Traps 4.1 continues to develop our innovative, multi-method prevention approach to endpoint security with a specific focus on preventing ransomware. New capabilities in Traps 4.1 monitor ransomware behavior and upon detection, shut down an attack and block new exploit techniques used in recent WannaCry and NotPetya attacks. This latest version also brings granular child process protection and DLL examination into a long list of Traps anti-malware preventions. Read more...
SHOWDOWN: TOR MEETS THE PALO ALTO NETWORKS FIREWALL
The Tor network disguises user identity by moving their data across different Tor servers, and encrypting that traffic so it isn't traced back to the user. Anyone who tries to trace would see traffic coming from random nodes on the Tor network, rather than the user's computer.
Palo Alto Networks has created applications such as tor and tor2web to identify Tor connections. Like any other anonymizer, Tor uses different techniques to bypass your security. Just blocking tor and tor2web applications in the security policy is not enough. Specific configurations on the Palo Alto Networks Next-Generation firewall can block Tor application traffic on your network. Read more...
Join more than 3130 subscribers and other fans who are proudly responsible for 231,942 views of more than a hundred videos on the Live Community YouTube channel, where your questions always #GetAnswers.
Thank you for your views, comments and questions on YouTube. We also encourage you to post any questions about our YouTube videos right here in the Live Community, where members can share knowledge, ask and answer questions, and spread the good word about community.
This video describes the differences between the two attack vectors to an endpoint and how each attack, if successful, is used to compromise an endpoint. Presented by John Hays, Security Training Engineer at Palo Alto Networks.