{"id":22765,"date":"2016-12-22T05:00:47","date_gmt":"2016-12-22T13:00:47","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=22765"},"modified":"2016-12-30T08:10:38","modified_gmt":"2016-12-30T16:10:38","slug":"gov-what-palo-alto-networks-has-in-store-for-the-public-sector-in-2017","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/12\/gov-what-palo-alto-networks-has-in-store-for-the-public-sector-in-2017\/","title":{"rendered":"What Palo Alto Networks Has in Store for the Public Sector in 2017"},"content":{"rendered":"<p>We\u2019ve had some exciting activity in the U.S. federal sector at Palo Alto Networks over the past year and we have more in store for 2017 with the launch of our inaugural <a href=\"https:\/\/ignite.paloaltonetworks.com\/federal\/federaleventinfo.html\" target=\"_blank\">Federal Ignite<\/a> conference in Washington, D.C. next October. With the end of the year around the corner, I wanted to share more about the incredible momentum we\u2019ve had in the public sector in 2016 and preview what we have on deck in the new year.<\/p>\n<h3>Palo Alto Networks Launches Public Sector Subsidiary<strong><br \/>\n<\/strong><\/h3>\n<p>As we continue to expand our presence in the public sector, I\u2019m pleased to announce that we have recently launched a new federal subsidiary and public sector business unit, Palo Alto Networks Public Sector, LLC. We are committed to bringing our next-generation security platform to public sector customers who want to leverage our innovative breach prevention technology. Based in Reston, Virginia, the new subsidiary will work with our channel partners to provide Palo Alto Networks products and services to the U.S. government and will be exclusively focused on the U.S. federal marketplace.<\/p>\n<p>Cybersecurity is a top concern for every organization, especially federal entities. Legacy and point products that were built for another time are no longer able to thwart today\u2019s attackers, and are falling short in addressing today\u2019s cybersecurity challenges. Our next-generation security platform prevents threats across the entire attack lifecycle simply and seamlessly by automating security in a way that transcends individual capabilities and is easily deployed as either hardware or software, in the network, on endpoints and in the cloud.<\/p>\n<p>As president and director of the newly launched subsidiary, I\u2019m looking forward to working hand-in-hand with our Federal Chief Security Officer John Davis, who will serve as the subsidiary\u2019s Vice President, to continue our public sector momentum in in 2017.<\/p>\n<h3>Former FBI Cyber Division Leader Jim Trainor Joins Palo Alto Networks Public Sector Advisory Council<\/h3>\n<p>We\u2019re excited to announce that Jim Trainor, Senior Vice President of Aon\u2019s Cyber Solutions Group and former Assistant Director of the Federal Bureau of Investigation\u2019s (FBI) Cyber Division, has joined our Public Sector Advisory Council. In the final years of his distinguished two-decade career at the FBI, Jim led the bureau\u2019s Cyber Division and played a critical role in spearheading major high-profile investigations and managed numerous incidents at the nexus of cybercrime and national security. Jim also developed the FBI\u2019s strategies to combat emerging forms of cybercrime, such as ransomware.<\/p>\n<p>Our Public Sector Advisory Council is comprised of a distinguished group of retired military, intelligence, civilian and law enforcement leaders who advise the company on the cybersecurity challenges and technology needs of the world\u2019s governments. Jim\u2019s cybersecurity expertise and experience is an incredible asset to our council and we\u2019re thrilled to have him join our esteemed team of council members.<\/p>\n<h3>Palo Alto Networks Signs Agreement with DHS to Join Automated Indicator Sharing Program<\/h3>\n<p>Palo Alto Networks has signed an agreement with the U.S. Department of Homeland Security (DHS) to join Automated Indicator Sharing (AIS), the public-private sector cyber threat information sharing program established by the\u00a0Cybersecurity Act of 2015. \u00a0To participate in\u00a0the program, the company will be leveraging MineMeld\u2014a Palo Alto Networks-developed open\u00a0source information sharing platform that allows for the integration of multiple public, private and commercial intelligence feeds and sharing languages, including the STIX-formatted data used by the AIS program. Through our participation in AIS, Palo Alto Networks will receive cyber threat indicators from DHS in real-time via MineMeld, enabling greater visibility into new threats and providing better protection for our customers.<\/p>\n<h3>Save the Date: Palo Alto Networks Inaugural Federal Ignite Conference<\/h3>\n<p>Palo Alto Networks is hosting our first-ever <a href=\"https:\/\/ignite.paloaltonetworks.com\/federal\/federaleventinfo.html\" target=\"_blank\">Federal Ignite<\/a> conference in Washington, D.C. on <strong>Tuesday, October 24<\/strong> at the Grand Hyatt Washington. Our Federal Ignite conference reflects an evolution of our <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/07\/palo-alto-networks-federal-forum-brings-together-top-government-leaders-for-discussion-on-next-gen-threat-prevention\/\" target=\"_blank\">Federal Forum<\/a>, which in 2016 featured cybersecurity leaders from the White House, Congress, civilian agencies, the intelligence community and the military. 2016 keynotes included Federal CIO Tony Scott; U.S. Cyber Command Commander and NSA Director Admiral Mike Rogers; Congressman Will Hurd (R-Texas), who introduced his Modernizing Obsolete and Vulnerable Enterprise IT (MOVE IT) Act at the event; as well as our own CEO and Chairman Mark McLaughlin, who also serves as Chairman of the President\u2019s National Security and Telecommunications Advisory Committee.<\/p>\n<p>Join leading government, cyber and industry professionals for an interactive one-day discussion on breach prevention that\u2019s tailored exclusively for the U.S. federal market. Our Federal Ignite conference will offer highly technical, interactive and educational sessions that will provide actionable best practices to improve your organization\u2019s security posture and also provide qualification for CPE credits. Registration is <a href=\"https:\/\/ignite.paloaltonetworks.com\/federal\/index.html\" target=\"_blank\">now open<\/a> and stay tuned to this space for more event announcements- you won\u2019t want to miss it!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve had some exciting activity in the U.S. federal sector at Palo Alto Networks over the past year and we have more in store for 2017 with the launch of our inaugural &hellip;<\/p>\n","protected":false},"author":304,"featured_media":20199,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[484],"tags":[3100,123,3097,2311,284],"coauthors":[3094],"class_list":["post-22765","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government","tag-federal","tag-government2","tag-jim-trainor","tag-palo-alto-networks-federal-ignite","tag-public-sector"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/09\/government-web-banner-650x300.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/22765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/304"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=22765"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/22765\/revisions"}],"predecessor-version":[{"id":22982,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/22765\/revisions\/22982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20199"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=22765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=22765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=22765"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=22765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}