{"id":5811,"date":"2014-06-09T10:00:58","date_gmt":"2014-06-09T17:00:58","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5811"},"modified":"2014-08-05T09:50:59","modified_gmt":"2014-08-05T16:50:59","slug":"working-partners-true-enterprise-security-platform","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/06\/working-partners-true-enterprise-security-platform\/","title":{"rendered":"Working With Partners On a True Enterprise Security Platform"},"content":{"rendered":"<p>Last week we hosted a cybersecurity information event in Nieuwegein, The Netherlands, for more than 100 representatives from Palo Alto Networks partners in EMEA. It was another chance to discuss our strategy with key partners in the region, and explain how a next-generation firewall, next-generation endpoint protection and a next-generation threat intelligence cloud come together to provide customers a true enterprise security platform.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5812 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/IMG_4820-500x333.jpg\" alt=\"IMG_4820\" width=\"500\" height=\"333\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/IMG_4820-500x333.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/IMG_4820-230x153.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/IMG_4820-450x300.jpg 450w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/IMG_4820-60x40.jpg 60w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><!--more--><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5813 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/IMG_4821-500x333.jpg\" alt=\"IMG_4821\" width=\"500\" height=\"333\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/IMG_4821-500x333.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/IMG_4821-230x153.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/IMG_4821-450x300.jpg 450w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/IMG_4821-60x40.jpg 60w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>We are also pleased to announce several prize winners, who posted to social media using #AskPANW during the event and were automatically entered for a chance to win. Congratulations to Joost van der Meer of Securelink, Sjoerd de Jong of Lantech, and Johan Beuk of ION IP!<\/p>\n<p>Check out some of the social media conversation during the event.<\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\"><p>Any idea what kind of damage <a href=\"https:\/\/twitter.com\/search?q=%23malicious&amp;src=hash\" rel=\"nofollow,noopener\" >#malicious<\/a> Android <a href=\"https:\/\/twitter.com\/search?q=%23APK&amp;src=hash\" rel=\"nofollow,noopener\" >#APK<\/a> files can do to your business? <a href=\"https:\/\/twitter.com\/search?q=%23wildfire&amp;src=hash\" rel=\"nofollow,noopener\" >#wildfire<\/a> <a href=\"https:\/\/twitter.com\/search?q=%23GP&amp;src=hash\" rel=\"nofollow,noopener\" >#GP<\/a>-100 <a href=\"https:\/\/twitter.com\/search?q=%23AskPANW&amp;src=hash\" rel=\"nofollow,noopener\" >#AskPANW<\/a><\/p>\n<p>\u2014 Sjoerd de Jong (@sdjong) <a href=\"https:\/\/twitter.com\/sdjong\/statuses\/474182558214000640\" rel=\"nofollow,noopener\" >June 4, 2014<\/a><\/p><\/blockquote>\n<blockquote class=\"twitter-tweet\" lang=\"en\"><p>Wanneer is de Cyvera End Point Protection beschikbaar? <a href=\"https:\/\/twitter.com\/search?q=%23AskPANW&amp;src=hash\" rel=\"nofollow,noopener\" >#AskPANW<\/a><\/p>\n<p>\u2014 Ronald Schaper (@rmsschaper) <a href=\"https:\/\/twitter.com\/rmsschaper\/statuses\/474195392691965952\" rel=\"nofollow,noopener\" >June 4, 2014<\/a><\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\"><p>\nLive demo van <a href=\"https:\/\/twitter.com\/cyvera_ltd\" rel=\"nofollow,noopener\" >@cyvera_ltd<\/a> door <a href=\"https:\/\/twitter.com\/PaloAltoNtwks\" rel=\"nofollow,noopener\" >@PaloAltoNtwks<\/a> kijkje in de toekomst van endpoint security. <a href=\"https:\/\/twitter.com\/search?q=%23askpanw&amp;src=hash\" rel=\"nofollow,noopener\" >#askpanw<\/a> <a href=\"http:\/\/t.co\/LhXMgdOgub\">pic.twitter.com\/LhXMgdOgub<\/a><\/p>\n<p>\u2014 Reinier Rossen (@ReinierRossen) <a href=\"https:\/\/twitter.com\/ReinierRossen\/statuses\/474191455184252928\" rel=\"nofollow,noopener\" >June 4, 2014<\/a>\n<\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/p>\n<p>&nbsp;<\/p>\n<h3>For more<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/06\/check-out-highlights-video-from-our-emea-expert-tour\/\" target=\"_blank\">Check out photos and video from our recent EMEA Expert Tour, which brought partner engineering representatives to Marbella, Spain<\/a><\/li>\n<li><a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">Head to our Events page to see what's coming next to a city near you<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/partners\/\" target=\"_blank\">Read the Partners section of our blog for NextWave news and updates<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Last week we hosted a cybersecurity information event in Nieuwegein, The Netherlands, for more than 100 representatives from Palo Alto Networks partners in EMEA. It was another chance to discuss our strategy &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[598,133,78],"tags":[432,454,502,145,503],"coauthors":[],"class_list":["post-5811","post","type-post","status-publish","format-standard","hentry","category-endpoint-2","category-events","category-partners","tag-emea","tag-enterprise-security-platform","tag-next-generation-endpoint-protection","tag-next-generation-firewall","tag-next-generation-threat-intelligence-cloud"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5811"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5811\/revisions"}],"predecessor-version":[{"id":5820,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5811\/revisions\/5820"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5811"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}