{"id":6777,"date":"2014-09-23T06:00:12","date_gmt":"2014-09-23T13:00:12","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6777"},"modified":"2014-09-23T10:41:26","modified_gmt":"2014-09-23T17:41:26","slug":"network-segmentation-learn-best-practices-defense-financial-services","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/09\/network-segmentation-learn-best-practices-defense-financial-services\/","title":{"rendered":"Network Segmentation: Learn Best Practices for Defense in Financial Services"},"content":{"rendered":"<p>If you are responsible for network operations, network architecture, cybersecurity, information security, compliance or security in general at a financial institution, join us on <a href=\"https:\/\/www.sans.org\/webcasts\/network-segmentation-practices-defense-98637\" rel=\"nofollow,noopener\"  target=\"_blank\">September 30\u00a0for an interactive online event on the topic<\/a> on network segmentation for financial services organized in partnership between Palo Alto Networks and the SANS Institute.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"200\"><span class=\"ar-custom\" style=\"padding-bottom:64%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-5368 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Sans.png\" alt=\"Sans\" width=\"200\" height=\"128\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Sans.png 122w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/Sans-62x40.png 62w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Security, threat protection, incident response, access control, and more have long been top areas of investment for financial services. However, the increasing complexity and sheer scale of the computing power in these organizations also results in some of the most sophisticated security deployments. And it\u2019s not unusual for new technologies to break or create challenges for the security infrastructure that\u2019s already in place.<!--more--><\/p>\n<p>Organizations can no longer rely on obsolete technology to control and maintain access to data. Network segmentation needs to refreshed, expanded, and adapted to today\u2019s computing trends, including mobile computing, SaaS applications, cloud and others. Whether it\u2019s to isolate a specialized network, a location, or a group of devices that cannot be patched, network segmentation can be one of the most efficient and consistent approaches.<\/p>\n<p>In addition, when network segmentation is applied to complex infrastructure using next-generation security concepts such as application level identification network traffic, it can be a rapid means to simplify compliance to regulations or tighten protection against an emerging type of threats.<\/p>\n<p>If you want to learn more about how to leverage best practices and next-generation segmentation to improve security within your organization, join us for an interactive webinar put together in partnership with the SANS Institute:<\/p>\n<ul>\n<li><strong>Title: <\/strong>Network Segmentation Best Practices for Defense In Financial Services<\/li>\n<li><strong>Date and time<\/strong>: Tuesday, September 30 at 1:00 PM EDT (17:00 UTC)<\/li>\n<li><strong>Speaker:<\/strong> James Tarala (SANS Institute) and Isabelle Dumont (Palo Alto Networks)<\/li>\n<li><strong>Register<\/strong>: <a href=\"https:\/\/www.sans.org\/webcasts\/network-segmentation-practices-defense-98637\" rel=\"nofollow,noopener\"  target=\"_blank\">https:\/\/www.sans.org\/webcasts\/network-segmentation-practices-defense-98637<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you are responsible for network operations, network architecture, cybersecurity, information security, compliance or security in general at a financial institution, join us on September 30\u00a0for an interactive online event on the &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,416,410],"tags":[415],"coauthors":[706],"class_list":["post-6777","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-financial-services","category-vertical","tag-sans-institute"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6777"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6777\/revisions"}],"predecessor-version":[{"id":6787,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6777\/revisions\/6787"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6777"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}