{"id":38230,"date":"2017-07-15T04:00:06","date_gmt":"2017-07-15T11:00:06","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=38230"},"modified":"2017-07-13T14:08:11","modified_gmt":"2017-07-13T21:08:11","slug":"palo-alto-networks-news-week-july-15-2017","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/07\/palo-alto-networks-news-week-july-15-2017\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 July 15, 2017"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry \u2013 we\u2019ve rounded up our top news and views right here:<\/p>\n<ul>\n<li>We were excited to announce that Palo Alto Networks was named a <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/07\/palo-alto-networks-now-six-time-gartner-magic-quadrant-leader\/\">Gartner Magic Quadrant Leader<\/a> for the sixth consecutive year!<\/li>\n<li>The Unit 42 Threat Intelligence team shared new threat research:\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/07\/unit42-emea-bi-monthly-threat-reports-turkey-saudi-arabia-united-arab-emirates\/\">EMEA Bi-Monthly Threat Reports: Turkey, Saudi Arabia &amp; United Arab Emirates<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Eila Shargh shared how <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/07\/how-traps-protects-against-astrum\/\">Palo Alto Networks Traps advanced endpoint protection can keep you safe<\/a> against Astrum.<\/li>\n<li>John Davis shared insights into the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/07\/cso-gov-private-sector-can-contribute-governmental-efforts-deterring-cyberthreats\/\">importance of the private sector in governmental efforts<\/a> to deter cyberthreats.<\/li>\n<li>When innovation isn\u2019t a choice, but a must. Lucas Moody shared the importance of <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/07\/cd-when-theres-no-other-choice-but-innovation\/\">curiosity and exploration in cybersecurity<\/a>.<\/li>\n<li>Terry Young gave tips on how service providers can prevent <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/07\/sp-lets-prevent-5g-boundless-connectivity-providing-boundless-opportunity-cybercriminals\/\">\u201cboundless connectivity\u201d from providing \u201cboundless opportunity\u201d<\/a> for cybercriminals.<\/li>\n<li>This week\u2019s new Cyberpedia blog post discussed the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/07\/cyberpedia-point-endpoint-security\/\">importance of endpoint security<\/a>.<\/li>\n<\/ul>\n<p>Take a look at <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/248088\">Virtual Ultimate Test Drive With the VM-Series on Microsoft Azure <\/a><\/p>\n<ul>\n<li>July 17, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/255624\">Virtual Ultimate Test Drive - Next Generation Firewall<\/a><\/p>\n<ul>\n<li>July 17, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/263687\">Advanced Endpoint Protection Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>July 18, 2017<\/li>\n<li>Portland, OR<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/265589\">Enabling Cloud Security with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>July 18, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/265570\">Safely Enable SaaS Applications with Aperture<\/a><\/p>\n<ul>\n<li>July 18, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/240701\">NGFW: Next Generation Firewall Live Demo<\/a><\/p>\n<ul>\n<li>July 19, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/248092\">Virtual Ultimate Test Drive - Virtualized Data Center<\/a><\/p>\n<ul>\n<li>July 19, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/263841\">Advanced Endpoint Protection Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>July 19, 2017<\/li>\n<li>Kirkland, WA<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Catch up on the top Palo Alto Networks news of the week.<\/p>\n","protected":false},"author":153,"featured_media":20592,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[4081,3621,432,1155,2052,1643,937,778,586],"coauthors":[1515],"class_list":["post-38230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-culture-diversity","tag-cyberpedia","tag-emea","tag-gartner-magic-quadrant","tag-john-davis","tag-lucas-moody","tag-service-provider","tag-traps","tag-unit-42"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-generic-banner.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/38230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=38230"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/38230\/revisions"}],"predecessor-version":[{"id":38233,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/38230\/revisions\/38233"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20592"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=38230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=38230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=38230"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=38230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}