{"id":12632,"date":"2016-03-10T10:00:00","date_gmt":"2016-03-10T18:00:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=12632"},"modified":"2016-03-10T10:15:55","modified_gmt":"2016-03-10T18:15:55","slug":"maintaining-the-trust-when-minutes-matter","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/03\/maintaining-the-trust-when-minutes-matter\/","title":{"rendered":"Maintaining the Trust When Minutes Matter"},"content":{"rendered":"<p>If you\u2019re like most companies, a data breach can not only disrupt your business but also have far more devastating consequences to your customers, your employees, and your shareholders. You rely on your security infrastructure to protect you at all times. That\u2019s why it\u2019s more important than ever that you work with a security provider you can trust to keep your infrastructure safe from attacks.<\/p>\n<p>According to Brett Eldridge, senior vice president of global services at Palo Alto Networks:<!--more--><\/p>\n<p>\u201c<em>Our mission at Palo Alto Networks is to protect our way of life in the digital age by preventing successful cyberattacks. But what makes all the difference is great customer service that\u2019s powered by innovation and automation at every stage. When every minute matters, our entire support organization is there to make a difference for you.<\/em> \u201d<\/p>\n<p>To give you a better perspective, our support organization made this video that we hope expresses our passion for helping our customers.<\/p>\n<p><div class=\"styleIt\" style=\"width:500px;height:281px;\"><lite-youtube videoid=\"giL-CqqIv6M\" ><\/lite-youtube><\/div><\/p>\n<p>We believe that customer service is the key to a successful business, and Palo Alto Networks takes great pride in delivering an exceptional customer experience.<\/p>\n<p>To learn more about the recent awards that the Palo Alto Networks support organization has received, read my recent blog:\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/01\/palo-alto-networks-lauded-for-outstanding-customer-support-by-tsia-and-j-d-power\/\" target=\"_blank\">Palo Alto Networks Lauded for Outstanding Customer Support by TSIA and J.D. Power<\/a><\/p>\n<p>Please let me know if you have any comments or questions, or contact me via Twitter anytime at\u00a0<a href=\"https:\/\/twitter.com\/CicconeScott\" rel=\"nofollow,noopener\"  target=\"_blank\">@CicconeScott<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019re like most companies, a data breach can not only disrupt your business but also have far more devastating consequences to your customers, your employees, and your shareholders. You rely on &hellip;<\/p>\n","protected":false},"author":121,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155],"tags":[393,1693,838],"coauthors":[1118],"class_list":["post-12632","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","tag-customer","tag-j-d-power","tag-tsia"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/121"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=12632"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12632\/revisions"}],"predecessor-version":[{"id":12633,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12632\/revisions\/12633"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=12632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=12632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=12632"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=12632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}