{"id":31234,"date":"2017-05-26T05:00:58","date_gmt":"2017-05-26T12:00:58","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=31234"},"modified":"2017-05-25T09:41:16","modified_gmt":"2017-05-25T16:41:16","slug":"ignite-2017-open-seats-rethink-security-saas-power-platform","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/05\/ignite-2017-open-seats-rethink-security-saas-power-platform\/","title":{"rendered":"Ignite 2017 Open Seats: Rethink Security for SaaS \u2013 Power of the Platform"},"content":{"rendered":"<p>Ignite \u201917 Security Conference is right around the corner. To get you ready for the premier security conference of the year, we\u2019ll be spotlighting our top session each day on the blog. <a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\">Register now<\/a>, seats fill up quickly!<\/p>\n<p>History has shown that when a significant security risk arises, a point solution is applied to address it. Playfully termed a Whack-a-Mole approach, this methodology of solving Cloud Access Security Broker (CASB) use-cases with an overlay proxy architecture is limited in many different ways. Defenses made up of multiple point products that do not integrate protections leave gaps that expose organizations to attack. This session will examine the various stages of real-world attacks targeting your SaaS applications and you will learn how to prevent these attacks at every single point in the security kill chain with a natively integrated Next-Generation Security Platform.<\/p>\n<hr \/>\n<p>\u00a0<\/p>\n<div class=\"quizz-container\" data-width=\"100%\" data-iframe-title=\"QUIZ: What Kind of Ignite Guardian Are You?\" data-height=\"auto\" data-quiz=\"385597\"><\/div>\n<p><script src=\"\/\/dcc4iyjchzom0.cloudfront.net\/widget\/loader.js\" async><\/script><\/p>\n<p class=\"p2\"><span class=\"s2\"><a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\"><b>Register\u00a0for Ignite \u201917 Security Conference <\/b><\/a><br \/>\n<i>Vancouver, BC June 12\u201315, 2017<\/i><\/span><\/p>\n<p class=\"p2\"><span class=\"s2\">Ignite \u201917 Security Conference is a live, four-day conference designed for today\u2019s security professionals. Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry. Visit the <a href=\"http:\/\/www.paloaltonetworksignite.com\/\" rel=\"nofollow,noopener\" ><span\u00a0class=\"s3\">Ignite website<\/span><\/a> for more information on tracks, workshops and marquee sessions.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ignite '17 is around the corner! Each day we'll be spotlighting our top session on the blog.  <\/p>\n","protected":false},"author":156,"featured_media":23630,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,99],"tags":[1869],"coauthors":[1546],"class_list":["post-31234","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","category-ignite","tag-ignite-2017"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/01\/ignite-17-banner-600x200-2.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/31234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=31234"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/31234\/revisions"}],"predecessor-version":[{"id":31240,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/31234\/revisions\/31240"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/23630"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=31234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=31234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=31234"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=31234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}