{"id":4641,"date":"2014-02-07T05:00:01","date_gmt":"2014-02-07T13:00:01","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=4641"},"modified":"2022-04-05T03:05:39","modified_gmt":"2022-04-05T10:05:39","slug":"palo-alto-networks-news-week-february-7","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/02\/palo-alto-networks-news-week-february-7\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 February 7"},"content":{"rendered":"<p>Did you all have a good first week of February? In case you missed any <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a>, we accumulated it for you right here!<\/p>\n<p>The countdown began \u2013 <a href=\"http:\/\/bit.ly\/1kmwYUp\" target=\"_blank\" rel=\"noopener\">don\u2019t forget to sign up<\/a> to be one of the first in the know.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/connect.paloaltonetworks.com\/countdown\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:33.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-4644 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/PAN_Condor-500x166.gif\" alt=\"PAN_Condor\" width=\"500\" height=\"166\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/PAN_Condor-500x166.gif 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/PAN_Condor-230x76.gif 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/PAN_Condor-510x170.gif 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/PAN_Condor-120x40.gif 120w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><!--more--><\/p>\n<p>This week, we <a href=\"http:\/\/bit.ly\/1lyZLJv\" target=\"_blank\" rel=\"noopener\">announced the third addition<\/a> to the <a href=\"http:\/\/bit.ly\/1dpsvMg\" target=\"_blank\" rel=\"noopener\">Ignite 2014<\/a> keynote roster, Carl Eschenbach, president and COO of <a href=\"http:\/\/www.vmware.com\/\" target=\"_blank\" rel=\"noopener\">VMware<\/a>!<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"250\"><span class=\"ar-custom\" style=\"padding-bottom:120%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-4626 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/carl_eschenbach_headshot.jpg\" alt=\"carl_eschenbach_headshot\" width=\"250\" height=\"300\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/carl_eschenbach_headshot.jpg 250w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/carl_eschenbach_headshot-230x276.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/carl_eschenbach_headshot-33x40.jpg 33w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\" \/><\/span><\/div><\/center>Check out the <a href=\"http:\/\/bit.ly\/1gNgPJR\" target=\"_blank\" rel=\"noopener\">up-to-date list of Ignite 2014 speakers<\/a>, including Mark McLaughlin, Nir Zuk, and Lee Klarich.<\/p>\n<p>Exciting news was <a href=\"https:\/\/paloaltonetworks.com\/company\/press\/2014\/citrix-and-palo-alto-networks-team-to-deliver-consolidated-multi-tenant-network-security-and-adc-services-on-netscaler-sdx.html\" target=\"_blank\" rel=\"noopener\">announced<\/a>: <a href=\"http:\/\/bit.ly\/1gGTI3l\" target=\"_blank\" rel=\"noopener\">you can now deploy<\/a> <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/vm-series-virtual-next-generation-firewall\" target=\"_blank\" rel=\"noopener\">VM-Series<\/a> on the Citrix Netscaler SDX platform.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"448\"><span class=\"ar-custom\" style=\"padding-bottom:55.13%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-4645 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/citrix-panw.png\" alt=\"citrix panw\" width=\"448\" height=\"247\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/citrix-panw.png 448w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/citrix-panw-230x126.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/citrix-panw-72x40.png 72w\" sizes=\"auto, (max-width: 448px) 100vw, 448px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>In the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/tip-of-the-week\/\" target=\"_blank\" rel=\"noopener\">Tip of the Week<\/a>, we provided a <a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTgwOQ==\" target=\"_blank\" rel=\"noopener\">link to sign up<\/a> for a live webcast next Tuesday, February 11 at Noon ET. Our own <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/scott-simkin\/\" target=\"_blank\" rel=\"noopener\">Scott Simkin<\/a> and Raj Shah will lead a discussion covering threat prevention updates in <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/01\/pan-os-6-0-wildfire-delivers-breakthrough-visibility-unknown-malware-zero-day-exploits\/\" target=\"_blank\" rel=\"noopener\">PAN-OS 6.0<\/a> and <a href=\"https:\/\/paloaltonetworks.com\/products\/technologies\/wildfire.html\" target=\"_blank\" rel=\"noopener\">WildFire<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/rick\/\" target=\"_blank\" rel=\"noopener\">Rick Howard<\/a> added another book to his <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/cybersecurity-canon\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Canon<\/a>:<\/p>\n<ul>\n<li><a href=\"http:\/\/bit.ly\/1dn5oAC\" target=\"_blank\" rel=\"noopener\">Worm<\/a><\/li>\n<\/ul>\n<p>Palo Alto Networks is a platinum sponsor of <a href=\"http:\/\/bit.ly\/1dw6Y35\" target=\"_blank\" rel=\"noopener\">CyberEdge Group's 2014 Cyberthreat Defense Report<\/a>, developed from a recent survey of more than 750 IT security professionals across North America and Europe. Several of the report's key findings are captured in the <a href=\"http:\/\/bit.ly\/1fzt1Zc\" target=\"_blank\" rel=\"noopener\">infographic<\/a> below.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:308.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-4637 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/2014-CDR-Infographic2-500x1541.png\" alt=\"2014-CDR-Infographic[2]\" width=\"500\" height=\"1541\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/2014-CDR-Infographic2-500x1541.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/2014-CDR-Infographic2-230x709.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/2014-CDR-Infographic2-97x300.png 97w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/2014-CDR-Infographic2.png 600w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Did you all have a good first week of February? In case you missed any Palo Alto Networks news, we accumulated it for you right here! The countdown began \u2013 don\u2019t forget &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[317,118,315,251,217,1821,309,175,313],"coauthors":[709],"class_list":["post-4641","post","type-post","status-publish","format-standard","hentry","category-news-of-the-week","tag-carl-eschenbach","tag-citrix","tag-cyberedge","tag-cybersecurity-canon","tag-ignite-2014","tag-tip-of-the-week","tag-vm-series","tag-vmware","tag-webcast"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4641"}],"version-history":[{"count":10,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4641\/revisions"}],"predecessor-version":[{"id":128728,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4641\/revisions\/128728"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4641"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=4641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}