{"id":6565,"date":"2014-08-31T18:00:57","date_gmt":"2014-09-01T01:00:57","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6565"},"modified":"2022-04-13T02:26:23","modified_gmt":"2022-04-13T09:26:23","slug":"dont-forget-vote-palo-alto-networks","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/08\/dont-forget-vote-palo-alto-networks\/","title":{"rendered":"Don't Forget to Vote for Palo Alto Networks!"},"content":{"rendered":"<p><a href=\"http:\/\/www.storagemagazine.co.uk\/CS\/CSAwards\/?page=palo-csa2014vote\" rel=\"nofollow,noopener\" ><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:31.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6428 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227.png\" alt=\"EBA6A446-C190-439C-9DFB-A5B9FA842532[27]\" width=\"500\" height=\"158\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227.png 406w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227-230x72.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227-126x40.png 126w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>We're a finalist for five categories in this year's Computing Security Awards, and the vote is decided by you! Head on over to the <a href=\"http:\/\/www.storagemagazine.co.uk\/CS\/CSAwards\/?page=palo-csa2014vote\" target=\"_blank\" rel=\"noopener\">awards site<\/a> if you're in the mood to show us some love.<!--more--><\/p>\n<ul>\n<li>Anti-Malware Solution of the Year for\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/wildfire\" target=\"_blank\" rel=\"noopener\">WildFire<\/a><\/li>\n<li>Mobile Security Solution of the Year for\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/products\/globalprotect\" target=\"_blank\" rel=\"noopener\">GP-100<\/a><\/li>\n<li>Advanced Persistent Threat (APT) Solution of the Year for\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/wildfire\" target=\"_blank\" rel=\"noopener\">WildFire<\/a><\/li>\n<li>New Product of the Year for\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/wildfire\" target=\"_blank\" rel=\"noopener\">WildFire<\/a><\/li>\n<li>Security Company of the Year<\/li>\n<\/ul>\n<p>Organized by\u00a0<a href=\"http:\/\/www.computingsecurity.co.uk\/\" target=\"_blank\" rel=\"noopener\">Computing Security Magazine<\/a>, these awards recognize the top solutions and the solution-providers in the fight against security threats. Thanks for keeping Palo Alto Networks in the running!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We're a finalist for five categories in this year's Computing Security Awards, and the vote is decided by you! Head on over to the awards site if you're in the mood to &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,133],"tags":[323,621,100,69],"coauthors":[709],"class_list":["post-6565","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-events","tag-award","tag-computing-security-awards","tag-globalprotect","tag-wildfire"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6565"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6565\/revisions"}],"predecessor-version":[{"id":6566,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6565\/revisions\/6566"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6565"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}