In the digital age, functional leaders within an organization must be proactive in their approach to cybersecurity. Join us on November 19, 2015 at 2:00 p.m. EST for a discussion on how you and your organization can prepare, implement, and respond to cyber threats.
Discussion Topics
Planning for Prevention: Setting a New Tone for Cybersecurity
Mark McLaughlin, CEO, Palo Alto Networks
Making It Work: Implementing and Maintaining Effective Cyber Risk Management
Jamey Cummings, Senior Client Partner, Korn Ferry
In Case of Emergency…: A Full-Spectrum View of Cyber Incident Response
Host: Adam Sodowick, President, NYSE Governance Services November 19, 2015 at 2:00 p.m. EST
The discussion topics of this webinar are based on the new book from NYSE and Palo Alto Networks, Navigating the Digital Age. Get your copy of the book here.
Palo Alto Networks researcher Bo Qu was credited with discovery of six new critical Microsoft vulnerabilities affecting Internet Explorer (IE) versions 7, 8, 9, 10 and 11 and Microsoft Edge. These vulnerabilities are covered in Microsoft’s November 2015 Security Bulletin and documented in Microsoft Security Bulletins MS15-112 and MS15-113.
In our continuing commitment to the security research community, these vulnerabilities were disclosed to Microsoft through our participation in the Microsoft Active Protections Program (MAPP) program, which ensures the timely, responsible disclosure of new vulnerabilities and creation of protections from security vendors.
Palo Alto Networks is a regular contributor to vulnerability research. Previous critical Microsoft vulnerability discoveries from the past 18 months included:
By proactively identifying these vulnerabilities, developing protections for our customers, and sharing them with Microsoft for patching, we are removing weapons used by attackers to compromise enterprise, government and service provider networks.
Multiple security deployments, distributed networks, and several administrators – these are just some of the causes that make it increasingly tough to stay on top of effective security policies, compliance and streamlined management of your network security. Changes in one part of your network may negatively impact the effectiveness of your security in another part, and you may not even be aware of all the changes before they are being committed. It’s a case of the left hand not knowing what the right hand is doing.
The good news is that there are steps any organization can take to make the configuration and ongoing management of security deployments easier and more secure. Network security management streamlines configuration and management, as well as visibility into threats. In addition, security orchestration ensures that all security rules and policies work well together and don’t cancel out each other’s effectiveness.
Let’s take a closer look at network security management and security orchestration, and how Palo Alto Networks and Tufin, one of our technology partners, work together to offer both, providing streamlined, secure, and compliant network security.
Network Security Management by Palo Alto Networks
It all starts with the setup and configuration of your security deployment. Deploying an effective network security management solution that reduces duplication of work and human error, and offers the power to manage all policies with one security rule base, is key in streamlining management of any security deployment.
A good network security management solution, such as Palo Alto Networks Panorama, also provides central visibility into all network traffic and consolidates multiple management consoles into one.
Panorama provides effective and efficient network security management in all of the above areas. Learn more about Panorama.
Security Orchestration by Tufin
While Panorama provides streamlined configuration and management of your next-generation security deployment, the security orchestration suite by Tufin ensures any network changes happen harmoniously across your network and don’t impact security or compliance negatively.
With a security orchestration suite, you can deploy and coordinate not just one security rule base across one distributed security deployment but also multiple security rule bases across multiple security technologies. Security orchestration ensures no changes in your security deployment are being implemented that could jeopardize your security posture or compliance with important regulations.
These two solutions are nicely integrated and increase security, compliance, and streamlined management capabilities. Learn more about the combined Palo Alto Networks and Tufin solution.