Back to Search Begin New Search Save Search Auto-Notify
Securing K-12 Modern Learning Environme...
Join Palo Alto Networks' for a 3-part on demand webcast series that will explore the challenges of cybersecurity in K-12 education and explore the resources that are available to help prevent successful attacks. The digital evolution of K-12 education, which has been underway for some time now, continues to surge as schools and districts move forward in their quest to deploy new tactics. These include 1:1, bridging the homework gap, and empowe...
Add Favorite
Securing K-12 Modern Learning Environme...
Join Palo Alto Networks' for a 3-part on demand webcast series that will explore the challenges of cybersecurity in K-12 education and explore the resources that are available to help prevent successful attacks. The digital evolution of K-12 education, which has been underway for some time now, continues to surge as schools and districts move forward in their quest to deploy new tactics. These include 1:1, bridging the homework gap, and empowe...
Add Favorite
Securing K-12 Modern Learning Environme...
Join Palo Alto Networks' for a 3-part on demand webcast series that will explore the challenges of cybersecurity in K-12 education and explore the resources that are available to help prevent successful attacks. The digital evolution of K-12 education, which has been underway for some time now, continues to surge as schools and districts move forward in their quest to deploy new tactics. These include 1:1, bridging the homework gap, and empowe...
Add Favorite
NIST Compliant Architectures and Soluti...
This webinar will discuss the DoD Pathfinder efforts for DevSecOps and how Palo Alto Networks, through Twistlock provides capabilities to meet security controls requirements. We will also review NIST SP-800-190 specified security controls, federal compliance standards, advanced threat detection, and response requirements against secure solutions for regulated cloud workloads as well as on-prem solutions which utilize containerized solutions. T...
Add Favorite
Security Transformed with Zero Trust
High-profile breaches involving "trusted" insiders showcases the fact that trust is something malicious actors can exploit to their advantage. John Kindervag, Palo Alto Networks Field CTO, created Zero Trust on the principle of "never trust, always verify," to help organizations effectively segment their networks and relieve any doubts of insider attacks. In recent years, Zero Trust has evolved to become a strategic Cybersecurity initiative th...
Add Favorite
The Future of Cyber Secure Schools
Keeping students and their data safe while maintaining a modern and engaging learning environment is a delicate balance for K-12 institutions. Schools struggle to continuously comply to industry and legal standards that continue to grow, while faced with limited IT resources. As education continues to make the move into the realm of internet-based and on-demand education, they have to find ways to bring their IT resources into the same spaces....
Add Favorite
TIC 3.0 Webinar Series
As more agencies rapidly shift to mobile workforces, there is a growing need to securely connect and scale remote workforces to ensure business continuity through Prisma Access.Join us for one of our upcoming webinars to learn how Prisma Access delivers consistent protection from the cloud and aligns to Trusted Internet Connection (TIC) 3.0 guidelines by:Bringing protection closer to usersAddressing use cases for remote branch and remote user...
Add Favorite
TIC 3.0 Webinar Series
As more agencies rapidly shift to mobile workforces, there is a growing need to securely connect and scale remote workforces to ensure business continuity through Prisma Access.Join us for one of our upcoming webinars to learn how Prisma Access delivers consistent protection from the cloud and aligns to Trusted Internet Connection (TIC) 3.0 guidelines by:Bringing protection closer to usersAddressing use cases for remote branch and remote user...
Add Favorite
DevSecOps in a Mission-Critical Environment
The Joint Strike Fighter (JSF) Program is the Department of Defense's focal point for defining next-generation strike aircraft weapon systems for the Navy, Air Force, Marines, and our allies. As the operational tempo has evolved, the requirements of the fleet have the need to develop a new approach to software development and sustainment. This approach is Software Modernization, an effective hybrid of development and sustainment that involves...
Add Favorite
Maintain The Integrity Of Election Systems
In 2019, $425 million were given states due to an ongoing threat to the security of our elections. The Federal Election Commission is looking for ways to secure our national election infrastructure and improve the election administration. Palo Alto Networks helps to ensure the security of our elections and the systems that support our voting process. Our automated tools perform baseline network security posture audits of existing users, applic...
Add Favorite
Back to Search Begin New Search