{"id":6427,"date":"2014-08-18T00:01:00","date_gmt":"2014-08-18T07:01:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6427"},"modified":"2022-04-13T02:29:39","modified_gmt":"2022-04-13T09:29:39","slug":"like-technology-vote-palo-alto-networks","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/08\/like-technology-vote-palo-alto-networks\/","title":{"rendered":"Like Our Technology? Vote for Palo Alto Networks!"},"content":{"rendered":"<p><center><a href=\"http:\/\/www.storagemagazine.co.uk\/CS\/CSAwards\/?page=palo-csa2014vote\" rel=\"nofollow,noopener\"  \"><div style=\"max-width:100%\" data-width=\"406\"><span class=\"ar-custom\" style=\"padding-bottom:31.53%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6428 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227.png\" alt=\"EBA6A446-C190-439C-9DFB-A5B9FA842532[27]\" width=\"406\" height=\"128\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227.png 406w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227-230x72.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227-126x40.png 126w\" sizes=\"auto, (max-width: 406px) 100vw, 406px\" \/><\/span><\/div><\/a><\/center>&nbsp;<\/p>\n<p>It\u2019s time to rock the vote!<\/p>\n<p>Palo Alto Networks is a finalist for five categories in this year\u2019s <a href=\"http:\/\/www.storagemagazine.co.uk\/CS\/CSAwards\/?page=palo-csa2014vote\" target=\"_blank\" rel=\"noopener\">Computing Security Awards<\/a>:<\/p>\n<p>\u2022 Anti-Malware Solution of the Year for <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/wildfire\" target=\"_blank\" rel=\"noopener\">WildFire<\/a><br \/>\n\u2022 Mobile Security Solution of the Year for <a href=\"https:\/\/www.paloaltonetworks.com\/products\/globalprotect\" target=\"_blank\" rel=\"noopener\">GP-100<\/a><br \/>\n\u2022 Advanced Persistent Threat (APT) Solution of the Year for <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/wildfire\" target=\"_blank\" rel=\"noopener\">WildFire<\/a><br \/>\n\u2022 New Product of the Year for <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/wildfire\" target=\"_blank\" rel=\"noopener\">WildFire<\/a><br \/>\n\u2022 Security Company of the Year<br \/>\n<!--more--><\/p>\n<p>Organized by <a href=\"http:\/\/www.computingsecurity.co.uk\" target=\"_blank\" rel=\"noopener\">Computing Security Magazine<\/a>, these awards recognize the solutions and the solution-providers that are particularly impressive in the fight against security threats. Think Palo Alto Networks should win? Well, these awards are decided by you and only you, so please head here and vote for us now!<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:65.22%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-medium wp-image-6450 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Awards-Logos-finalist-jpeg-230x150.jpg\" alt=\"Awards Logos finalist jpeg\" width=\"230\" height=\"150\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Awards-Logos-finalist-jpeg-230x150.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Awards-Logos-finalist-jpeg-500x326.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Awards-Logos-finalist-jpeg-459x300.jpg 459w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Awards-Logos-finalist-jpeg-61x40.jpg 61w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Awards-Logos-finalist-jpeg.jpg 756w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/center><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,133],"tags":[323,621],"coauthors":[709],"class_list":["post-6427","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-events","tag-award","tag-computing-security-awards"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6427","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6427"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6427\/revisions"}],"predecessor-version":[{"id":6473,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6427\/revisions\/6473"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6427"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}