{"id":117895,"date":"2020-08-24T18:00:53","date_gmt":"2020-08-25T01:00:53","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=117895"},"modified":"2020-08-24T13:31:21","modified_gmt":"2020-08-24T20:31:21","slug":"netsec-hybrid-cloud-security","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/08\/netsec-hybrid-cloud-security\/","title":{"rendered":"Hybrid Cloud Security Sessions You Need to See"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">From the cloud to the data center and containers to mainframes, hybrid clouds form the world network security teams live in \u2013 and protecting these complicated and complex mixed environments has never been more critical. That\u2019s why you owe it to yourself to see two on-demand, <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/intelligent-network-security.html\"><span style=\"font-weight: 400;\">information-packed webinars<\/span><\/a><span style=\"font-weight: 400;\"> showing how to make sense of hybrid cloud security and take protective action across hybrid cloud infrastructures.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Originally aired in June as part of our launch of the world\u2019s first <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/products\/new\/pan-os\"><span style=\"font-weight: 400;\">ML-powered NGFW,<\/span><\/a><span style=\"font-weight: 400;\"> these data center and hybrid cloud sessions will walk you through the realities of a security landscape populated with containers as well as legacy apps, where security must be as close as possible to wherever your workloads are located.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Start with the \u201c4 Things You Need to Secure Your Hybrid Cloud\u201d session and get an exclusive look at the changing tide in infrastructure adoption that network security professionals need to understand. Your hosts are industry experts Doug Cahill, vice president and group director, cybersecurity, at the analyst firm ESG and Mukesh Gupta, vice president of product at Palo Alto Networks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Then explore in-depth views of the innovations we\u2019ve just announced for data centers and hybrid clouds and see a demonstration of <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/06\/network-cn-series\/\"><span style=\"font-weight: 400;\">the first NGFW for Kubernetes<\/span><\/a><span style=\"font-weight: 400;\">, the CN-Series container firewall, in \u201cWhat\u2019s New in Hybrid Cloud Security: Speed, Scalability and Containers.\u201d Here, Palo Alto Networks Senior Product Marketing Manager Alex Berger dives into these recent product launches and how they help secure data centers and hybrid environments \u2013 and is joined by Palo Alto Networks Product Line Manager Sudeep Padiyar, who deftly uses a <\/span><a href=\"https:\/\/unit42.paloaltonetworks.com\/graboid-first-ever-cryptojacking-worm-found-in-images-on-docker-hub\/\"><span style=\"font-weight: 400;\">Graboid cryptojacking worm<\/span><\/a><span style=\"font-weight: 400;\"> attack to demonstrate the power of the CN-Series.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Take a look below to find out what you\u2019ll gain from each session.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>See How Competitive Organizations Secure Complexity<\/h2>\n<p><span style=\"font-weight: 400;\">To understand how to move forward in increasingly complicated and interconnected environments, you need the lay of the land. In \u201c4 Things You Need to Secure Your Hybrid Cloud,\u201d you\u2019ll see just how complicated the networking landscape has become \u2013 and why solutions that provide comprehensive security everywhere are vital for business growth and longevity. <\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<figure id=\"attachment_117909\" aria-describedby=\"caption-attachment-117909\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:50.22%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-117909 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/08\/public-cloud1.png\" alt=\"The diagram shows the complex relationships between public clouds, private clouds, containers, hardware and virtual machines, illustrating the interconnectivity that makes hybrid cloud security both important and challenging. \" width=\"900\" height=\"452\" \/><\/span><\/div><figcaption id=\"caption-attachment-117909\" class=\"wp-caption-text\">Interconnectivity in hybrid clouds creates security complexity: public clouds, private clouds, containers, hardware and virtual machines must work together \u2013 and be secured holistically.<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Fortunately, there are solutions for securing these kitchen-sink networking environments many organizations rely upon. You\u2019ll learn about the latest trends in hybrid security and discover ways to:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Scale rapidly without retooling or dishing out more tasks to network security staff.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Establish a consistent security posture throughout your far-flung networking environment.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Gain more visibility and control of hybrid clouds to protect apps from advanced threats.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ensure that containers are given as much security attention as other parts of your network.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Extend ROI on older technology investments while safeguarding new cloud technology apps and today\u2019s rapid development cycles.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Plus, you\u2019ll hear Doug explain how other organizations are meeting hybrid cloud security challenges in their own heterogeneous infrastructures \u2013 and understand the facts, figures and best practices for container threat prevention and security automation.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>Watch Container Security Best Practices in Action \u2013 and More<\/h2>\n<p><span style=\"font-weight: 400;\">Then go further into just-announced hybrid multi-cloud solutions with Alex and Sudeep in \u201cWhat\u2019s New in Hybrid Cloud Security: Speed, Scalability and Containers.\u201d\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You\u2019ll get in-depth details about the CN-Series firewall, which provides <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/07\/network-cn-series-firewalls\/\"><span style=\"font-weight: 400;\">full NGFW, Layer 7 protection for Kubernetes<\/span><\/a><span style=\"font-weight: 400;\"> \u2013 and see Sudeep walk through the ways CN-Series can thwart attacks in a short, yet information-packed, product demonstration based on today\u2019s threat landscape in Kubernetes environments.\u00a0<\/span><\/p>\n<figure id=\"attachment_117922\" aria-describedby=\"caption-attachment-117922\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:58.78%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-117922 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/08\/Detailed-log.png\" alt=\"A screenshot from Sudeep Padiyar's demonstration in &quot;What's New in Hybrid Cloud Security: Speed, Scalability and Containers.&quot;\" width=\"900\" height=\"529\" \/><\/span><\/div><figcaption id=\"caption-attachment-117922\" class=\"wp-caption-text\">Detailed log view of Sudeep Padiyar\u2019s demonstration showing how Panorama policy and the CN-Series container firewall thwart a cryptojacking attack.<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Alex will also walk you through our latest innovations designed to help your organization:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Set container firewall policies in the way you expect from our hardware and virtual firewalls with the new Kubernetes plug-in for the Palo Alto Networks Panorama management platform.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Get more scale and performance in security for the hardware components of your hybrid infrastructure with a new data processing card (DPC), which turbocharges your existing Palo Alto Networks physical firewalls and enables the use of advanced capabilities like <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/08\/network-advances-in-decryption\/\"><span style=\"font-weight: 400;\">SSL decryption<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Get the most out of a new high-availability (HA) clustering feature to dynamically scale your security capacity across multi-data center environments<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">All these are important developments for network security teams, and more technical detail about container firewalls can be found at our <\/span><a href=\"https:\/\/live.paloaltonetworks.com\/t5\/blogs\/container-firewalls-give-hybrid-security-a-big-boost\/ba-p\/344695\"><span style=\"font-weight: 400;\">LIVEcommunity <\/span><span style=\"font-weight: 400;\">site<\/span><\/a><span style=\"font-weight: 400;\">. As Alex notes, \u201cFrom on-prem data centers and multiple public cloud environments \u2013 all of which are interconnected by this increasingly complex network \u2013 there's never been more traffic and it has never moved faster than in today's hybrid clouds.\u201d<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>Register Today to Tackle the Reality of Securing Hybrid Clouds<\/h2>\n<p><span style=\"font-weight: 400;\">There\u2019s also never a better time than the present to find solutions for security challenges today and tomorrow. Be sure to <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/intelligent-network-security.html\"><span style=\"font-weight: 400;\">register<\/span><\/a><span style=\"font-weight: 400;\"> and learn from these on-demand hybrid cloud security sessions. <\/span><span style=\"font-weight: 400;\">They\u2019re designed to help your organization safeguard data, workloads and applications across the world of your increasingly complex network. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hybrid cloud security explained: in-depth, on-demand sessions hosted by industry experts, featuring walk-throughs of new threat prevention solutions.<\/p>\n","protected":false},"author":663,"featured_media":117896,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6765],"tags":[7150,151,6731,111],"coauthors":[7273],"class_list":["post-117895","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-enterprise","tag-cn-series","tag-firewalls","tag-kubernetes","tag-ngfw","net_sec_category-hybrid-cloud-data-center","net_sec_category-next-generation-firewalls"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/08\/Server-room-blog.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/117895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=117895"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/117895\/revisions"}],"predecessor-version":[{"id":117935,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/117895\/revisions\/117935"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/117896"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=117895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=117895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=117895"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=117895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}