Palo Alto Medical Foundation

Displaying 1-6 of 6 results

  • Podcasts // Oct 2014

    Migrating From Cisco ASA to Palo Alto Networks

    In this podcast, the speaker will show how easy it is to move to a next-generation security platform. The speaker also explains about the fundamental differences between Cisco ASA and Palo Alto Networks, and share migration best practices, examples and case studies.

    Provided By Palo Alto Medical Foundation

  • Podcasts // Sep 2014

    Rethinking Mobile Security

    In this podcast, the speaker will discuss the changing threat landscape for mobile platforms, and how this drives a corresponding set of new requirements for security. Instead of being shackled to past principles and philosophies, learn about approaches to security that enable and extend (rather than restrict) access to mobile...

    Provided By Palo Alto Medical Foundation

  • Podcasts // Sep 2014

    Modernizing Network Security in SCADA and Industrial Control Systems

    In this podcast, the speaker will discuss the nature of both existing and emerging cyber threats to ICS and why asset owners need to pay attention to them, strategies and frameworks for defending the user's ICS against these threats and next-generation technologies that enable fine-grain visibility, role-based access control, and...

    Provided By Palo Alto Medical Foundation

  • Podcasts // Sep 2014

    How Evolved \"419 Scammers\" Are Targeting the Enterprise

    In this podcast, the speaker will focus on these key takeaways: Remote Administration Tools (RATs) such as NetWire, that provide complete control over infected systems, silver spaniel attacks are specifically designed to evade traditional antivirus programs and indicators of compromise were observed for the NetWire RAT, and unit 42 recommends...

    Provided By Palo Alto Medical Foundation

  • Podcasts // Jul 2014

    Hiding in Plain Sight - What's Really Happening on Your Network

    Today's cyber threats hide in plain sight amidst the user's network traffic, making them nearly impossible to defend against. In this podcast, the speaker will analyze the intertwined relationship between cyber attacks and applications based on recent data collected from over 2,200 networks. The speaker also gives information on how...

    Provided By Palo Alto Medical Foundation

  • White Papers // Feb 2009

    Playing Favorites: How to Manage Date Conflicts When Some Date Ranges Are Preferred Over Others

    Data with dates often require reconciling conflicting date ranges. Sometimes a set of consecutive, non-overlapping date ranges needs to be created from a set of overlapping date ranges. This is easy when all date ranges are considered equal. However, if some date ranges are preferred over others, more thought is...

    Provided By Palo Alto Medical Foundation

  • White Papers // Feb 2009

    Playing Favorites: How to Manage Date Conflicts When Some Date Ranges Are Preferred Over Others

    Data with dates often require reconciling conflicting date ranges. Sometimes a set of consecutive, non-overlapping date ranges needs to be created from a set of overlapping date ranges. This is easy when all date ranges are considered equal. However, if some date ranges are preferred over others, more thought is...

    Provided By Palo Alto Medical Foundation

  • Podcasts // Jul 2014

    Hiding in Plain Sight - What's Really Happening on Your Network

    Today's cyber threats hide in plain sight amidst the user's network traffic, making them nearly impossible to defend against. In this podcast, the speaker will analyze the intertwined relationship between cyber attacks and applications based on recent data collected from over 2,200 networks. The speaker also gives information on how...

    Provided By Palo Alto Medical Foundation

  • Podcasts // Sep 2014

    How Evolved \"419 Scammers\" Are Targeting the Enterprise

    In this podcast, the speaker will focus on these key takeaways: Remote Administration Tools (RATs) such as NetWire, that provide complete control over infected systems, silver spaniel attacks are specifically designed to evade traditional antivirus programs and indicators of compromise were observed for the NetWire RAT, and unit 42 recommends...

    Provided By Palo Alto Medical Foundation

  • Podcasts // Oct 2014

    Migrating From Cisco ASA to Palo Alto Networks

    In this podcast, the speaker will show how easy it is to move to a next-generation security platform. The speaker also explains about the fundamental differences between Cisco ASA and Palo Alto Networks, and share migration best practices, examples and case studies.

    Provided By Palo Alto Medical Foundation

  • Podcasts // Sep 2014

    Modernizing Network Security in SCADA and Industrial Control Systems

    In this podcast, the speaker will discuss the nature of both existing and emerging cyber threats to ICS and why asset owners need to pay attention to them, strategies and frameworks for defending the user's ICS against these threats and next-generation technologies that enable fine-grain visibility, role-based access control, and...

    Provided By Palo Alto Medical Foundation

  • Podcasts // Sep 2014

    Rethinking Mobile Security

    In this podcast, the speaker will discuss the changing threat landscape for mobile platforms, and how this drives a corresponding set of new requirements for security. Instead of being shackled to past principles and philosophies, learn about approaches to security that enable and extend (rather than restrict) access to mobile...

    Provided By Palo Alto Medical Foundation