Content-ID. Traffic Protection

Online Test drive of next-generation firewalls Palo Alto Networks, analysis of Content - ID technology

December 15 at 11.00

Before the start of the event, there are:


The workshop on testing the Next-Generation Firewall functionality is conducted on a new operating system - PAN-OS-10 and will allow you to try out Palo Alto Networks firewalls based on machine learning in practice without the need to install hardware or software on your site. Each participant receives his own virtual NGFW, as well as a virtual test network segment, guidelines, and instructions.

Who will benefit from the online workshop

  • IT/cybersecurity directors

  • Heads of IT/cybersecurity departments

  • System administrators, engineers, and other technicians 

Workshop program

At our workshop, you can personally test the capabilities of the cybersecurity platform from Palo Alto Networks to prevent cyber threats:
● creating policies to prevent known threats; enable sandbox threat analysis using WildFire to manage unknown malware; configuring SSL traffic decryption and inspection policies to manage high-risk applications; prevention of account theft; getting to know Autofocus.
Speaker: Alexander Krasyukov, Senior Project Technical Support Engineer, BAKOTECH Group

  • Illustration

    11:00 - 12:00

    Palo Alto Networks Cybersecurity Platform Review

  • Illustration

    12:00 - 15:00

    Practicing in a virtual environment

Effective Threat Prevention with


Content-ID technology offers a new approach based on a complete analysis of all allowed traffic using advanced threat prevention technologies in a single unified system. Content-ID ensures the secure operation of permitted applications by blocking the spread of exploits across the network for vulnerabilities, viruses, botnets, and other malicious software regardless of port, protocol, or intrusion method.

Threat prevention technology includes:

  • IPS - IPS feature blocks vulnerability exploits, buffer overflow, and scans ports.

  • Governance and Control - Stops outgoing malware messages, as well as passively analyzes DNS queries, and identifies unique botnet patterns. This identifies malicious users and prevents secondary downloads and data transfers from your enterprise.

  • mobile_security-

    Malware protection. Detection of known malware, as well as its future varieties, and blocking the data flow at a very high speed.

  • URL Filtering is a comprehensive database of URL addresses that allows you to control how users visit web resources.

  • File and data filtering - Content-ID filtering functions enable you to implement policies that mitigate the risks associated with the unauthorized file and data transfers, such as blocking files by type; data filtering to control the transmission of sensitive data patterns, including credit card and social security numbers, in-app content or attachments.

Conditions of participation

The webinar is held on the Zoom platform. Participation is free, registration is required with a corporate email address (materials and a link to access the webinar will be sent to this address). Practical workshop lasts 2-3 hours. The workshop is attended by no more than 15-20 people, which provides an individual approach to each participant. Practical exercises are performed in a virtual test environment, the entire testing process is accompanied by a certified engineer.

Registration is complete

The workshops are held every month. Unfortunately, there are no vacant places at this practical seminar, write to us at the email labolg.akse%40eciffo and we will reserve a place for you at the next one.



This workshop is held together with a reliable ESKA's partner- the BAKOTEK group of companies - the official distributor of Palo Alto Networks in Ukraine. BAKOTEK supplies solutions from global vendors - leaders in their segments, providing professional pre-and post-sales, marketing, and technical support for partners and end customers.