Before the start of the event, there are:
Who will benefit from the online workshop
Heads of IT/cybersecurity departments
System administrators, engineers, and other technicians
At our workshop, you can personally test the capabilities of the cybersecurity platform from Palo Alto Networks to prevent cyber threats:
● creating policies to prevent known threats;● enable sandbox threat analysis using WildFire to manage unknown malware;● configuring SSL traffic decryption and inspection policies to manage high-risk applications;● prevention of account theft;● getting to know Autofocus.
Speaker: Alexander Krasyukov, Senior Project Technical Support Engineer, BAKOTECH Group
11:00 - 12:00
Palo Alto Networks Cybersecurity Platform Review
12:00 - 15:00
Practicing in a virtual environment
Content-ID technology offers a new approach based on a complete analysis of all allowed traffic using advanced threat prevention technologies in a single unified system. Content-ID ensures the secure operation of permitted applications by blocking the spread of exploits across the network for vulnerabilities, viruses, botnets, and other malicious software regardless of port, protocol, or intrusion method.
Threat prevention technology includes:
IPS - IPS feature blocks vulnerability exploits, buffer overflow, and scans ports.
Governance and Control - Stops outgoing malware messages, as well as passively analyzes DNS queries, and identifies unique botnet patterns. This identifies malicious users and prevents secondary downloads and data transfers from your enterprise.
Malware protection. Detection of known malware, as well as its future varieties, and blocking the data flow at a very high speed.
URL Filtering is a comprehensive database of URL addresses that allows you to control how users visit web resources.
File and data filtering - Content-ID filtering functions enable you to implement policies that mitigate the risks associated with the unauthorized file and data transfers, such as blocking files by type; data filtering to control the transmission of sensitive data patterns, including credit card and social security numbers, in-app content or attachments.
Conditions of participation
● The webinar is held on the Zoom platform.● Participation is free, registration is required with a corporate email address (materials and a link to access the webinar will be sent to this address).● Practical workshop lasts 2-3 hours.● The workshop is attended by no more than 15-20 people, which provides an individual approach to each participant.● Practical exercises are performed in a virtual test environment, the entire testing process is accompanied by a certified engineer.
Registration is complete
The workshops are held every month. Unfortunately, there are no vacant places at this practical seminar, write to us at the email labolg.akse%40eciffo and we will reserve a place for you at the next one.
This workshop is held together with a reliable ESKA's partner- the BAKOTEK group of companies - the official distributor of Palo Alto Networks in Ukraine. BAKOTEK supplies solutions from global vendors - leaders in their segments, providing professional pre-and post-sales, marketing, and technical support for partners and end customers.