Welcome to our Tech Deep Dive Miniseries where you will learn about Nebula, a series of network security innovations that add inline deep learning and harness the processing power of the cloud. PAN-OS® 10.2 Nebula collects, analyzes and interprets potential Zero-Day threats using deep learning in real time – an industry first. This results in 6X faster prevention and 48% more evasive threats detected than any previously available solution.
In this highly-interactive six-part miniseries, you’ll meet Palo Alto Networks security experts and get their unique insights and advice on the continuously evolving cybersecurity threat landscape.
Watch on demand for an in-depth look at the latest advancements in cybersecurity, best practices, tips and tricks, demos and more to protect your business and defend against threats.
Instantly Stop Zero-Day Threats with Nebula PAN-OS 10.2
The industry’s first AIOps for NGFWs revolutionizes firewall operations with ML-powered insights for the best security posture and optimal health. AIOps reduces time to detect network security gaps by up to 99% and uses machine learning to predict up to 51% of disruptions to NGFWs before they impact the firewalls.
Modern network security requires a new approach to stop unknown threats – from inline deep learning for today’s most advanced evasive and targeted attacks to analyzing real traffic as attacks unfold to preventing an attack by the zero-day and saving the initial victim.
In March, we introduced Nebula, our latest series of network security innovations – the new PA-5400 Series and PA-3400 Series ML-Powered NGFWs with PAN-OS 10.2 Nebula along with the new Advanced Threat Prevention service and enhancements to Advanced URL Filtering and DNS Security – all working together to stop zero-day threats in zero time, resulting in 6X faster prevention and 48% more evasive threats detected.
Join security experts from Palo Alto Networks to learn how to deploy NGFW and the right combination of Cloud Delivered Security Services to provide comprehensive network security for each of the use-cases below.
- Internet Edge Security
- Secure Segmentation for Data Center
- Secure Segmentation for Campus
Adversaries continue to innovate threat techniques and tactics at high speeds across network and cloud environments. Traditional defenses can’t protect against these evolving threats as attackers are leveraging automation and employing malleable Command and Control (C2) tools to evade signature defenses while encrypting their victims' network communications.
In March, we introduced Advanced Threat Prevention, the industry’s first Intrusion Prevention System (IPS) that stops unknown C2 inline.
Learn how to use the new features of Advanced Threat Prevention to prevent 96% of web-based Cobalt Strike and detect 48% more evasive and unknown C2 than the next leading IPS solution.
In this episode, we’ll cover:
- How modern attackers are leveraging automated hack tools to evade traditional security controls
- How the Advanced Threat Prevention stops unknown C2 inline by using machine learning and deep learning models that analyze real time web, non-web and encrypted traffic
- Configurations and real world prevention examples
With the exploding adoption of SaaS applications and work from home practices, securing your internet edge has never been more important. And it’s become increasingly difficult with today’s sophisticated and evasive threats.
Palo Alto Networks has harnessed inline deep learning to do what other solutions can’t – stop today’s most sophisticated attacks as they happen.
Learn how to use Advanced URL Filtering and DNS Security to secure your internet edge by detecting over 40% more threats while preventing patient zero. In this episode, we’ll cover:
- How to implement core features
- How to set policies to maximize your protection
- Best practices to deploy and manage from day one
No Zero Trust framework is complete without factoring in unmanaged IoT devices. IoT devices make up for more than 30% of all devices and are springboards for 25% of the cyber attacks in enterprises. These devices often ship with vulnerabilities, run unsupported operating systems, and lack encryption, posing a huge security risk to organizations.
In this episode, we will share how you can reduce the unseen and unmitigated 30% of risk across your enterprise by implementing Zero Trust for IoT devices. Some of the key features covered include:
- Quick discovery and accurate inventory of all IT, IoT, IoMT, OT and Bluetooth devices
- Analysis of device behavior to assess risk, compliance posture and anomalous activity
- Zero Trust easy adoption with automated discovery, least privilege access policies and 1-click enforcement
Network security operations remain a laborious and reactive process. Investing in sophisticated and expensive security equipment only pays when that equipment is used properly. Misconfigured security devices are extremely difficult to identify, and lead to breaches while undetected traffic patterns can cause performance issues that can slow or stop network traffic which can lower productivity.
In March, we introduced the industry’s first AIOps for NGFWs that revolutionizes firewall operations with ML-powered insights for the best security posture and optimal health.
The new AIOps reduces time to detect network security gaps by up to 99% and uses machine learning to predict up to 51% of disruptions to NGFWs before they impact the firewalls.
In this episode, you will hear directly from security experts how AIOps for NGFWs
- Addresses top operational challenges such as misconfigurations and best practice compliance
- Helps maximize your firewall investment
- Reduces downtime
- Keeps your business operations running smoothly
The way organizations consume identity has evolved over the years. Security teams no longer rely solely on user and group information stored in on-premise directories like Microsoft Active Directory or LDAP. They are also connected to cloud directories such as Okta, AzureAD, and Ping to write user and group based security policy controls.
With an unbounded workforce, it’s difficult to keep security and identity connected and in sync between cloud, campus, data center, and hybrid identity stores.
Learn more about solving Zero Trust for Identity with Cloud Identity Engine.
In this episode, security experts will share several identity enhancements introduced with Nebula.
- Extended support to multiple Identity providers including Google and OKTA
- Major enhancements for authentication support
- The new SCIM Support
“Threat Hunting is a human-centric process of proactively searching through networks for evidence of attacks that evade existing security monitoring tools.”
This session will show how Cortex XDR can be utilized in Threat Hunting activities to hunt for highly evasive or unauthorized activity in the environment using XQL and Host Insights features.
Learn how you can grow your services by leveraging Cortex's ability to help customers respond to, contain and investigate a cyber incident.
This session will technically dive into how Cortex XDR can be used by incident responders to review evidence, hunt down threats and perform compromise assessments from one console.
Join us to learn more about Cortex Incident Response, why it's a unique approach, and how to position it.
Real-Life Use Case technical demo - Cortex Cloud Agent vs Prisma Defender Agent - Technical Use Cases
This session will focus on demonstrating different exploits and focus on the when, where, and why you might want to consider Cortex Cloud agents alongside Prisma Cloud Defenders.
We'll also cover some technical tips to implement, so one solution plays well with the other and discuss compatibility and performance planning.
Symphony is a 1-day virtual conference where we will share the SOC transformation story, best practices for running the modern SOC and our vision of the modern SOC.
You will hear from industry experts, Cortex customers, and practitioners through keynotes and breakout sessions.
Learning content will be available on-demand. Keynotes are only available to live attendees.
Registration open soon!
Learn how Cortex XSOAR and Prisma Cloud work together to deploy automated workflows for cloud security remediation, unifies cloud alerts and data across sources through case management alert visibility, and coordinate actions across various product stacks and teams, resulting in quicker and more efficient remediation.
Join us and learn more about how Cortex XSOAR and Prisma Cloud work together, technically explained.
Cortex Xpanse is an automated Attack Surface Management (ASM) platform that provides a complete and accurate inventory of an organization’s global internet-facing assets and misconfigurations to continuously discover, evaluate, and mitigate an external attack surface, flag risky communications, evaluate supplier risk or assess the security of M&A targets.
During this technical session you will learn about how Xpanse is addressing the following challenges:
Manage Attack Surface: Learn how to spot misconfigurations, manage certificate hygiene and lifecycle. In this session, we'll cover how Xpanse helps you automatically discover expired certs, self-signed certs, certs with wildcard characters and many more.
Infrastructure Governance: Discover your organization's exposure to latest critical vulnerabilities like log4j, Microsoft Exchange vulnerabilities, atlassian engine exposures, apache web server vulnerabilities and several others by leveraging the Xpanse policy engine to drastically reduce your MTTD and MTTR.
Cloud Security: Learn how to improve your cloud vulnerability scanning where traditional IP-based scanners fail by leveraging domain-host pair data exported from Xpanse.
Third Party Due Diligence: Identify if your critical suppliers are violating any compliance frameworks like NIST, CMMC, etc. and understand how to enumerate risks on your supplier network that could potentially compromise your network.
Primary Cortex|Prisma Services-Led Technical Play - Integration with Cortex XDR, Xpanse and Prisma Cloud
Learn how to enhance your service offerings by Integrating Prisma alerts / Cloud Inventory, IOT Profiles and Xpanse Visibility into XDR to create an Easy Single view screen for the SOC. Streamlining security operations for your customers and prospects.
We'll cover how the Xpanse offering is a logical first step to discover shadow IT cloud accounts, on-boarding and integrations of Prisma Cloud Alerts into XDR Asset Management views, sync device ID Information from NGFWs(w/IOT license) into XDR for detailed asset identification and how the tools work together to provide holistic security coverage.
Cortex XSIAM is a revolutionary new SOC platform, that’s always learning to outpace threats and accelerate response.
With it's AI-driven, automation-first approach, it will transform security operations while obsoleting SIEM and other point products.
Join us to learn more about this new product, why it's different from XDR and SIEM, and how to position it.
Following up the previous week 'XSIAM Technical Introduction.
This session will provide you with a Real-Life Use Case technical demo leveraging XSIAM to Automate Detection, Investigation and Response with it's AI-Driven, automation-first approach.
Join us to learn more about Cortex XSIAM, and how to position it.
Modern network security requires a new approach to stop unknown threats – from inline deep learning for today’s most advanced evasive and targeted attacks to analyzing real traffic as attacks unfold to preventing an attack by the zero-day and saving the initial victim.
In March, we introduced Nebula, our latest series of network security innovations – the new PA-5400 Series and PA-3400 Series ML-Powered NGFWs with PAN-OS 10.2 Nebula along with the new Advanced Threat Prevention service and enhancements to Advanced URL Filtering and DNS Security – all working together to stop zero-day threats in zero time, resulting in 6X faster prevention and 48% more evasive threats detected.
Join security experts from Palo Alto Networks to learn how to deploy NGFW and the right combination of Cloud Delivered Security Services to provide comprehensive network security for each of the use-cases below.
- Internet Edge Security
- Secure Segmentation for Data Center
- Secure Segmentation for Campus
Adversaries continue to innovate threat techniques and tactics at high speeds across network and cloud environments. Traditional defenses can’t protect against these evolving threats as attackers are leveraging automation and employing malleable Command and Control (C2) tools to evade signature defenses while encrypting their victims' network communications.
In March, we introduced Advanced Threat Prevention, the industry’s first Intrusion Prevention System (IPS) that stops unknown C2 inline.
Learn how to use the new features of Advanced Threat Prevention to prevent 96% of web-based Cobalt Strike and detect 48% more evasive and unknown C2 than the next leading IPS solution.
In this episode, we’ll cover:
- How modern attackers are leveraging automated hack tools to evade traditional security controls
- How the Advanced Threat Prevention stops unknown C2 inline by using machine learning and deep learning models that analyze real time web, non-web and encrypted traffic
- Configurations and real world prevention examples
With the exploding adoption of SaaS applications and work from home practices, securing your internet edge has never been more important. And it’s become increasingly difficult with today’s sophisticated and evasive threats.
Palo Alto Networks has harnessed inline deep learning to do what other solutions can’t – stop today’s most sophisticated attacks as they happen.
Learn how to use Advanced URL Filtering and DNS Security to secure your internet edge by detecting over 40% more threats while preventing patient zero. In this episode, we’ll cover:
- How to implement core features
- How to set policies to maximize your protection
- Best practices to deploy and manage from day one
No Zero Trust framework is complete without factoring in unmanaged IoT devices. IoT devices make up for more than 30% of all devices and are springboards for 25% of the cyber attacks in enterprises. These devices often ship with vulnerabilities, run unsupported operating systems, and lack encryption, posing a huge security risk to organizations.
In this episode, we will share how you can reduce the unseen and unmitigated 30% of risk across your enterprise by implementing Zero Trust for IoT devices. Some of the key features covered include:
- Quick discovery and accurate inventory of all IT, IoT, IoMT, OT and Bluetooth devices
- Analysis of device behavior to assess risk, compliance posture and anomalous activity
- Zero Trust easy adoption with automated discovery, least privilege access policies and 1-click enforcement
Network security operations remain a laborious and reactive process. Investing in sophisticated and expensive security equipment only pays when that equipment is used properly. Misconfigured security devices are extremely difficult to identify, and lead to breaches while undetected traffic patterns can cause performance issues that can slow or stop network traffic which can lower productivity.
In March, we introduced the industry’s first AIOps for NGFWs that revolutionizes firewall operations with ML-powered insights for the best security posture and optimal health.
The new AIOps reduces time to detect network security gaps by up to 99% and uses machine learning to predict up to 51% of disruptions to NGFWs before they impact the firewalls.
In this episode, you will hear directly from security experts how AIOps for NGFWs
- Addresses top operational challenges such as misconfigurations and best practice compliance
- Helps maximize your firewall investment
- Reduces downtime
- Keeps your business operations running smoothly
The way organizations consume identity has evolved over the years. Security teams no longer rely solely on user and group information stored in on-premise directories like Microsoft Active Directory or LDAP. They are also connected to cloud directories such as Okta, AzureAD, and Ping to write user and group based security policy controls.
With an unbounded workforce, it’s difficult to keep security and identity connected and in sync between cloud, campus, data center, and hybrid identity stores.
Learn more about solving Zero Trust for Identity with Cloud Identity Engine.
In this episode, security experts will share several identity enhancements introduced with Nebula.
- Extended support to multiple Identity providers including Google and OKTA
- Major enhancements for authentication support
- The new SCIM Support