Fuel Webinars

Stay "In-The-Know" with Fuel Webinars

Fuel webinars are an interactive, educational series of online technical sessions featuring industry experts from among our members, Palo Alto Networks®, our partners and other cybersecurity experts. We'll share the latest partner updates, threat prevention tips, industry news, and more. See what's coming up or check out our archive.

Future Webinars:

Leading Automation for Next Generation Firewall Policies

tufin logo_resized.png

Tuesday, December 10, 2019
11:00 a.m. - 12:00 p.m. CT / 12:00 p.m. - 1:00 p.m. ET

Presenter: Bill Coglianese, Pre-Sales Engineer, Tufin

Next generation Firewall policies provide superior security but can be complex to manage manually. Automating policy changes can save time and efforts, accelerate delivery, and minimize mistakes and misconfigurations.

Join this webinar to learn what you can expect from the leading automation for NGFW policies:

  • Advanced support for dynamic objects
  • The broadest set of automation workflows for access changes, FW cleanup, rule recertification, and other tasks
  • Easy to configure processes to directly align with your standards

[Register for this Webinar]

Recent Webinars:

Maximize Your Palo Alto Investment with Intelligent Automation

AlgoSec_logo500px.png

Presenter: Kyle Wickert, Worldwide Strategic Architect, AlgoSec

You’ve invested in Palo Alto Networks solutions but how can you take advantage of all its capabilities and use it to its full potential to maximize your ROI? In this webinar, Kyle Wickert, AlgoSec’s Worldwide Strategic Architect, will help you utilize intelligent automation to get the most out of your Palo Alto Networks investment. Join this live webinar and become a Palo Alto power-user. Learn how to:

  • Gain automation and visibility into your multi-vendor network
  • Automate policy optimization and risk assessment for your network security environment.
  • Enhance visibility and exercise greater control over your hybrid and heterogeneous network
  • Tie application connectivity needs to network security policies, reduce planning time and costs for network change automation
  • Intelligently push security policy changes to your network devices, whether on premises or in public or private clouds
  • Assess risk and ensure regulatory compliance across the entire enterprise environment

Click here to listen to the recording

Complete Network Visibility and Security for Mission-Critical IT Operations

GarlandLogo.png

Presenters: John Rampart, Systems Engineer, Garland Technology, and O.J. Wolanyk, Sales Engineer, Flowmon Networks

Using a foundation of visibility with Garland Technology’s network TAPs and packet brokers combined with Flowmon’s monitoring Probes and Collectors, provides complete traffic analysis with detailed statistics on network communication of IP flows (NetFlow v5/v9, IPFIX).This combined solution provides a way to not only monitor traffic in real-time, but to take in alerts from the Palo Alto NGFW and provide actionable intelligence. See how the combined solution from Palo Alto Networks, Garland Technology, and Flowmon can detect infected devices, malicious activities, and keep the network up at all times.

Join Garland Technology, a Fuel Founding Partner and Flowmon to discover how to achieve 100% network visibility.

In this solution based webinar, we will review:

  • Network connectivity best practices
  • How Aggregation can add value by reducing the number of links to monitor
  • How Bypass TAP’s reduce network downtime for NGFW deployments
  • Live demo of how Flowmon’s Probes monitor identifies vulnerable traffic

Click here to listen to the recording

Secure Digital Transformation Best Practices: Why Trust, Integrity, and Control are More Important Today Than Ever Before

nCipher-EDC-logo-rgb.jpg

Presenter: Juan Asenjo, Ph.D., Director of Product, Solutions and Partner Marketing – nCipher Security

Today’s interconnected business environment and data-driven economy depend on trust. As a critical resource, the security of data in storage, transit, and use is vital. Organizations must protect themselves from breaches that can affect their reputation and capitalize on using their data to stay competitive. Trusting systems to protect data integrity and derivative insights, organizations must stay in control.

Technologies help protect data from the point of collection, through aggregation and analysis, to the time action is taken on analytical results. From credential management, digital signing, encryption, tokenization, cloud deployments, and analytics, cryptographic tools provide mechanisms to protect data. However, underpinning these processes, cryptographic keys must be protected and managed properly.

This webcast examines best practices for sound data protection strategies that help you achieve digital transformation with confidence. Our speaker, Juan Asenjo from nCipher Security, an EDC company, identifies the challenges faced by organizations when collecting and using increasing amounts of data. He also highlights the need to maintain confidentiality and integrity, and ensure compliance with data privacy requirements.

Join this webcast to learn:

  • Importance of trusted devices, data, and analytics.
  • Critical aspects of data confidentiality and integrity.
  • Establishing a root of trust to manage cryptography.

Click here to listen to the recording

Cloud Networking Bootcamp: Securing your AWS network with Aviatrix and Palo Alto Networks VM Series Firewall

logo-aviatrix.jpg

Presenter: Rod Stuhlmuller, VP Marketing, Aviatrix

Join cloud networking experts from Aviatrix and Palo Alto Networks to learn how organizations are creating a cloud network and security architecture that meets their requirements for scale, performance and automation. This session will detail best practices for creating a modern cloud architecture, implementing design patterns for key use cases in AWS, and using time-saving operational and troubleshooting techniques.

Technical discussion topics will include how to:

  • Embrace and extend the network and security services already available from AWS
  • Integrate your Palo Alto VM-Series Firewall into your AWS network architecture
  • Use secure Transit networking services to integrate cloud VPC and on-prem resources
  • Implement high performance encryption for data-in-motion
  • Gain visibility, traceability and efficiently troubleshoot your cloud network

There will be plenty of time for live Q & A following the presentations.

Click here to listen to the recording

Drive Innovation with a Strong Security Posture

firemon.jpg

Presenter: Elisa Lippincott, Director of Product Marketing, FireMon

Businesses today must move at digital speeds. Going head-to-head with digital native competitors, enterprises have to evolve rapidly in areas ranging from time to market to product quality and features to business model innovation.

This puts intense pressure on IT and security organizations—often burdened with legacy systems—to deliver unprecedented business agility. At the same time, regulatory requirements are growing almost as fast as cyberattacks and cyberthreats. How do you balance the risk of not getting new application services or changes to market fast enough against the risk of a breach?

FireMon gives IT and security teams innovative ways to move at velocity without sacrificing an iota of security. FireMon automation fits into your existing models and processes, so you can make incremental changes internally while your business acts disruptively in the marketplace.

In this webinar, we’ll cover:

  • Automated responses for triggers such as a new app or service, routine changes in an app or a service, or new security threats
  • Use cases for automation in policy management (e.g., automating gold standard best practices, global overarching rules, and rapid approval processes to ensure speed of deployment)
  • How automation can help you leverage innovation without introducing security and compliance risk

Click here to listen to the recording.

Technology Deep Dive of In-Network Threat Visibility with Attivo Networks Coupled with Palo Alto Networks Network-Level Blocking

Attivo_CorpR.png

Presenter: Joseph Salazar, Technical Marketing Engineer, Attivo Networks

Organizations are challenged with in-network threat detection and identifying illicit communications to an external party. The Attivo ThreatDefend Platform excels at detecting such activity and integrates with the Palo Alto Networks family of firewalls to block outbound connections or internal movement.

This technical deep dive will discuss how mutual customers of Attivo Networks and Palo Alto Networks can benefit with accurate in-network threat visibility coupled with network-level blocking.

In this webinar you will:

  • Learn the configuration requirements for the integration
  • See a demonstration of an automatic firewall blocklist addition and removal
  • Understand automation with Attivo ThreatOps playbooks and Palo Alto Networks/Demisto automation

Click here to listen to the recording.

How to Identify Vulnerable Traffic at the Edge of Your Network

GarlandLogo.png

Presenters: Ben Cowan, Sr. Director, Solutions Engineering​, Garland Technology, and Scott Clement, Senior Product Manager, Tenable

Palo Alto Networks offers best-in-class NGFW’s, however like all inline tools, present a possible point of failure. By deploying a NGFW with a Garland Technology inline edge security bypass TAP, concerns of network interruption are eliminated. Tenable’s’ Nessus Network Monitor has unique capabilities that allows scalable security at the edge of your network, detecting and decrypting the packet traffic. This combined solution ​provides a way to not only monitor whole packet traffic in real-time, but to take in alerts from the ​Palo Alto​ NGFW and provide actionable intelligence. ​See how the combined solution from Palo Alto Networks, Garland Technology, and Tenable can reduce network downtime, and give users granular access to the traffic in your network.

Join Garland Technology, a Fuel Founding Partner and Tenable to discover how to identify vulnerable traffic at the edge of your network.

In this security solution based webinar, we will review:

  • Network TAP best practices
  • How Bypass TAP’s reduce network downtime for NGFW deployments
  • Live demo of how Tenable’s Nessus Network Monitor identifies vulnerable traffic

Click here to listen to the recording.

From Security Bottleneck to Business Enabler

firemon_logo_black_color.png

Presenter: Tim Woods, VP, Technology Alliances, FireMon

Security’s influence on organizational structure is accelerating exponentially. In today’s network security environment, moving to a hybrid cloud infrastructure is a critical step needed to drive innovation and ensure competitive advantage. As application development takes the driver’s seat, security cannot stall progress it must come along for the ride.

During this presentation, Vice President of Technology Alliances, Tim Woods, will discuss how thought leaders are migrating to the hybrid cloud and how they leverage Palo Alto firewalls and automation with FireMon to streamline flexibility, scalability, centralized policy management, and automation. Woods will give an overview of initiatives to shift security to a business enabler:

  • Lay the groundwork to support high-availability in on-premise and virtual environments
  • Removing rule redundancy and ensure automation for recertification
  • Audit and compliance management/reporting of security policies – PCI, SOX, etc.

Woods will also offer tips on how enterprises can plan for unique challenges when transitioning to a hybrid cloud environment, and how the integrated FireMon and Palo Alto Networks solution make it easy to on-board firewalls, reduce network complexity and avoid chaos.

Click here to listen to the recording.

Automating Security Analysis and Triage of NGFW, Traps and Cortex Data with Respond Software

Respond-Logo-Square-no-SOFTWARE.jpg

Presenter: Mike Epplin, Presales Engineer, Respond Software

Writing SIEM Rules and monitoring detection consoles is out. Not only do we not like it, it hasn’t proved to be particularly effective. The Respond Analyst is a new kind of analyst that improves the capacity and capability of any security team – without adding more burden to an already overworked team. Powered by Robotic Decision Automation (RDA), the Respond Analyst is ideal for Palo Alto Networks NGFW, Traps and Cortex customers that are collecting meaningful security data, but struggle with having the manpower to properly analyze and triage security incidents.

Join us to learn: 

  • How RDA helps security analysts and first responders stop doing the tasks they dislike the most
  • How RDA eliminates concerns of ‘unattended alerts’ and missed clues by analyzing more security data – without filters or tuning
  • How adding web filter data stream to frontline analysis improves the accuracy of real time escalations

We will also share information about the no obligation proof of concept programs that we offer that provide the experience and impact the Respond Analyst has on day to day security operations.

Click here to listen to the recording.

Air Traffic Control for NGFW: Auto-Navigate Tricky Conditions for Firewall Health

indeni.png

Presenter: Jim MacLeod, Technical Product Marketing Manager, Indeni

PANW provides good device visibility in their UI and management tools, but unexpected obscure conditions can threaten to take traffic down. Learn ways to create your own air traffic control to provide measurements to sustain your confidence in your firewall and keep your network up.

Click here to listen to the recording.

Automatic Configuration Changes and Deep Application Monitoring with BackBox

backbox.jpg

Presenter: Chanoch Marmorstein, Direct of Product Management, BackBox

How many of us spend most of our efforts dealing with urgent issues in our security environments, which leaves our “to-do” list growing? How much more could we accomplish if we automated these tasks? Join us as we look at Palo Alto devices and see how to implement these practices in your environment.

During this webinar we will:

  • Learn how you can automate the management and validation of your Palo Alto device configurations
  • Show how deep application monitoring can help organize your infrastructure
  • Learn how implementing an Intelligent Automation solution will help to increase your organization’s operational efficiency, reliability and visibility while significantly reducing overall risk.

Click here to listen to the recording.

How to Intelligently Automate Your Upgrades and Configuration Validation for Palo Alto Devices

backbox.jpg

Presenter: Chanoch Marmorstein, Direct of Product Management, BackBox

BackBox’s Intelligent Automation solution will help increase your organization’s operational efficiency, reliability and visibility while significantly reducing overall risk on your network and security devices. Join us as we look at your Palo Alto devices and see how to implement these practices in your environment.

During this webinar we will:

  • Show you how automating your device upgrades is beneficial
  • Learn why management and validation of your device configurations is critical
  • Identify the health of your infrastructure using IntelliChecks

Click here to listen to the recording.

Improve Network Visibility to Enhance Remediation and Resolve Vulnerability

gar.jpg

Presenters: Ben Cowan, Director of Systems Engineering, Garland Technology and Rick Aguirre, CEO, Cirries Technologies

Palo Alto Networks offers best-in-class NGFW’s, however like all inline tools, present a possible point of failure. By deploying a NGFW with a Garland Technology inline edge security bypass TAP, concerns of network interruption are eliminated. Taking the analysis of packet data one step further requires the ability to compare meta data to historical baseline behavior. ​Cirries’ unique capabilities allows automated detection and response to anomalies including cloud and hybrid cloud environments. ​This combined solution ​provides a way to not only monitor whole packet traffic in real time, but to take in alerts from the ​Palo Alto​ NGFW and provide actionable intelligence. ​See how the combined solution from Palo Alto Networks, Garland Technology, and Cirries can reduce network downtime, and give users granular access to critical forensic and security information.

Join Garland Technology, a Fuel Founding Partner and Cirries Technologies to discover how to improve network visibility to enhance remediation and resolve vulnerability. In this security solutions based webinar, we will review:

  • How Bypass TAP’s reduce network downtime for NGFW deployments
  • Unique mapping of packet data into wire or meta data in real time
  • Comparisons to historical baseline behavior in cloud and hybrid cloud environments

Click here to listen to the recording.

Beyond Panorama: End-to-End Policy Management

tufin logo_resized.png

Presenters: Joe Schreiber, Director of Technical Business Development, Tufin and Dan Rheault, Senior Product Marketing Manager, Tufin

Panorama provides a number of critical features for securing the enterprise, but rarely is the network comprised of just one vendor. And the ability to consistently and accurately apply configuration changes across multiple vendors and multiple devices is challenging. The result can be missed SLAs or worse, increased exposure to a network attack.

Join this webinar featuring Tufin’s product and technical experts to understand how you can manage your entire network security policy through a single pane of glass while leveraging the features of Panorama. Key takeaways include: 

  • Gaining visibility across your entire network, both physical and virtual
  • Optimizing your existing security policy
  • Automating all changes based on security policy

And for those using Demisto for Security Operations, we’ll also cover the Tufin-Demisto integration that empowers security analysts with network policy, topology, and network visualizations to make informed decisions during incident response.

Click here to listen to the recording.

Three Deadly Dragons in the Cloud and How to Slay Them 

SumoLogic_Logo_.png

Presenter: Stefano Paoletti, Director of Product Management, Security Analytics

Dragon #1: Legacy Silos Between IT Ops and Security teams
Dragon #2: Security Bias on Infrastructure vs. Applications Insights
Dragon #3: Security as a Department of Shame/Blame vs. a Shared Measure of Quality

In this webinar, we will review how to quickly identify these potential dragons (current or future) and review how others have slain them to accelerate their migration to the cloud, break down traditional silos, integrated workflows (DevSecOps), and democratized security and compliance insights across the organization.

Click here to listen to the recording.

Build an Active Defense with Palo Alto Networks and Deception Technology

Attivo_CorpR.png

Presenter: Joseph Salazar, Chief Deception Engineer, Attivo Networks

Palo Alto Networks combined with Deception technology creates a powerful active defense for the efficacy of in-network threat detection. This session provides insight into how organizations are using deception technology together with Palo Alto Network to accelerate the incident response process, develop threat intelligence, help reduce information security risks, and build an Active Defense.

Key Learnings:

  • Brief overview of Deception Technology
  • How Palo Alto Networks and Attivo integration fits together to reduce risk within standard security frameworks (NIST CSF, ISO 27000 family)
  • Applying Palo Alto Networks and Deception technology for an Active Defense

Click here to listen to the recording.

Visualize Your Network with NGFW Management Best Practices, Full-Payload Packet Recording, High-Speed Search and Analytics

Garland.png

Presenters: Greg Zemlin, Product Manager, Garland Technology; Michael Francisco, Chief Technology Officer, Quantea

Following best practices for inline and out-of-band tool deployments allows user to get the most out of their security/monitoring solutions. Palo Alto Networks offers the best-in-class NGFW’s and deploying these with an inline edge security bypass TAP can eliminate concerns of network interruptions. Additionally, providing a way to not only be able to monitor whole packet traffic in real time, but take in alerts from the Palo Alto NGFW and be able to provide actionable intelligence. With over 160+ supported applications and protocols, Palo Alto will be able to leverage insight into fast spreading protocols for IoT, Blockchain and 5G. See how the combined solution from Palo Alto Networks, Garland Technology, and Quantea can reduce network downtime and give users granular access to critical forensic and security information.

Join Garland Technology, a Fuel Founding Partner and Quantea to discover how to Provide Operational Insight and Security with Complete Network Visibility and high-speed search and analytics.

In this security solutions based webinar, we will review:

  • How Bypass TAP’s reduce network downtime for NGFW deployments
  • Easily manage multiple inline security appliances
  • Historical look back (before/after): Real time events correlation, change verification and root cause analysis
  • Scalable traffic recording and analysis up to 40Gbps
  • Network traffic storage amplification up to 36X; store over 1PB of network traffic in a single appliance

Click here to listen to the recording.

Continuous Security for the Hybrid Enterprise

Speaker: Tim Woods, Vice President, Technology Alliances, FireMon

firemon_logo_black_color.pngNetworks are expanding in all directions, transforming with varying segmentation, and changing their taxonomy with transient and fresh computing models: cloud, virtual, IoT, containers, etc. Security must be continuous, because it must travel with the enterprise, forward in time and evolve with the enterprise as the attack surface (space) changes. Additionally, organizations will continue to utilize traditional infrastructure as well as adopt the latest resources that serves their business goals. Continuous security must meet both the heritage network technologies and security challenges embedded in the latest computing models. The enterprise is hybrid. Security must be the same.

Join this session to learn how FireMon can help you prepare for the challenges that enterprises will face in this new and shifting landscape. FireMon solutions are designed to leverage the Palo Alto Networks Application Framework to enable:

  • Vulnerability Management
  • Continuous Compliance
  • Policy Orchestration

Click here to listen to the recording.

The Secrets of Hi-Fidelity Cybersecurity - Accelerating Threat Investigation and Response

Speaker: David Monahan, Managing Research Director, Security and Risk Management, Enterprise Management Associates (EMA)

endace_horiz_logo.pngDavid Monahan, Managing Research Director, Security and Risk Management at Enterprise Management Associates (EMA) has been conducting detailed research into cybersecurity tools and processes for more than 5 years. Prior to joining EMA, David was a security practitioner and CISO for over 20 years.

In this webinar David will look at the challenges facing SecOps teams in today’s fast-moving cybersecurity environment. Drawing on his research, David will provide insight into the cause of these challenges and outline the strategies that leading organizations are employing to improve the speed and accuracy of their investigation of, and response to, sophisticated cyber threats.

David will be joined by Michael Morris, Director of Global Business Development at Endace. Prior to joining Endace, Michael led product management at CA Technologies for the Infrastructure Management Business Unit. Michael has over 20 years of experience in software and hardware solutions for infrastructure and network management and security.

Michael will dissect two examples of sophisticated advanced attacks – Olympic Destroyer and Industroyer - and talk about how packet-level Network History can help organizations to detect, investigate and respond to these sorts of attacks rapidly and accurately. He will also demonstrate how integrating Network History into your security tools – including Palo Alto Networks Firewalls and Panorama - streamlines the investigation process, freeing up overwhelmed SecOps analysts to focus on the most important threats

Click here to listen to the recording. 

Five Ways that Palo Alto Networks and ProtectWise Make Security More Effective

protectwise.png

Speaker: Cat Joss, Senior Product Manager, ProtectWise, Eric Stevens, Principal Architect, ProtectWise

Prevention-based security approaches alone are no longer sufficient for organizations that want an effective cybersecurity strategy. Organizations need a proactive detection and response solution to complement existing investments in prevention-based security. ProtectWise enables security teams with the ability to proactively hunt for threats that have not yet been identified. Integrations with Palo Alto Networks NGFW, Autofocus, Wildfire and logging service provide additional context and value to customers. These integrations give time back to short-staffed security teams by allowing them to seamlessly work across multiple products and convert the intelligence within each platform into action. Cloud delivery ensures that deployment challenges aren’t a hurdle.

Attend this webinar to learn about the five integrations between The ProtectWise Grid and Palo Alto Networks firewalls that will transform workflows. A demo of the joint solution will be provided, followed by a Q&A session.

Click here to listen to the recording.

Provide Operational Insight and Security with Complete Network Visibility in Behavior Analysis

Garland.png

Speaker: Greg Zemlin, Product Manager, Garland Technology, Joseph Krenson, Technical Sales North America, Flowmon Networks

Following best practices for in-line and out-of-band tool deployments allows user to get the most out of their security/monitoring solutions. Palo Alto Networks offers the best-in-class NGFW’s and deploying these with a bypass TAP can eliminate concerns of network interruptions. Additionally, adding out-of-band behavioral analysis tools to a Palo Alto deployment can add greater context to events that are blocked by the NGFW. See how the combined solution from Palo Alto Networks, Garland Technology, and Flowmon Networks can reduce network downtime and give users access to critical forensic and security information. Join Garland Technology, a Fuel Founding Partner and Flowmon Networks to discover how to Provide Operational Insight and Security with Complete Network Visibility and Behavior Analysis.

In this security solutions based webinar, we will review:

  • How Bypass TAP’s reduce network downtime for NGFW deployments
  • Best practices for deploying out-of-band tools
  • How to address concerns from using SPAN and mirror ports
  • How flow data can be used to provide additional event context
  • How flow data is used for forensic and security applications

Click here to listen to the recording.

It's Now Or Later: Best Practices for Scheduling Security Changes in Panorama

tufin logo_resized.png

Speaker: Maya Malevich, Director of Product Marketing, Tufin, Dan Rheault, Senior Product Marketing Manager, Tufin

What is the change schedule your organization standardized on? Do you strictly schedule firewall policy changes into change windows to avoid outages, or do you commit changes in Panorama as they are requested to increase agility? In this webinar, we review different change scheduling best practices and provide use case examples from actual customers.

Join Maya Malevich, Director of Product Marketing and Dan Rheault, Senior Product Marketing Manager to learn about:

  • Industry best practices for changing scheduling
  • Practical scheduling approaches of leading organizations
  • Centrally configuring change windows and urgent changes for better agility and control

Click here to listen to the recording.

Intelligent Automation for Security Operations

BackBox logo.png

Speakers: Rafi Zvi, CEO, BackBox

Most IT professionals have an overwhelming list of projects and upgrades they’d like to complete, if only they had the time. Instead, we spend most of our days dealing with urgent issues and addressing our ever-growing to-do list. But how much more could we get done if we managed to automate some of these “to-do” items? Even more pressing, what if these items are really mission-critical “must- haves”?

With all that is expected of IT and Security departments in today’s world, how can anyone be sure that the tasks required to be completed by their teams cannot be automated to save time, money and resources? In this discussion, we will show you how to improve efficiencies by automating a large number of your disaster recovery procedures, while validating that the procedures were completed correctly, and proactively automating many other additional tasks that might appear in the future.

Click here to listen to the recording.

Better Threat Detection Through Behavioral Analytics - A Magnifier Deep Dive

Speakers: Mark Overholser, Palo Alto Networks Specialist
pan-logo-badge-blue-medium-kick-up.jpg

This webinar will feature Palo Alto Networks Specialist, Mark Overholser, as he details the ins and outs of Magnifier and the impact of behavioral analytics:

Attendees will learn about the following topics:

  • Typical attacker behavior 
  • How the existing Palo Alto Networks suite focuses on prevention 
  • How Magnifier complements this with detection via behavioral analytics 
  • How Magnifier fits into the Application Framework architecturally 
  • How to know if you’re ready to deploy Magnifier 
  • Best practices for for implementation

The session will close with a live demo and audience Q&A.

Click here to listen to the recording.

Protecting the Interconnected Organization

Thales_LOGO_CMYK (002).jpg

Speakers: Mark Royle, Sr. Manager, Solutions Partner Marketing, Thales Security Vik Davar, Director, Technical Business Development, Palo Alto Networks

Organizations today are increasingly interconnected and depend on this interconnectivity and the cloud to conduct business. While this concept of the interconnected enterprise has taken off and improved business acceleration and agility, it has also surfaced increased exposure to data security risks. To alleviate these risks, Palo Alto Networks and Thales eSecurity help enforce security policies that underpin critical components of an enterprise’s network security system, protecting the root of trust of their entire network security system.

In this webinar, we will examine the key elements of the joint solution as well as what may be the best options for your organization.

Topics will include:

  • Types of encryption and their characteristics
  • The critical role of best-in-class key management
  • How to go beyond encryption basics

Click here to listen to the recording.

How to Add Deeper Context to Your Network Security Performance Data

GarlandLogo.pngSpeakers: Greg Zemlin - Product Manager, Garland Technology, Kerry Takenaka - VP Product Management, cPacket Networks, Joshua Joiner - Director Solutions Engineering, cPacket Networks

Security engineers and network performance engineers often require the same information to do their jobs, but start with a different hypothesis or objective. In both roles, access to relevant information around incidents is key to understanding and a resolution. Security engineers can leverage existing monitoring infrastructure to provide additional context around issues. By utilizing a monitoring stack comprised of a firewall, network TAPs, smart packet brokers and packet capture tools, engineers can readily obtain this additional context, leading to enhanced security posture.

Join Garland Technology, a Fuel Founding Partner and cPacket Networks to discover how to add deeper context to your Network Security Performance Data.

In this security solutions based webinar, we will review:

  • Network connectivity best practices
  • Avoiding network downtime during Palo Alto Networks NGFW deployment
  • Convergence between network performance and security teams (NOC/SOC convergence)
  • Timescales and security: the value of context
  • Delivering valuable security context through performance data and packets: combining firewalls, TAPs, smart packet brokers and packet capture tools

Click here to listen to the recording.

State of Network Security: New Research from ESG and the Implications for IT

Speakers: Karen Crowley, Senior Product Manager, Tufin and  Ron Kehoe, CISSP, CISM, CISA, GCIHtufin logo_resized.png

The Enterprise Security Group (ESG) recently ran a research survey on the state of network security. The survey, commissioned by Tufin, presents some interesting results that require network security teams to plan ahead, such as: 86% of IT decision makers responded that automating network security operations is critical or very important for their organization, and yet 65% of them are still using manual processes to implement or modify network security controls.

This webinar will provide a review of the research results and insights into the effects on today’s deployments, presented by network security expert, Ron Kehoe. We will dive into what has changed in the last two years and how organizations see themselves adapting to new realities.

Topics will include:

  • Primary drivers that have increased the difficulty of security operations
  • How cloud services and SDN are impacting organizations
  • The move to DevOps and microservices and their impact

Click here to listen to the recording.

Cloud-powered Network Detection and Response from Endpoint to Network

Speaker: Kelly Brazil, VP of Systems Engineering, ProtectWise™ 

protectwise.pngWhile multiple technologies are needed to secure organizations against cyber attacks, it makes investigation of security events difficult and time-consuming for analysts who have to work across multiple, often disjointed products.

ProtectWise™ and Palo Alto Networks® offer an integrated solution to detect threats on enterprise networks and convert it into action, giving back time to short- staffed security teams that are suffering from alert fatigue.

The ProtectWise Grid™ provides Cloud-Powered Network Detection and Response (NDR). Advanced analytics - such as behavior & anomaly detections, machine learning, threat intel, file analysis - on network traffic produce real time and retrospective detections. Full-fidelity packet captures, indexed and retained indefinitely, create a perfect, rapidly searchable network memory.

Attend this webinar and learn:

  • Why Network Detection and Response (NDR) is important.
  • How the solution provides extremely reliable detections, even with encrypted traffic.
  • How this integration, along with long-term forensics, transforms workflow.

Click here to listen to the recording.

Overcome the GDPR Hype with a Pragmatic Approach to Securing Your Data

pan-logo-badge-blue-medium-kick-up.jpg02_Original_version.pngSpeakers: Fred Streefland, Sr. Product Marketing Manager EMEA - Palo Alto Networks, Steve Healy, Global Director, Solutions Consulting - TITUS Incorporated

With the EU General Data Protection Regulation (GDPR) freshly implemented on 25th May, this webinar brings together the solutions of two power brands of IT security - TITUS and Palo Alto Networks. During this session we will focus on how you can leverage TITUS Data Classification and Palo Alto Networks data security technology to comply with the obligations of GDPR and be ready for what the future of data protection legislation holds. Learn now to protect your organisation’s reputation and bottom line by safeguarding your personal and corporate data.

This education webinar will include:

  • An overview of GDPR. What are your obligations?
  • The business landscape - How ready is the corporate world?
  • How Palo Alto Networks technology platform and solutions can help
  • How TITUS data classification can help. Data Identification as the first step in a GDPR compliance strategy
  • Better together: the added value that data classification brings to data filtering sessions
  • It's not too late. Consider your own business outcomes and GDPR compliance
  • A chance for you to ask questions and learn from others

Click here to listen to the recording.

Tips for Security Appliance Deployment and Migrations

GarlandLogo.pngSpeakers: Greg Zemlin, Product Manager, Garland Technology, Ron Subers, Security Engineer, Guidepoint Security, Shawn Slater, Senior Security Architect, Guidepoint Security

Planning a new data center or remote site deployment? Contending with legacy network architecture? Join Garland Technology, a Fuel Founding Partner, and GuidePoint Security for deployment and migration tips and best practices for your next Palo Alto Network project.

In this security solutions based webinar, we will review:

  • Network Connectivity Best Practices
  • Security appliance reference architecture examples (Live Demo)
  • Managing multi-vendor security tools
  • Firewall migration tips and best practices (Live Demo)
  • Avoiding network downtime during Palo Alto Networks NGFW deployment

Click here to listen to the recording.

Cybersecurity Round Table: I've been breached, what now?

GarlandLogo.pngSpeakers: Chris Bihary, CEO/Co-Founder - Garland Technology, Michael McCartney, President - Avalon Cyber, Seth Wiersma, Vice President Enterprise Sales - Avalon Cyber and Brahn Olson, Director of Cyber Security Services - Avalon

Cyber threats are quickly becoming more sophisticated with Advanced Persistent Threats (APTs) creating a new level of security risk. If you experience a breach, it is critical that you have 100% network visibility to quickly find and fill the gap in your network, and identify what data may have been compromised.

Join the cyber security round table of Chris Bihary, CEO/Co-Founder of Garland Technology, a Fuel Founding Partner; Michael McCartney, President of Avalon Cyber; Seth Wiersma, Vice President Enterprise Sales of Avalon Cyber; and Brahn Olson, Director of Cyber Security Services of Avalon Cyber as they answer your questions and discuss next generation threat intelligence, network visibility and what to do if you’ve been breached.

In this webinar you will learn:

  • Network Connectivity Best Practice
  • Network Breach/Incident Response
  • Cyber security monitoring - collecting security log data from widely used security appliances (e.g., firewalls, antivirus, endpoint detection and response solutions), normalize log data and identify alerts that are of high risk
  • Creating your foundation of visibility

Click here to listen to the recording.

Reducing Risk and Increasing Agility through Policy-based Automation with Palo Alto Next-Generation Firewall

tufin logo_resized.png

Speaker: Karen Crowley, Tufin

Join our industry experts for this engaging discussion on the key ways automation provides better protection from emerging threats, ensures continuous compliance, reduces errors, and takes advantages of the built-in capabilities of Palo Alto Networks Next-Generation Firewalls.

Click here to listen to the recording. 


How to Perform Incident Response with Palo Alto Networks

Speaker: IntelliGO

Malware is insidious, hazardous, and today, it’s everywhere. While cybersecurity professionals are all aware of the dangers of malware, it can be tough to truly grasp the difference that seconds can make in an attack unless you see what it looks like in real life. Join Fuel User Group and IntelliGO for an important webinar showcasing 5 real-life examples of malware discovered by Palo Alto Networks tools. We’ll cover how the attack happened, what was uncovered, and what the incident response process was. Find out how well-prepared you are for a cyberattack, and what to do if you’re breached.

Click here to listen to the recording.

Protect Your Organization with Threat Lifecycle Management

Speaker: Jack Reynolds, LogRhythm

Today’s reality is that organizations will continue to be confronted by increasingly frequent and complex cyberthreats. Protecting your organization now mandates effective Threat Lifecycle Management (TLM) to address threats across the threat landscape.

The TLM framework begins with the ability to guard, monitor and search across your IT environment, and ends with the ability to quickly mitigate and recover from security incidents. The result? Faster time to detect and time to respond, with the resources already at hand.

In this webinar, Jake Reynolds, LogRhythm Technology Alliances Engineer, will highlight how LogRhythm’s Threat Lifecycle Management Platform combines with Palo Alto Networks’ Next-Generation Security Platform to empower organizations with exceptional visibility and context to quickly discover and neutralize concerning incidents.

In this session, we will cover:

  • How LogRhythm and Palo Alto Networks integrate for end-to-end threat lifecycle management
  • The growing role SIEMs have with security Data Lakes
  • Palo Alto Networks' upcoming Application Framework

Click here to listen to the recording.

See Threats In Real Time with 100% Visibility
Speaker: Chris Bihary, CEO/Co-Founder - Garland Technology & David Gold, Vice President of Product Management - Protectwise™

Network security becomes increasingly complex with each passing day, making it critical that busy security teams have full visibility and threat detection capabilities. These resource-constrained teams already support a wide range of security appliances like firewalls, intrusion detection systems, and forensics to help guard enterprises from a growing threat landscape. However, that also means they're managing multiple interfaces and more security data than any one person - or team - can use effectively.

Click here to listen to the recording.

Win the War with Zero Trust
Speaker: VMware

Today’s networks aren’t set up to withstand modern cyberwarfare. As enterprises embrace cloud-based delivery and software-defined data centers, you need to stay one step ahead and assume a trust no-one approach. A ‘Zero Trust’ approach to security - know your data, where it is, and which users or devices are supposed to have access to it - becomes fundamental. The technological innovations of today, next-generation firewalls, virtual network infrastructure, and orchestration, make the evolution to Zero Trust easier than ever.

Click here to listen to the recording. 

Machine Learning - What You Need to Know
Speaker: Giora Engel, Palo Alto Networks

There are many applications and uses for the expanding capabilities of machine learning, none more valuable and impactful than those in the field of cybersecurity. You’ve probably already read or heard something about using machine learning to combat emerging threats, but how does this work, and what does it mean for you in your role on the front line of your organization’s defenses. Join Giora Engel, VP Product Management at Palo Alto Networks and Founder of LightCyber, as we get beyond the marketing buzz and define what machine learning really is, the kinds of resources that are required to power this kind of approach, and how machine learning helps cybersecurity professionals actively combat new threats instead of a completely reactive approach.

Giora will also reveal details about the upcoming beta program for LightCyber Behavioral Analytics. If your organization is an early adopter of emerging technologies, you can sign up for LightCyber beta and evaluate the benefits of supervised and unsupervised machine learning first hand.

Click here to listen to the recording. 

Network Connectivity & Security Solutions
Speaker: Chris Bihary, CEO/Co-Founder & Patrick Nixdorf, System Engineer - Garland Technology

Whether you are planning a new data center, remote site deployments or are contending with legacy network architecture - how you deploy is just as important as what you deploy.

Join Garland Technology, a Fuel Founding Partner on a security solutions focused webinar. Chris Bihary, CEO/Co-Founder of Garland Technology has over 20+ years experience in figuring out the most common and complex network access problems.

This is a security solutions based webinar, we will review common Palo Alto Networks Next-Generation Firewall deployments as well as applications for multi-vendor security and monitoring tools.

Security Solution Overview:

  • Avoiding downtime in Palo Alto Networks Next-Generation Firewall deployment 
  • Installing patches without taking the network down 
  • Cost effective High Availability Solutions for Active/Active & Active/Passive 
  • Remote site management 
  • Managing multi-vendor security tools (chaining) 
  • Affordable transition from 10G to 40G 
  • See packets before and after they pass through device

Click here to listen to the recording. 

Fuel Best Practices Roundtable - Decreasing Your Attack Footprint
Speaker: Matt Mellen, Palo Alto Networks

Do you have DNS sinkholing enabled? Do you block connections from countries you don’t do business with? In this interactive call, we’ll discuss questions like this and other creative ways to use the security platform to decrease your attack footprint. Discussion topics will be based primarily around different features you can enable across the security platform. 

There will be a slight bias toward healthcare but any industry is invited to participate. Remember, this is an interactive call so come ready to share your ideas!

Click here to listen to the recording

How Organizations Can Gain Infrastructure Efficiency by Automating Their Network Operations

BackBox logo.png

Speaker: Rafi Zvi, Co-Founder, BackBox

BackBox provides a single, centralized location for automated and seamless network operations. Device Configuration Backup, Automated Recovery and Disaster Recovery Procedures, Dynamic Asset Management, Pre-emptive Health Checks, Configuration Harmonization across all devices and Automated multi-device configuration changes enable organizations to mitigate risk and save time in day-to-day network operations for over 150 Network and Security Vendors.

During this 45-minute educational Webinar, you will find out how to:

  • Fully automate and verify the disaster recovery procedure of your network infrastructure.
  • Harmonize your device configurations to meet your corporate standards.
  • Preemptively monitor your device operations and prevent downtime.
  • Save time and mitigate risk by pushing configuration changes to multiple devices from a central location.

Click here to listen to the recording

Taking Zero-Touch Automation to the Next (Generation) Level

Speakers: Joe Schreiber, Technical Director of Business Development at Tufin;

Erez Tadmor, Sr. Product Manager, Orchestration and Automation at Tufin

Automation is a key element as organizations adapt to digital transformation, and security operations are not excluded. Tufin allows you to automate changes to Palo Alto Networks Next Generation policies and to maximize agility and productivity without losing control. Whether a change is required to App-ID or User-ID to enable a new service, Tufin orchestration suite analyzes, designs and implements the change from a single console to ensure rapid delivery.

Join the session to learn how you can:

  1. Implement changes to Panorama device group NGFW policies in minutes.
  2. Enforce continuous compliance with security standards with proactive risk analysis
  3. Reduce the complexity of your hybrid network environment

Using vRNI to Visualize and Secure Your Data Center Virtual Network

Speaker: Frank Snyder, Sr. Systems Engineer, VMware

vRealize Network Insight (vRNI) is a network analytics and security modeling tool designed for the VMware-based virtual datacenter. By utilizing vRNI to identify and profile traffic inside the virtual data center, an engineer will be able to make accurate security decisions that will result in the accurate and rapid deployment of distributed firewall rules into the NSX enabled virtual data center.

This webinar will provide the following to the attendees:

  1. How to gain 360° visibility to all traffic within the virtual data center, and filter that data from the data center level down to the virtual machine level.
  2. How to group VMs to represent application and visually see how those applications are communicating.
  3. How to manage a full installed and functioning instance of NSX from a security and operations perspective.

Click here to listen to the recording


Vmware

Network Connectivity - Basics and Beyond

Speakers: Chris Bihary, CEO/Co-Founder, Garland Technology;

Patrick Nixdorf, System Engineer, Garland Technology

Long range, short range, and twisted pair and that’s just the 1G media connection options. There is a dizzying amount of different media types for network connectivity. Once you untangle the cabling questions for your network - you dive straight into the pluggables. On the surface, choosing what pluggable seems simple enough - just match the speed, mode and fiber type, right? But, there are a vast amount of options based on your current infrastructure and future needs.

Join Garland Technology, a Fuel Founding Partner on a network connectivity reboot - this webinar will begin with covering the basics and expand into vendor-specific connectivity such as BiDi and MTP® as well as the unique environmental considerations within Industrial Ethernet and Industrial Internet of things (IIoT) settings.

In this webinar, you will learn:

  • Cabling - it’s more than acronyms!
  • Copper
  • Fiber
  • How to: Measuring dB insertion loss
  • Bend radius tolerances
  • Industrial Ethernet - environmental considerations
  • Pluggables: Common compatibility scenarios Pluggables:
  • Pluggables: Vendor-specific options: BiDi, MTP
  • Converting media for compatibility
  • Converting network speed

Click here to listen to the recording


garland