{"id":14901,"date":"2016-06-22T14:00:20","date_gmt":"2016-06-22T21:00:20","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=14901"},"modified":"2016-10-04T15:23:51","modified_gmt":"2016-10-04T22:23:51","slug":"watch-prevention-against-targeted-phishing-attacks","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/06\/watch-prevention-against-targeted-phishing-attacks\/","title":{"rendered":"Watch: Prevention Against Targeted Phishing Attacks"},"content":{"rendered":"<p>In this Lightboard session, Martin Walter explains how the integration of Palo Alto Networks global <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/subscriptions\/url-filtering-pandb\" target=\"_blank\">URL Filtering service (PAN-DB)<\/a> works with the single-pass architecture of our <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/next-generation-firewall\" target=\"_blank\">next- generation firewalls<\/a> and our <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/threat-intelligence-cloud\" target=\"_blank\">Threat Intelligence Cloud<\/a> to allow you to safely enable web access while protecting against malware or phishing sites.<\/p>\n<p><div class=\"styleIt\" style=\"width:500px;height:281px;\"><lite-youtube videoid=\"ul6at9WR_6U\" ><\/lite-youtube><\/div><\/p>\n<p><!--more--><\/p>\n<h3>Learn more<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/subscriptions\/url-filtering-pandb\" target=\"_blank\">Visit the resource page for PAN-DB, our URL Filtering service<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/single-pass-parallel-processing-architecture\" target=\"_blank\">Download this whitepaper on Single-Pass Architecture<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/playlist?list=PLqATPiC_Bcl-t8vrzZlnGi3HTurs9Yuf3\" rel=\"nofollow,noopener\"  target=\"_blank\">Watch additional videos in our Lightboard series<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In this Lightboard session, Martin Walter explains how the integration of Palo Alto Networks global URL Filtering service (PAN-DB) works with the single-pass architecture of our next- generation firewalls and our Threat &hellip;<\/p>\n","protected":false},"author":40,"featured_media":20592,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,5,604,1229],"tags":[745,208,1174,69],"coauthors":[716],"class_list":["post-14901","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-2","category-firewall","category-lightboard","category-security-platform","tag-pan-db","tag-phishing","tag-threat-intelligence-cloud","tag-wildfire"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-generic-banner.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=14901"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14901\/revisions"}],"predecessor-version":[{"id":14913,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14901\/revisions\/14913"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20592"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=14901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=14901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=14901"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=14901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}