recurso

Una entrevista con Mark Starry, director de arquitectura y seguridad en Capital Region Health Care, acerca de por qué escogieron los firewalls de nueva generación de Palo Alto Networks en vez de los firewalls de Check Point.

Recurso

Una entrevista con Richard TSO, director principal de infraestructura de TI en ZipRealty, acerca de por qué escogieron los firewalls de nueva generación de Palo Alto Networks en vez de los firewalls de Check Point.

CHAT
¿Alguna duda?
Charla con quien puede responderte.
Iniciar chat ahora