{"id":151919,"date":"2022-01-18T06:00:14","date_gmt":"2022-01-18T14:00:14","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=151919"},"modified":"2022-03-04T13:59:06","modified_gmt":"2022-03-04T21:59:06","slug":"the-vital-zero-trust-for-private-cloud-event","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2022\/01\/the-vital-zero-trust-for-private-cloud-event\/","title":{"rendered":"The Vital Zero Trust for Private Cloud Event"},"content":{"rendered":"<p>Private cloud security requires a Zero Trust approach to beat back multiple threats, which are growing in virulence, volume and sophistication. Get what you need to know in our upcoming workshop <a href=\"https:\/\/register.paloaltonetworks.com\/designanddeployzerotrust\">Design and Deploy Zero Trust for Enterprise Private Cloud<\/a> on March 29 from 10:00 AM to 12:00 PM PST. This event has been designed for you to make the most of the expertise of security visionaries and industry experts, including Founder and CTO Nir Zuk. He will walk you through practical Zero Trust architecture approaches for securing enterprise private clouds.<\/p>\n<div style=\"position: relative; display: block; max-width: 100%;\">\n<div style=\"padding-top: 56.25%;\"><iframe style=\"position: absolute; top: 0px; right: 0px; bottom: 0px; left: 0px; width: 100%; height: 100%;\" src=\"https:\/\/players.brightcove.net\/1050259881001\/default_default\/index.html?videoId=6291662786001\" allowfullscreen=\"allowfullscreen\" allow=\"encrypted-media\"><\/iframe><\/div>\n<\/div>\n<p><span style=\"font-weight: 400;\">During this hands-on, information-packed, two-hour session, you\u2019ll learn the essentials of meeting today\u2019s private cloud security challenges:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">How<\/span> <span style=\"font-weight: 400;\">and why<\/span> <span style=\"font-weight: 400;\">Palo Alto Networks Founder and CTO <\/span><span style=\"font-weight: 400;\">Nir Zuk envisions<\/span><span style=\"font-weight: 400;\"> the need for applying a <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/architecting-zero-trust-enterprise\"><span style=\"font-weight: 400;\">Zero Trust architecture<\/span><\/a><span style=\"font-weight: 400;\"> for your private cloud\u2019s digital transformation journey.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The application of Zero Trust best practices using virtual NGFWs in your own virtual datacenter through meaningful, hands-on labs.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">How to assemble needed tools for protecting enterprise applications and users against malware, ransomware and exfiltration.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ways to leverage the essential components of a complete Zero Trust network security platform.<\/span><\/li>\n<\/ul>\n<p><strong>The Shifting Perimeter Can Spell Big Trouble<\/strong><\/p>\n<p>For many organizations, the event can\u2019t happen soon enough. The unique and growing challenges of private cloud security move frighteningly fast, and the time to secure your core business applications, users and devices is <em>now<\/em>.<\/p>\n<p>Consider this. In the time it takes you to read this blog, malware can begin to encrypt your data the instant it gains entry into your network. In the few moments it takes you to complete a simple routine work task \u2013 responding to email, having a cup of coffee, preparing for a Zoom meeting \u2013 things can go sideways fast. In a recent Palo Alto Networks Unit 42 internal study, an advanced threat replicated itself, creating more than 45,000 instances in 30 minutes across an enterprise network. Imagine the risk to your critical enterprise applications and sensitive business data!<\/p>\n<p>As you\u2019ll discover at the event, enterprises now must deal with the changing perimeter, which blurs the once-familiar concept of inside and outside. Users, applications and devices can be simply anywhere and dynamically reconfigured at cloud speed. To compound this issue, enterprises now face other threats:<\/p>\n<ul>\n<li><strong>An Expanding Attack Surface<\/strong> \u2013 The at-home and mobile-work trend creates more and more possible entry points to attack the private cloud.<\/li>\n<li><strong>More Sophisticated Threats<\/strong> \u2013 They evade security systems with techniques such as morphing into variants and encrypting traffic between the malware and the external attacker.<\/li>\n<li><strong>Shorter Action Windows<\/strong> \u2013 Threats continue to get better at avoiding defenses and damaging data, applications, workloads and productivity much faster than in the past.<\/li>\n<\/ul>\n<p>Integrated business applications that are inside private clouds strain legacy security solutions and discrete point products. These are not flexible or powerful enough to meet the challenges of today's real-world internal and external application integrations. External application integration, of course, can gouge gaping holes in private cloud perimeters. And, internal integrations create expanding lateral network paths, which can accelerate malware spread across your business infrastructure.<\/p>\n<h4><a id=\"post-151919-_pgxwjk5b7xeq\"><\/a>Sign Up to Isolate Your Private Cloud From Threats, and Maintain Operational Capability<\/h4>\n<p><span style=\"font-weight: 400;\">We\u2019ve organized this event to help organizations stand firm as cyber dangers threaten to erode traditional perimeters. That\u2019s why the hands-on portion of the event has been designed to help you get started protecting core applications and sensitive data with <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/architecting-zero-trust-enterprise\"><span style=\"font-weight: 400;\">Zero Trust enterprise architecture<\/span><\/a><span style=\"font-weight: 400;\"> principles, including creating and overseeing smaller perimeters. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">You\u2019ll see why Zero Trust turns the traditional perimeter, network segments, and modern container boundaries on their heads by shifting the emphasis from implied trust to Zero Trust and allows you to take the protection of your critical data, applications, assets and services to a whole new level of security innovation.\u00a0<\/span><\/p>\n<figure id=\"attachment_151920\" aria-describedby=\"caption-attachment-151920\" style=\"width: 1822px\" class=\"wp-caption alignnone\"><div style=\"max-width:100%\" data-width=\"1822\"><span class=\"ar-custom\" style=\"padding-bottom:54.45%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-151920 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/01\/word-image-30.png\" alt=\"Graph of attack surface and protect surface for branch offices, SaaS applications, customers, partners, supply chains, and payment systems.\" width=\"1822\" height=\"992\" \/><\/span><\/div><figcaption id=\"caption-attachment-151920\" class=\"wp-caption-text\">Protect data and applications from external threats at the security perimeter and between workloads within the perimeter.<\/figcaption><\/figure>\n<p>So get ready for this event, its insights and its hands-on training. You\u2019ll get a head start on beating back growing private cloud threats. You can also prepare for your attendance with this in-depth eBook, <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/ebooks\/five-key-challenges-in-private-cloud-security\">Five Key Challenges in Private Cloud Security,<\/a> which will provide you with even more background about the essentials of a Network Security Platform vital for private cloud security.<\/p>\n<div class=\"c-message_kit__blocks c-message_kit__blocks--rich_text\">\n<div class=\"c-message__message_blocks c-message__message_blocks--rich_text\">\n<div class=\"p-block_kit_renderer\" data-qa=\"block-kit-renderer\">\n<div class=\"p-block_kit_renderer__block_wrapper p-block_kit_renderer__block_wrapper--first\">\n<div class=\"p-rich_text_block\" dir=\"auto\">\n<div class=\"p-rich_text_section\">We look forward to seeing you \u201cDesign and Deploy Zero Trust for Enterprise Private Cloud.\u201d The event's just around the corner, so be sure to\u00a0<a class=\"c-link\" tabindex=\"-1\" href=\"https:\/\/register.paloaltonetworks.com\/designanddeployzerotrustforent\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/register.paloaltonetworks.com\/designanddeployzerotrustforent\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">sign up<\/a> today.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Design and Deploy Zero Trust for Enterprise Private Cloud makes the most of the expertise of security visionaries and industry experts.<\/p>\n","protected":false},"author":723,"featured_media":151948,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,133,8152],"tags":[875,8263],"coauthors":[8289],"class_list":["post-151919","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","category-events","category-zero-trust-security","tag-private-cloud","tag-zero-trust-enterprise","cloud_sec_category-cloud-native-security-platform"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/01\/Meeting-2.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/151919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=151919"}],"version-history":[{"count":9,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/151919\/revisions"}],"predecessor-version":[{"id":156028,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/151919\/revisions\/156028"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/151948"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=151919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=151919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=151919"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=151919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}