Channel Scoop – October 19, 2018

Share and earn Cybytes
Facebook Twitter LinkedIn Email

Sit back, relax and enjoy this week’s Channel Scoop.


  • The opportunity is here. Seize it. Fiscal year ’19 is under way and we are already in the home stretch for Q1. At the beginning of this quarter, Karl Soderlund stepped into his new role as SVP WW Channels. In the last few months he has met with numerous NextWave partners, distributors and our mutual customers around the world. He recorded a message for NextWave partners in which he shares the insight he gained from these meetings, the evolution taking place in the cybersecurity industry and the tremendous opportunity it creates for our mutual success. View the video message from Karl Soderlund.
  • Palo Alto Networks announces our new president. Amit K. Singh was named president, effective November 1, 2018. Singh succeeds Mark Anderson, who will move into an advisory role until May 1, 2019. Previously, Singh was the president of Google Cloud and, most recently, Google’s vice president of business and operations in emerging computing platforms, including augmented and virtual reality. He established and helped scale the Google Cloud business, leading several thousand people and growing it into a multibillion-dollar business. Read more.
  • The RedLock acquisition is complete. Palo Alto Networks will combine the Evident and RedLock technologies to provide customers with cloud security analytics, advanced threat detection, continuous security, and compliance monitoring in a single offering anticipated early next year. Read more.
  • The Gartner Magic Quadrant campaign for partners is available. Gartner’s Magic Quadrant for Enterprise Network Firewalls report provides a comprehensive overview of the market, including research and key players. Share the report with your customers using the toolkits included in this campaign package.
  • Detecting malicious campaigns with machine learning. Unit 42 is always working to find new ways to protect customers and prevent successful attacks, and one recent addition to our research arsenal is the use of unsupervised machine learning on large datasets of domain information. This blog post gives some details and examples of how they are using this unsupervised machine learning. Specifically, in one recent phishing campaign, they found 333 active domains. Read more.

The post Channel Scoop – October 19, 2018 appeared first on Palo Alto Networks Blog.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Palo Alto Networks
Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With our deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, customers can confidently pursue a digital-first strategy and embark on new technology initiatives, such as cloud and mobility. This kind of thinking and know-how helps customer organizations grow their business and empower employees all while maintaining complete visibility and the control needed to protect their critical control systems and most valued data assets. Our platform was built from the ground up for breach prevention, with threat information shared across security functions system-wide, and designed to operate in increasingly mobile, modern networks. By combining network, cloud and endpoint security with advanced threat intelligence in a natively integrated security platform, we safely enable all applications and deliver highly automated, preventive protection against cyberthreats at all stages in the attack lifecycle without compromising performance. Customers benefit from superior security to what legacy or point products provide and realize a better total cost of ownership.
Promoted Content
Unit 42 Report - Ransomware: Unlocking the Lucrative Criminal Business Model
Ransomware, specifically cryptographic ransomware, has quickly become one of the greatest cyber threats facing organizations around the world. This criminal business model has proven to be highly effective in generating revenue for cyber criminals in addition to causing significant operational impact to affected organizations. It is largely victim agnostic, spanning across the globe and affecting all major industry verticals. Small organizations, large enterprises, individual home users – everyone is a potential target. Ransomware has existed in various forms for decades, but in the last several years criminals have perfected the key components of these attacks. This has led to an explosion of new malware families and has drawn new actors into participating in these lucrative schemes.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?