LiveWeek 22 Sep 2017

by ‎09-22-2017 03:29 PM - edited ‎10-01-2017 10:51 PM (3,084 Views)

NEW RELEASE: TRAPS 4.1

NEW!! Traps 4.1 - Expanded protection against ransomware

@joboyd @jdelio

Traps 4.1 continues to develop our innovative, multi-method prevention approach to endpoint security with a specific focus on preventing ransomware. New capabilities in Traps 4.1 monitor ransomware behavior and upon detection, shut down an attack and block new exploit techniques used in recent WannaCry and NotPetya attacks. This latest version also brings granular child process protection and DLL examination into a long list of Traps anti-malware preventions. Read more...

 

SHOWDOWN: TOR MEETS THE PALO ALTO NETWORKS FIREWALL

NEW!! How to Block Tor

@vsathiamoo @jdelio

The Tor network disguises user identity by moving their data across different Tor servers, and encrypting that traffic so it isn't traced back to the user. Anyone who tries to trace would see traffic coming from random nodes on the Tor network, rather than the user's computer. 

 

Palo Alto Networks has created applications such as tor and tor2web to identify Tor connections. Like any other anonymizer, Tor uses different techniques to bypass your security. Just blocking tor and tor2web applications in the security policy is not enough. Specific configurations on the Palo Alto Networks Next-Generation firewall can block Tor application traffic on your network. Read more...

 

LIVE COMMUNITY ON YOUTUBE

#GetAnswers | YouTube

Join more than 3130 subscribers and other fans who are proudly responsible for 231,942 views of more than a hundred videos on the Live Community YouTube channel, where your questions always #GetAnswers.

 

Thank you for your views, comments and questions on YouTube. We also encourage you to post any questions about our YouTube videos right here in the Live Community, where members can share knowledge, ask and answer questions, and spread the good word about community.

 

NOW PLAYING ON YOUTUBE 

Malware vs Exploits: What’s the Difference?

@jhays

This video describes the differences between the two attack vectors to an endpoint and how each attack, if successful, is used to compromise an endpoint. Presented by John Hays, Security Training Engineer at Palo Alto Networks.

 

LIVE COMMUNITY ON TWITTER

#GetAnswers | Twitter

Check out our Live Community Twitter, and follow us for all the latest in the Live Community.

  

AROUND PALO ALTO NETWORKS 

Tweets 

LinkedIn/Facebook/Google+ Posts             

  • Learn how the latest version of Palo Alto Networks Traps expands ransomware protection for current and future threats http://bit.ly/2wsYquN
  • Key takeaways from the Palo Alto Networks Q1 FY18 NextWave Partner Huddle http://bit.ly/2w8jqrc
  • Sean Duca, CSO APAC at Palo Alto Networks, on the role board members play in preventing credential-theft. http://bit.ly/2eWd2fZ 

Endpoint

Threat

Partner

Events

 

 

Till next week--

Gail

@editeur

Ask Questions Get Answers Join the Live Community