What Partners Learned at Our First “Born in the Cloud” Boot Camp

Share and earn Cybytes
Facebook Twitter LinkedIn Email


Want an insider’s take on the very first Palo Alto Networks BiC Boot Camp? Looking for ways to accelerate our mutual customers’ safe deployment to the cloud and get context on how to migrate to Palo Alto Networks? We’ve got you covered.

Last month, we hosted the inaugural BiC Boot Camp at our headquarters in Santa Clara, California. The event brought together cloud security professionals from strategic cloud partners for hands-on training, technical education and networking opportunities.

We created this event to help partners in their efforts to effectively reach the cloud architects who influence strategy and purchasing decisions. Over the week, course instructors covered topics ranging from Google Cloud Platform, AWS and Microsoft Azure to PAN-OS best practices, Aperture and Traps. Dean Darwin, VP of Sales and Channel Strategy, and Adam Geller, VP of Product Management, shared an in-depth look into our strategy for securing cloud and virtualized environments, mobile users, and distributed branches. Scott Stevens, SVP of Systems Engineering, led a special training for our traditional cloud service partners.

It was great to hear that our partners valued the time they spent with us that week. One partner said the boot camp included “nice, broad coverage of topic areas, useful labs, and the speakers were very knowledgeable.”

Another shared that they found a “good mix of high-level and ‘in the weeds’ technical information.”


Welcome Reception, 7/9


We’ll announce the next set of BiC Boot Camp dates and locations soon. In the meantime, NextWave Partners can take advantage of the self-guided cloud security instructional path and a wealth of additional cloud security content on the NextWave Partner portal.

Don’t forget to follow @NextWavePartner on Twitter for the latest partner updates. Not on Twitter? Join today!

The post What Partners Learned at Our First “Born in the Cloud” Boot Camp appeared first on Palo Alto Networks Blog.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Palo Alto Networks
Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With our deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, customers can confidently pursue a digital-first strategy and embark on new technology initiatives, such as cloud and mobility. This kind of thinking and know-how helps customer organizations grow their business and empower employees all while maintaining complete visibility and the control needed to protect their critical control systems and most valued data assets. Our platform was built from the ground up for breach prevention, with threat information shared across security functions system-wide, and designed to operate in increasingly mobile, modern networks. By combining network, cloud and endpoint security with advanced threat intelligence in a natively integrated security platform, we safely enable all applications and deliver highly automated, preventive protection against cyberthreats at all stages in the attack lifecycle without compromising performance. Customers benefit from superior security to what legacy or point products provide and realize a better total cost of ownership.
Promoted Content
Unit 42 Report - Ransomware: Unlocking the Lucrative Criminal Business Model
Ransomware, specifically cryptographic ransomware, has quickly become one of the greatest cyber threats facing organizations around the world. This criminal business model has proven to be highly effective in generating revenue for cyber criminals in addition to causing significant operational impact to affected organizations. It is largely victim agnostic, spanning across the globe and affecting all major industry verticals. Small organizations, large enterprises, individual home users – everyone is a potential target. Ransomware has existed in various forms for decades, but in the last several years criminals have perfected the key components of these attacks. This has led to an explosion of new malware families and has drawn new actors into participating in these lucrative schemes.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?