Attending Google Cloud Next ‘18? Come See Us to Learn More about Safely Deploying Apps and Data to

Share and earn Cybytes
Facebook Twitter LinkedIn Email

If you’ll be at Google Cloud Next ‘18 in San Francisco next week, we invite you to come see us to learn more about how we’re working with Google to address the security challenges companies face as they move applications and data to Google Cloud Platform.

Where you’ll find us:

Expo Hall: Booth #W3008 (West Hall)

We’ll showcase a proof of concept demo with VM-Series virtual firewall securing container workloads in Kubernetes environments. We’ll be there all week so swing by and visit.

  • Tuesday, July 24
    • 10:30- 5:30 pm
  • Wednesday, July 25
    • 10:30- 5:30 pm
  • Thursday, July 26
    • 9:00- 2:30 pm


Session: Cloud Security Command Center: Visibility, Insights and Control of Your Threats, Risks and Vulnerabilities on Google Cloud Platform

When: Tuesday, July 24 at 4:35 PM (SEC102)

In this session, we will highlight the joint effort that integrates Cloud Security Command Center with the Application Framework. VM-Series and Traps logs are surfaced in the Cloud Security Command Center app for Application Framework, providing greater visibility into security logs within the Google Cloud Platform deployment. The Cloud Security Command Center app can also take advantage of AutoFocus and MineMeld to surface additional context on threats detected which then can be translated into dynamic policy updates to block threats via the VM-Series.



Session: A Customer Centric Perspective: Protecting Cloud-Native Applications with Google and Palo Alto Networks

When: Wednesday, July 25 at 11:00 AM (SEC220)

As organizations migrate existing applications and simultaneously build new cloud-native applications on Google Cloud Platform, security needs to be consistent across the underlying application infrastructure. Together with Google, Cardinal Health and FTD, we’ll share our approach and best practices for securing virtualized workloads and Kubernetes managed workloads running on Google Cloud Platform.


Pod Talk: Protecting Your Kubernetes Workloads with Google and Palo Alto Networks: What You Need to Know

When: Wednesday, July 25 at 3:30 PM (West Theater)

As container technology continues to mature, organizations are accelerating their adoption for increased application deployment speed and development efficiencies. However, security remains a top concern impacting container technology adoption. We will review key security considerations you should plan for addressing container security in GKE environments and showcase a demo around securing your workloads in GKE with Palo Alto Networks VM-Series virtual firewall.


View more information about Google Cloud Next ’18 here.

The post Attending Google Cloud Next ‘18? Come See Us to Learn More about Safely Deploying Apps and Data to Google Cloud appeared first on Palo Alto Networks Blog.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Palo Alto Networks
Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With our deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, customers can confidently pursue a digital-first strategy and embark on new technology initiatives, such as cloud and mobility. This kind of thinking and know-how helps customer organizations grow their business and empower employees all while maintaining complete visibility and the control needed to protect their critical control systems and most valued data assets. Our platform was built from the ground up for breach prevention, with threat information shared across security functions system-wide, and designed to operate in increasingly mobile, modern networks. By combining network, cloud and endpoint security with advanced threat intelligence in a natively integrated security platform, we safely enable all applications and deliver highly automated, preventive protection against cyberthreats at all stages in the attack lifecycle without compromising performance. Customers benefit from superior security to what legacy or point products provide and realize a better total cost of ownership.
Promoted Content
Unit 42 Report - Ransomware: Unlocking the Lucrative Criminal Business Model
Ransomware, specifically cryptographic ransomware, has quickly become one of the greatest cyber threats facing organizations around the world. This criminal business model has proven to be highly effective in generating revenue for cyber criminals in addition to causing significant operational impact to affected organizations. It is largely victim agnostic, spanning across the globe and affecting all major industry verticals. Small organizations, large enterprises, individual home users – everyone is a potential target. Ransomware has existed in various forms for decades, but in the last several years criminals have perfected the key components of these attacks. This has led to an explosion of new malware families and has drawn new actors into participating in these lucrative schemes.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?