{"id":6415,"date":"2014-08-15T19:00:32","date_gmt":"2014-08-16T02:00:32","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6415"},"modified":"2021-03-22T08:37:05","modified_gmt":"2021-03-22T15:37:05","slug":"palo-alto-networks-news-week-august-15","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/08\/palo-alto-networks-news-week-august-15\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 August 15"},"content":{"rendered":"<p>Here\u2019s a roundup of this week\u2019s top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>Later this month we'll gather in San Francisco for VMworld. <a href=\"http:\/\/bit.ly\/1rir49s\" target=\"_blank\" rel=\"noopener\">Find out how you can engage with us while there<\/a>, including our scheduled live demonstrations, presentations from Nir Zuk, and more. While there, you\u2019ll be able to experience our integration with VMware NSX up close and personal to <a href=\"http:\/\/bit.ly\/1sZ275R\" target=\"_blank\" rel=\"noopener\">find out how<\/a> Palo Alto Networks Next-Generation Firewalls secure the software-defined data center.<\/p>\n<p><!--more--><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:27%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6346 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/PANW-at-vmworld-500x135.png\" alt=\"PANW at vmworld\" width=\"500\" height=\"135\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/PANW-at-vmworld-500x135.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/PANW-at-vmworld-230x62.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/PANW-at-vmworld-510x137.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/PANW-at-vmworld-148x40.png 148w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/PANW-at-vmworld.png 888w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Customer Perspective: <a href=\"http:\/\/bit.ly\/1ywUdAk\" target=\"_blank\" rel=\"noopener\">VMware NSX, Next-Generation Security and Micro-Segmentation<\/a> from John Spiegel, Global IS Communications Manager for Columbia Sportswear. <a href=\"http:\/\/bit.ly\/1ywUdAk\" target=\"_blank\" rel=\"noopener\">Check out Columbia\u2019s security journey<\/a>, and don't miss John's session us at VMworld on Tuesday, Aug 26, 2:30 pm.<\/p>\n<p>Palo Alto Networks has <a href=\"http:\/\/bit.ly\/1oOYzx3\" target=\"_blank\" rel=\"noopener\">uncovered<\/a> several new samples of attacks using Google Code for command and control.<\/p>\n<p>We're proud to <a href=\"http:\/\/bit.ly\/1rrUlia\" target=\"_blank\" rel=\"noopener\">announce<\/a> that three of our executives were recognized in CRN\u2019s Annual Top 100 Executives list, including Most Influential, Sales Leaders, and Top Disruptors.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:140%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6369 size-medium lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Zuk-Nir_reduced-230x322.jpg\" alt=\"Zuk, Nir_reduced\" width=\"230\" height=\"322\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Zuk-Nir_reduced-230x322.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Zuk-Nir_reduced-500x700.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Zuk-Nir_reduced-214x300.jpg 214w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Zuk-Nir_reduced-28x40.jpg 28w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Zuk-Nir_reduced.jpg 731w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/center><center><br \/>\n<div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:99.57%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6368 size-medium lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/myers_ron_palo_alto_networks400-230x229.jpg\" alt=\"myers_ron_palo_alto_networks400\" width=\"230\" height=\"229\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/myers_ron_palo_alto_networks400-230x229.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/myers_ron_palo_alto_networks400-100x100.jpg 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/myers_ron_palo_alto_networks400-300x300.jpg 300w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/myers_ron_palo_alto_networks400-40x40.jpg 40w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/myers_ron_palo_alto_networks400.jpg 400w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:128.7%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6367 size-medium lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Mark_McLaughlin_Executive_Photo-August-2009-230x296.jpg\" alt=\"Mark_McLaughlin_Executive_Photo August 2009\" width=\"230\" height=\"296\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Mark_McLaughlin_Executive_Photo-August-2009-230x296.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Mark_McLaughlin_Executive_Photo-August-2009-500x643.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Mark_McLaughlin_Executive_Photo-August-2009-232x300.jpg 232w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Mark_McLaughlin_Executive_Photo-August-2009-31x40.jpg 31w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/center><a href=\"http:\/\/bit.ly\/1vzCCeS\" target=\"_blank\" rel=\"noopener\"><br \/>\nTransforming Cybersecurity from the Most Expensive Self-Licking Ice Cream Cone<\/a>: Tim Treat discusses how business relationships, not speeds-and-feeds, get board members, C-level executives and prospects to more deeply understand cybersecurity.<\/p>\n<p>Congratulations to Abdelkrim, our <a href=\"http:\/\/bit.ly\/1uOZyTe\" target=\"_blank\" rel=\"noopener\">PA-7050 Picture It winner for July<\/a>! Don\u2019t forget to enter for a chance to be August\u2019s winner.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6364 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/img_20140704_143903-500x375.jpg\" alt=\"img_20140704_143903\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/img_20140704_143903-500x375.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/img_20140704_143903-230x172.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/img_20140704_143903-400x300.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/img_20140704_143903-53x40.jpg 53w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>We\u2019re proud to have two Palo Alto Networks experts, Scott Gainey and Scott Simkin, featured on a regular basis in SecurityWeek, one of the industry\u2019s premier trade publications. <a href=\"http:\/\/bit.ly\/1suX1j7\" target=\"_blank\" rel=\"noopener\">Learn more about what they\u2019ve shared already, and how to follow along<\/a>.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"450\"><span class=\"ar-custom\" style=\"padding-bottom:18.67%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6351 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/securityweek_high-res.png\" alt=\"securityweek_high res\" width=\"450\" height=\"84\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/securityweek_high-res.png 450w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/securityweek_high-res-230x42.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/securityweek_high-res-214x40.png 214w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/span><\/div><\/center>\"We can put a man on the moon, but we can't make software reliable?\" Find out more about what Rick Howard is referring to in <a href=\"http:\/\/ubm.io\/1paS3Fj\" target=\"_blank\" rel=\"noopener\">this Dark Reading article<\/a>.<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM0MA==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><br \/>\nWhen: August 20, 2014 from 9:00 AM - 10:00 AM PST<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI3NQ==\" target=\"_blank\" rel=\"noopener\">VMworld San Francisco<\/a><br \/>\nWhen: August 24, 2014 from 4:00 PM - 7:00 PM PST<br \/>\nWhere: San Francisco, CA<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjIyNg==\" target=\"_blank\" rel=\"noopener\">2014 Cyber, Identity and Financial Threats Symposium<\/a><br \/>\nWhen: August 26, 2014 from 8:30 AM - 5:30 PM GMT+10:00<br \/>\nWhere: Sanctuary Cove, QLD<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMzOQ==\" target=\"_blank\" rel=\"noopener\">Demo - n\u00e4e mit\u00e4 seuraavan sukupolven tietoturva tarkoittaa k\u00e4yt\u00e4nn\u00f6ss\u00e4<\/a> [Finnish]<br \/>\nWhen: August 26, 2014 from 3:00 PM - 4:00 PM EET<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM1Mw==\" target=\"_blank\" rel=\"noopener\">Expose the Underground<\/a> [Dutch]<br \/>\nWhen: August 26, 2014 from 9:00 AM - 2:00 PM CET<br \/>\nWhere: Zwolle<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMyMQ==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks demo - n\u00e4e mit\u00e4 seuraavan sukupolven tietoturva tar<\/a> [Finnish]<br \/>\nWhen: August 26, 2014 from 3:00 PM - 4:00 PM EET<br \/>\nWhere: Online<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI5OQ==\" target=\"_blank\" rel=\"noopener\">The Fraud &amp; Cyber Crime Group Symposium<\/a><br \/>\nWhen: August 26, 2014 from 7:00 AM - 5:00 PM GMT+10:00<br \/>\nWhere: Gold Coast, QLD<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMwNw==\" target=\"_blank\" rel=\"noopener\">Get Your Network up to Speed<\/a><br \/>\nWhen: August 27, 2014 from 10:30 AM - 2:30 PM EST<br \/>\nWhere: Jessup, MD<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM0Mw==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><br \/>\nWhen: August 27, 2014 from 9:00 AM - 10:00 AM PST<br \/>\nWhere: Online<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s a roundup of this week\u2019s top Palo Alto Networks news. &nbsp; Later this month we'll gather in San Francisco for VMworld. Find out how you can engage with us while there, &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,33,75,133,203],"tags":[394,610,175,69],"coauthors":[709],"class_list":["post-6415","post","type-post","status-publish","format-standard","hentry","category-announcement","category-application-advisoryanalysis","category-data-center-2","category-events","category-news-of-the-week","tag-pa7050pic","tag-annual-top-100-executives","tag-vmware","tag-wildfire"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6415"}],"version-history":[{"count":12,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6415\/revisions"}],"predecessor-version":[{"id":128782,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6415\/revisions\/128782"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6415"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}