Microsoft Ignite: Showcasing Our Cloud Offerings and the Depth of Our Microsoft Partnership

Share and earn Cybytes
Facebook Twitter LinkedIn Email

If you’ll be attending Microsoft Ignite in Orlando, Florida next week, we invite you to visit us at booth #606 to learn how the inline, API-based and workload-based enforcement and intelligence gathering points of our Security Operating Platform work together to protect our digital way of life on the network, in the cloud and on the endpoint.

In our booth, we’ll be highlighting:

  • How the VM-Series can be used to prevent threats from targeting your container workloads in Azure Kubernetes Service.
  • The latest updates to Evident that enable you to enforce Azure services configuration consistently across all of your subscriptions to eliminate potential security holes and compliance risks.
  • How Traps combines multiple methods of prevention to disrupt an attack before it can infect an endpoint on your network or a workload in Azure, effectively stopping it in its tracks.

In-Booth Presentation Schedule*

Monday, September 24: Show Floor Hours 12:30 – 7:30 PM
2:00 PM Protect Data in Office 365
4:00 PM Automating Azure Virtual WAN Connectivity
5:00 PM Gain the Upper Hand with Microsoft Security Graph & the Application Framework
Tuesday, September 25: Show Floor Hours 10 AM – 6 PM
11:30 AM Monitoring & Compliance for Azure
1:00 PM Enriching Windows Defender ATP With Third-Party Threat Intelligence
2:30 PM Protect Windows Endpoints & Servers
4:00 PM Securing Containers in Azure
Wednesday, September 26 Show Floor Hours 10 AM – 6 PM
11:30 AM Protect Data in Office 365
1:00 PM Protect Apps & Data in Azure
2:30 PM Monitoring & Compliance for Azure
4:00 PM Automating Azure Virtual WAN Connectivity
Thursday, September 27: Show Floor Hours 10 AM – 4 PM
11:30 AM Enriching Windows Defender ATP With 3rd Party Threat Intelligence
1:00 PM Securing Containers in Azure
3:00 PM Gain the Upper Hand with Microsoft Security Graph & the Application Framework

*Subject to change


In addition to the product presentations and demonstrations listed above, we’ll be showcasing several new integration efforts that are indicative of our ever-deepening relationship with Microsoft. As business and technology partners, Microsoft and Palo Alto Networks are working together on many different initiatives that help automate the use of threat intelligence and analytics to bring the power of numbers and automation to bear in the battle against cyberbreaches, including:

  • Microsoft Graph Security & the Application Framework: Using the Security Graph Provider App for the Application Framework, organizations can access alerts and other contextual information using the Microsoft Graph Security APIs to speed up their incident investigation and response to cyberthreats using a common API interface data model. Learn more at the booth or in sessions #BRK2102 and #THR2015. In addition, Francesco Vigo, principal solution architect for this integration effort will participate in session #BRK2404, where he will share his experiences in working with the Graph API.
  • Using Azure Information Protection Policies to Control Document Flow at the Firewall: This integration effort allows Palo Alto Networks Next-Generation Firewall users to detect documents that are using Azure Information Protection labels, allowing you to enforce policies that can prevent sensitive information from being sent outside of your organization. Visit the booth to learn more or attend session #THR3002.
  • Enriching Windows Defender ATP With Third-Party Threat Intelligence: Using MineMeld, customers can automate the delivery of third-party threat intelligence information from any of the 50+ supported sources or other, customer-defined sources to Microsoft Windows Advanced Threat Protection to more successfully gain the upper hand against attackers.
  • Automating Connectivity to Azure Virtual WAN: This integration effort automates VPN tunnel creation for a Palo Alto Networks firewall that is connecting to Microsoft Azure across the recently announced Azure Virtual WAN fabric. Learn more about the Azure Virtual WAN integration in our blog, during session #BRK2425, or swing by the booth.

Here are a few other sessions where you will learn how we can help protect your Microsoft infrastructure:

  • Session #BRK3384 Best Practices for Protecting Modern Cloud Application Architectures: The move to Azure is driving the adoption of modern cloud architectures that combine workloads, microservices, and platform services resulting in more agile, iterative delivery. To ensure workloads and data are protected, security must be embraced by a wide range of business groups, and it must be embedded into the application deployment process. This session covers the following topics: (1) security risks in the cloud (2) best practices for engaging developers, business groups, and compliance teams in a security conversation (3) the value of threat intelligence and applicability to securing Azure workloads and services.
  • Session #THR2287 – Is Your Office 365 Data Protected? SaaS applications like Microsoft Office 365 are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as:
    • Accidental data exposure with SharePoint
    • Uncontrolled use of personal OneDrive accounts
    • Data security violations in Exchange

Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance. This session covers how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.

If you cannot attend any of the sessions above, please swing by booth #606 to chat with the product experts who will be on hand to answer your questions.

The post Microsoft Ignite: Showcasing Our Cloud Offerings and the Depth of Our Microsoft Partnership appeared first on Palo Alto Networks Blog.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Palo Alto Networks
Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With our deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, customers can confidently pursue a digital-first strategy and embark on new technology initiatives, such as cloud and mobility. This kind of thinking and know-how helps customer organizations grow their business and empower employees all while maintaining complete visibility and the control needed to protect their critical control systems and most valued data assets. Our platform was built from the ground up for breach prevention, with threat information shared across security functions system-wide, and designed to operate in increasingly mobile, modern networks. By combining network, cloud and endpoint security with advanced threat intelligence in a natively integrated security platform, we safely enable all applications and deliver highly automated, preventive protection against cyberthreats at all stages in the attack lifecycle without compromising performance. Customers benefit from superior security to what legacy or point products provide and realize a better total cost of ownership.
Promoted Content
Unit 42 Report - Ransomware: Unlocking the Lucrative Criminal Business Model
Ransomware, specifically cryptographic ransomware, has quickly become one of the greatest cyber threats facing organizations around the world. This criminal business model has proven to be highly effective in generating revenue for cyber criminals in addition to causing significant operational impact to affected organizations. It is largely victim agnostic, spanning across the globe and affecting all major industry verticals. Small organizations, large enterprises, individual home users – everyone is a potential target. Ransomware has existed in various forms for decades, but in the last several years criminals have perfected the key components of these attacks. This has led to an explosion of new malware families and has drawn new actors into participating in these lucrative schemes.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?