Тёмный

Securing the Datacenter with a Palo Alto Networks Next-Generation Firewall 

Palo Alto Networks
Подписаться 28 тыс.
Просмотров 87 тыс.
50% 1

This whiteboard session takes a look at how a Palo Alto Networks next-generation firewall allows you to identify and control your datacenter applications, protect them from known and unknown threats and prevent data exfiltration.

Опубликовано:

 

12 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 23   
@lmd6204
@lmd6204 8 лет назад
I thought it was a great presentation for a network security student trying to get an idea of the real equipment and application of this firewall. Thanks for the demonstration. I now have an idea of how this works which a text book cannot explain.
@nsk7068
@nsk7068 5 лет назад
The video is informative. However, the virtual tunnel between the DC and Partner office looks something else!!!! :D
@youzatoob
@youzatoob 7 лет назад
Dude is a master of writing and drawing in reverse
@vitao.duarte
@vitao.duarte 6 лет назад
I laughed so much with this comment, seriously.
@rathnamalasp1097
@rathnamalasp1097 6 лет назад
Funny guy...
@sdjnjferri
@sdjnjferri 5 лет назад
It took me 60 seconds to realize this and I came down to the comments to make the same point!! Way to go Warby!
@shujathmohiuddin264
@shujathmohiuddin264 7 лет назад
subscribed in 1min. this is what i need drawings and walking through it
@anil0kd0
@anil0kd0 2 года назад
👍Insightful for palo alto firewall
@apphiajeyaraj6454
@apphiajeyaraj6454 Год назад
On a wire, if the hacker encrypts the encrypted channel ( typically a ransomware attack) , how does the monitoring application identify this attack . If identified, what would be the next remedy
@surabhis.shrikhande9747
@surabhis.shrikhande9747 3 года назад
Informative 👍🏻
@visraltech948
@visraltech948 7 лет назад
hi is the fireall is a virtual ssoftware or a network device ?
@mubarikali8369
@mubarikali8369 4 года назад
can same one please tell me a which screen his using
@easyittv
@easyittv 6 лет назад
Your last example with lync assumes the user is authenticated and the hacker is not and so the hacker connection wont work. how about publicly available services such as http(s) when there is no authentication involve? will the security fallback to traditional firewall with IPS?
@brandonrobinson5943
@brandonrobinson5943 2 года назад
Does anyone know what he's using to write on?
@leelachaitanya
@leelachaitanya 8 лет назад
Couple of tips: 1)The lightning streak/ shining white band at the bottom of the video is distracting and annoying to the eye. 2) Atleast for the video, I don't see any colors changing with change in pen/s (for most of the pens)
@Mister_NO.
@Mister_NO. 9 лет назад
Drawing a coffin at the beginning of a video... Well that's one way to do it...
@nielnitin7191
@nielnitin7191 8 лет назад
How fast you are updating any signatures for zero day Vulnerability with no false positives...
@SimonChengHK
@SimonChengHK 9 лет назад
Thanks for sharing ^_^ advance Technology compare to Traditional Firewall
@Nomad_oishu
@Nomad_oishu 4 года назад
Can I get the diagram?
@MikeDeanOfficials
@MikeDeanOfficials 6 лет назад
Is this an art tutorial? 😝
@basscaq
@basscaq 4 года назад
Pfsense is better than many many $$$....
Далее
Cute
00:16
Просмотров 7 млн
БЕЛКА РОЖАЕТ?#cat
00:28
Просмотров 313 тыс.
Next-Generation Firewall Capabilities Demo
24:57
Просмотров 15 тыс.
PCNSE Prep - Functions and Concepts of WildFire
11:45
Palo Alto Networks- DNS Sinkhole
11:42
Просмотров 32 тыс.
Lightboard Series: Traps Advanced Endpoint Protection
11:31
The Future of Cybersecurity with Nir Zuk
26:49