{"id":5199,"date":"2014-04-02T19:04:59","date_gmt":"2014-04-03T02:04:59","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5199"},"modified":"2014-04-02T19:07:07","modified_gmt":"2014-04-03T02:07:07","slug":"ignite-2014-day-3","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/04\/ignite-2014-day-3\/","title":{"rendered":"Ignite 2014 Day 3: A Next-Generation Security Platform"},"content":{"rendered":"<p>We\u2019ve come to the end of Ignite 2014 and we want to thank you for following all the action and providing so much feedback throughout your time here.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/03\/ignite-2014-day-1-discussing-future-enterprise-security\/\" target=\"_blank\">Day 1<\/a> and <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/04\/ignite-2014-day-2-highly-integrated-highly-automated\/\" target=\"_blank\">Day 2<\/a> of Ignite were both action-packed, and we didn\u2019t slow down for Day 3, kicking off with a range of customer, technical and industry sessions and heading into our closing keynote session, where we finally revealed our ultra top-secret guest speaker.<\/p>\n<p>Read on for details, and watch a video recap of Day 3.<\/p>\n<p><div class=\"styleIt\" style=\"width:auto;height:auto;\"><lite-youtube videoid=\"2id10kvSdxU\" ><\/lite-youtube><\/div><\/p>\n<p><!--more--><\/p>\n<p>After a busy morning, Mark McLaughlin returned to the stage and welcomed <strong>General Keith Alexander<\/strong>, former director of the National Security Agency (NSA) and our Ignite 2014 secret keynote speaker, making his first speech as a civilian. Mark and General Alexander discussed the current cybersecurity landscape and stressed the importance of government-industry collaboration to address today\u2019s toughest security challenges.<\/p>\n<p>Next to the stage was Lee Klarich, Palo Alto Networks SVP, Product Management, who discussed recent innovations in the Palo Alto Networks technology portfolio and re-emphasized our commitment to a platform approach of next-generation firewall, next-generation thread cloud and next-generation endpoint security.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5210 lozad\" alt=\"IGNITE-LeeKlarich-0402_0095\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/IGNITE-LeeKlarich-0402_0095-500x334.jpg\" width=\"500\" height=\"334\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/IGNITE-LeeKlarich-0402_0095-500x334.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/IGNITE-LeeKlarich-0402_0095-230x154.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/IGNITE-LeeKlarich-0402_0095-447x300.jpg 447w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/IGNITE-LeeKlarich-0402_0095-59x40.jpg 59w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/IGNITE-LeeKlarich-0402_0095.jpg 1024w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Lee also brought up Rick Howard, Palo Alto Networks Chief Security Officer, to officially unveil <strong>Unit 42<\/strong>, the new Palo Alto Networks threat intelligence team.\u00a0If you checked your seat during the keynote, you received the\u00a0<strong>Unit 42 Threat Landscape Review. <\/strong>Read through and\u00a0learn how e-mail, common infrastructure and known malware families drive today\u2019s attacks -- and get ready for much more from the Unit 42 team in the coming weeks and months.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5212 lozad\" alt=\"UNIT42-Teaser\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/UNIT42-Teaser-500x333.jpg\" width=\"500\" height=\"333\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/UNIT42-Teaser-500x333.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/UNIT42-Teaser-230x153.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/UNIT42-Teaser-449x300.jpg 449w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/UNIT42-Teaser-59x40.jpg 59w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/UNIT42-Teaser.jpg 1024w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Last up was Nir Zuk, Palo Alto Networks CTO, who as usual offered a no-holds-barred perspective on the shifting security landscape and the continued growth and momentum of the company he co-founded less than a decade ago.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5211 lozad\" alt=\"IGNITE-NirClosing-0402_0142\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/IGNITE-NirClosing-0402_0142-500x333.jpg\" width=\"500\" height=\"333\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/IGNITE-NirClosing-0402_0142-500x333.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/IGNITE-NirClosing-0402_0142-230x153.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/IGNITE-NirClosing-0402_0142-449x300.jpg 449w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/IGNITE-NirClosing-0402_0142-59x40.jpg 59w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/IGNITE-NirClosing-0402_0142.jpg 1024w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>With so much continued expansion of the Palo Alto Networks portfolio -- from the release of PAN OS 6.0 and our PA-7050 next-generation firewall to our acquisitions of Morta Security and Cyvera -- rest assured you'll be hearing much more from Mark, Nir, Lee and all of our executives and thought leaders.<\/p>\n<p>A few more things we want to draw your attention to as we conclude our time together in Las Vegas:<\/p>\n<p>We honored Parmy Olson, Forbes editor, author and speaker, as <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/04\/announcing-cybersecurity-canon-honors-ignite-2014\/\" target=\"_blank\">the first inductee into our Cybersecurity Canon<\/a>. Parmy appeared with Rick Howard to talk about her landmark 2012 book We Are Anonymous, take questions from fellow cybersecurity experts, and sign a few books. Keep reading Rick\u2019s regular<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/cybersecurity-canon\/\" target=\"_blank\"> Cybersecurity Canon entries<\/a> and let us know who you\u2019d like to see inducted into the Canon next year.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:130.87%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-medium wp-image-5174 aligncenter lozad\" alt=\"01BOOK-popup\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/01BOOK-popup-230x301.jpg\" width=\"230\" height=\"301\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/01BOOK-popup-230x301.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/01BOOK-popup-500x654.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/01BOOK-popup-229x300.jpg 229w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/01BOOK-popup-30x40.jpg 30w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/01BOOK-popup.jpg 650w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>And, oh yes\u2026the winner of our <strong>#IgniteSelfie<\/strong> contest! We had a lot of inspired entries throughout the past two days, but we\u2019re pleased to announce <a href=\"https:\/\/twitter.com\/slyyy\" rel=\"nofollow,noopener\"  target=\"_blank\">@slyyy<\/a> as our big winner. Congratulations to Sylvain Roy, perimeter security engineer at The Herjavec Group, a Palo Alto Networks partner based in Toronto. Check out his winning selfie, co-starring Teller from famed magician-comedy duo Penn &amp; Teller:<\/p>\n<p>&nbsp;<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5200 lozad\" alt=\"BkHMT-vCYAAYPUl\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/BkHMT-vCYAAYPUl-500x375.jpg\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/BkHMT-vCYAAYPUl-500x375.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/BkHMT-vCYAAYPUl-230x172.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/BkHMT-vCYAAYPUl-400x300.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/BkHMT-vCYAAYPUl-53x40.jpg 53w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/BkHMT-vCYAAYPUl.jpg 600w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>We hope you\u2019ve enjoyed Ignite season, and keep watching this space over the next few weeks as we continue share photos, videos and other highlights from the largest gathering of enterprise security experts in the world. And if you couldn\u2019t be with us in Las Vegas this year, join us one year from now at <strong>Ignite 2015<\/strong>, March 30-April 1 right back here at The Cosmopolitan.<\/p>\n<p>Here\u2019s a last look at what Ignite attendees are saying on Twitter. The show may be over, but the conversation continues \u2013 keep following <a href=\"https:\/\/twitter.com\/Ignite_Conf\" rel=\"nofollow,noopener\"  target=\"_blank\">@Ignite_Conf<\/a> and let us know what you think.<\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\"><p>Active defense is a huge topic at <a href=\"https:\/\/twitter.com\/search?q=%23Ignite2014&amp;src=hash\" rel=\"nofollow,noopener\" >#Ignite2014<\/a>. Don't hack back but frustrate, identify, and waste the time of your attackers.<\/p>\n<p>\u2014 William Reyor (@WReyor) <a href=\"https:\/\/twitter.com\/WReyor\/statuses\/451427219064123393\" rel=\"nofollow,noopener\" >April 2, 2014<\/a><\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\"><p>Wow, presentation by Cyvera at <a href=\"https:\/\/twitter.com\/search?q=%23Ignite2014&amp;src=hash\" rel=\"nofollow,noopener\" >#Ignite2014<\/a> is very interesting, makes you wonder why modern antivirus is written as poorly as it is<\/p>\n<p>\u2014 Mike Lutgen (@lukky753) <a href=\"https:\/\/twitter.com\/lukky753\/statuses\/451397572423208960\" rel=\"nofollow,noopener\" >April 2, 2014<\/a><\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\"><p><a href=\"https:\/\/twitter.com\/Ignite_Conf\" rel=\"nofollow,noopener\" >@Ignite_Conf<\/a> Thank you for making the secret speaker one worth waiting for. <a href=\"https:\/\/twitter.com\/search?q=%23Ignite2014&amp;src=hash\" rel=\"nofollow,noopener\" >#Ignite2014<\/a> <a href=\"http:\/\/t.co\/ILJcmGQ5H2\">pic.twitter.com\/ILJcmGQ5H2<\/a><\/p>\n<p>\u2014 Riccardo Spadola (@rspadola) <a href=\"https:\/\/twitter.com\/rspadola\/statuses\/451497250296848384\" rel=\"nofollow,noopener\" >April 2, 2014<\/a><\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\"><p>Lee Klarich discussing importance of Cyvera's unique endpoint security technology. <a href=\"https:\/\/twitter.com\/search?q=%23Ignite2014&amp;src=hash\" rel=\"nofollow,noopener\" >#Ignite2014<\/a> <a href=\"https:\/\/twitter.com\/search?q=%23cybersecurity&amp;src=hash\" rel=\"nofollow,noopener\" >#cybersecurity<\/a> <a href=\"http:\/\/t.co\/mXfPDQz9oA\">pic.twitter.com\/mXfPDQz9oA<\/a><\/p>\n<p>\u2014 Cyvera (@cyvera_ltd) <a href=\"https:\/\/twitter.com\/cyvera_ltd\/statuses\/451501359020257280\" rel=\"nofollow,noopener\" >April 2, 2014<\/a><\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\"><p>Adam Mansour from Spyders hacking the hackers live on stage at <a href=\"https:\/\/twitter.com\/search?q=%23Ignite2014&amp;src=hash\" rel=\"nofollow,noopener\" >#Ignite2014<\/a> <a href=\"http:\/\/t.co\/EPXwvxyH2K\">pic.twitter.com\/EPXwvxyH2K<\/a><\/p>\n<p>\u2014 Kevin Magee (@kevinamagee) <a href=\"https:\/\/twitter.com\/kevinamagee\/statuses\/451469194609975297\" rel=\"nofollow,noopener\" >April 2, 2014<\/a><\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve come to the end of Ignite 2014 and we want to thank you for following all the action and providing so much feedback throughout your time here. Day 1 and Day &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[99],"tags":[392,217,395],"coauthors":[],"class_list":["post-5199","post","type-post","status-publish","format-standard","hentry","category-ignite","tag-igniteselfie","tag-ignite-2014","tag-recap"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5199"}],"version-history":[{"count":12,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5199\/revisions"}],"predecessor-version":[{"id":5215,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5199\/revisions\/5215"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5199"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}