{"id":15199,"date":"2016-07-05T06:00:32","date_gmt":"2016-07-05T13:00:32","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=15199"},"modified":"2019-05-20T13:21:16","modified_gmt":"2019-05-20T20:21:16","slug":"watch-security-lifecycle-review","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/07\/watch-security-lifecycle-review\/","title":{"rendered":"Watch: Security Lifecycle Review"},"content":{"rendered":"<p>Discover which applications and threats are exposing vulnerabilities in your security posture using our <a href=\"https:\/\/get.info.paloaltonetworks.com\/webApp\/security-lifecycle-review-risk-assessment-en\" target=\"_blank\" rel=\"noopener\">Security Lifecycle Review (SLR)<\/a>. Learn how you can benefit from our comprehensive SLR report\u00a0in this <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/videos\/slr\" target=\"_blank\" rel=\"noopener\">video<\/a> by Scott Simkin, Senior Threat Intelligence Manager.<\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<h3>Additional Resources<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/top-recommendations-to-prevent-ransomware\" target=\"_blank\" rel=\"noopener\">Whitepaper: Top Recommendations to Prevent Ransomware<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/techbriefs\/automated-correlation-engine-aag\" target=\"_blank\" rel=\"noopener\">At a Glance Automated Correlation Engine<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/videos\/aperture-secure-saas\" target=\"_blank\" rel=\"noopener\">Safely Enable SaaS<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/securing-system-application-vulnerabilities-on-the-network\" target=\"_blank\" rel=\"noopener\">Whitepaper: Securing System &amp; Application Vulnerabilities on the Network<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/cloud-security-data-center\" target=\"_blank\" rel=\"noopener\">Whitepaper: Top 3 Security Considerations for the Cloud<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Discover which applications and threats are exposing vulnerabilities in your security posture using our Security Lifecycle Review (SLR). Learn how you can benefit from our comprehensive SLR report\u00a0in this video by Scott &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,1229],"tags":[2158,2203],"coauthors":[716],"class_list":["post-15199","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-security-platform","tag-security-lifecycle-review","tag-slr"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/15199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=15199"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/15199\/revisions"}],"predecessor-version":[{"id":98658,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/15199\/revisions\/98658"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=15199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=15199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=15199"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=15199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}