{"id":8911,"date":"2015-04-24T05:00:45","date_gmt":"2015-04-24T12:00:45","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8911"},"modified":"2015-04-24T05:36:36","modified_gmt":"2015-04-24T12:36:36","slug":"what-an-exciting-week-at-rsa-2015","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/04\/what-an-exciting-week-at-rsa-2015\/","title":{"rendered":"What an Exciting Week at RSA 2015!"},"content":{"rendered":"<p>Palo Alto Networks had a <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/04\/rsa-2015-preventionishere\/#more-8897\">strong showing at RSA Conference 2015<\/a> in San Francisco this week, showcasing the importance of preventing breaches before they happen. Check out scenes from the conference below.<\/p>\n<p>What was the buzz at RSA 2015?<\/p>\n<p><div class=\"styleIt\" style=\"width:500px;height:281px;\"><lite-youtube videoid=\"yNaX_PYYoyg\" ><\/lite-youtube><\/div><\/p>\n<p>Ryan Olson discussed the importance of context in threat intelligence:<!--more--><\/p>\n<p><div class=\"styleIt\" style=\"width:500px;height:281px;\"><lite-youtube videoid=\"nD3yXEuvVhg\" ><\/lite-youtube><\/div><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9293.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8912 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9293-500x375.jpg\" alt=\"IMG_9293\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9293-500x375.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9293-230x172.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9293-400x300.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9293-53x40.jpg 53w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: center;\"><strong>Ryan Olson being interviewed by Globb TV<\/strong><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9489.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:133.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8913 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9489-500x666.jpg\" alt=\"IMG_9489\" width=\"500\" height=\"666\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9489-500x666.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9489-230x306.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9489-225x300.jpg 225w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9489-30x40.jpg 30w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9489.jpg 768w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: center;\"><strong>CSO Rick Howard talks with the audience about favorite movies and podcasts before his session,The Evolution of the Cybersecurity Executive Trifecta: The CSO\/CIO\/CISO, begins.<\/strong><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9498.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:91.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8914 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9498-500x458.jpg\" alt=\"IMG_9498\" width=\"500\" height=\"458\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9498-500x458.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9498-230x210.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9498-327x300.jpg 327w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9498-43x40.jpg 43w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9498.jpg 1024w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: center;\"><strong>Founder and CTO Nir Zuk presents about the Palo Alto Networks vision and strategy at our booth.<\/strong><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9501.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8915 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9501-500x375.jpg\" alt=\"IMG_9501\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9501-500x375.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9501-230x172.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9501-400x300.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9501-53x40.jpg 53w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: center;\"><strong>Scott Ciccone gives tips on migrating to a Palo Alto Networks next-generation firewall.<\/strong><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9507.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8916 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9507-500x375.jpg\" alt=\"IMG_9507\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9507-500x375.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9507-230x172.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9507-400x300.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9507-53x40.jpg 53w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: center;\"><strong>Brian Tokuyoshi talks \"Protecting the Mobile Workforce.\"<\/strong><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9512.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8917 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9512-500x375.jpg\" alt=\"IMG_9512\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9512-500x375.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9512-230x172.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9512-400x300.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9512-53x40.jpg 53w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: center;\"><strong>Scott Stevens presents on implementing a \"Zero Trust\" network segmentation architecture.<\/strong><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9519.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:133.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8918 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9519-500x666.jpg\" alt=\"IMG_9519\" width=\"500\" height=\"666\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9519-500x666.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9519-230x306.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9519-225x300.jpg 225w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9519-30x40.jpg 30w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9524.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:133.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8919 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9524-500x666.jpg\" alt=\"IMG_9524\" width=\"500\" height=\"666\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9524-500x666.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9524-230x306.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9524-225x300.jpg 225w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/IMG_9524-30x40.jpg 30w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: center;\"><strong>Nati Davidi and Sebastian Goodwin discuss how one exploited endpoint can lead to total datacenter breach, and how Traps Advanced Endpoint Protection can help with threat prevention.<\/strong><\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\"><p><a href=\"https:\/\/twitter.com\/PaloAltoNtwks\" rel=\"nofollow,noopener\" >@PaloAltoNtwks<\/a> <a href=\"https:\/\/twitter.com\/nirzuk\" rel=\"nofollow,noopener\" >@nirzuk<\/a> in action at <a href=\"https:\/\/twitter.com\/RSAConference\" rel=\"nofollow,noopener\" >@RSAConference<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/RSAC2015?src=hash\" rel=\"nofollow,noopener\" >#RSAC2015<\/a> - the future belongs to platforms <a href=\"http:\/\/t.co\/snhEXnd2RI\">pic.twitter.com\/snhEXnd2RI<\/a><\/p>\n<p>\u2014 Asheem Chandna (@chandna) <a href=\"https:\/\/twitter.com\/chandna\/status\/590997688822304768\" rel=\"nofollow,noopener\" >April 22, 2015<\/a><\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\"><p>\nAs cool as <a href=\"https:\/\/twitter.com\/NorseCorp\" rel=\"nofollow,noopener\" >@NorseCorp<\/a> hat I got from <a href=\"https:\/\/twitter.com\/anthonymfreed\" rel=\"nofollow,noopener\" >@anthonymfreed<\/a> is; most useful <a href=\"https:\/\/twitter.com\/RSAConference\" rel=\"nofollow,noopener\" >@RSAConference<\/a> goodie:free <a href=\"https:\/\/twitter.com\/Uber\" rel=\"nofollow,noopener\" >@Uber<\/a> rides courtesy of <a href=\"https:\/\/twitter.com\/PaloAltoNtwks\" rel=\"nofollow,noopener\" >@PaloAltoNtwks<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/RSAC?src=hash\" rel=\"nofollow,noopener\" >#RSAC<\/a><\/p>\n<p>\u2014 Ben Rothke (@benrothke) <a href=\"https:\/\/twitter.com\/benrothke\/status\/591365681322463232\" rel=\"nofollow,noopener\" >April 23, 2015<\/a>\n<\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\"><p>Great time with our <a href=\"https:\/\/twitter.com\/PaloAltoNtwks\" rel=\"nofollow,noopener\" >@PaloAltoNtwks<\/a> Partners tonight! <a href=\"https:\/\/twitter.com\/hashtag\/rsac?src=hash\" rel=\"nofollow,noopener\" >#rsac<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/thankyou?src=hash\" rel=\"nofollow,noopener\" >#thankyou<\/a> <a href=\"http:\/\/t.co\/7wzlTWi6jY\">pic.twitter.com\/7wzlTWi6jY<\/a><\/p>\n<p>\u2014 Melissa Nacerino (@MelissaNacerino) <a href=\"https:\/\/twitter.com\/MelissaNacerino\/status\/591105225357819904\" rel=\"nofollow,noopener\" >April 23, 2015<\/a><\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\"><p>\nHaving a blast at our after party with <a href=\"https:\/\/twitter.com\/PaloAltoNtwks\" rel=\"nofollow,noopener\" >@PaloAltoNtwks<\/a>! <a href=\"http:\/\/t.co\/Y9W9wfWlHX\">pic.twitter.com\/Y9W9wfWlHX<\/a><\/p>\n<p>\u2014 LogRhythm (@LogRhythm) <a href=\"https:\/\/twitter.com\/LogRhythm\/status\/590741958831792128\" rel=\"nofollow,noopener\" >April 22, 2015<\/a>\n<\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\"><p>Right on <a href=\"https:\/\/twitter.com\/PaloAltoNtwks\" rel=\"nofollow,noopener\" >@PaloAltoNtwks<\/a> !!!<a href=\"https:\/\/twitter.com\/hashtag\/RSAC?src=hash\" rel=\"nofollow,noopener\" >#RSAC<\/a> <a href=\"http:\/\/t.co\/b6VEmowLwk\">pic.twitter.com\/b6VEmowLwk<\/a><\/p>\n<p>\u2014 christopher krueger (@kruegzz) <a href=\"https:\/\/twitter.com\/kruegzz\/status\/590732077437431808\" rel=\"nofollow,noopener\" >April 22, 2015<\/a><\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\"><p>\n<a href=\"https:\/\/twitter.com\/PaloAltoNtwks\" rel=\"nofollow,noopener\" >@PaloAltoNtwks<\/a> open house at the <a href=\"https:\/\/twitter.com\/mezzanineSF\" rel=\"nofollow,noopener\" >@mezzanineSF<\/a> ! <a href=\"https:\/\/twitter.com\/hashtag\/RSAC2015?src=hash\" rel=\"nofollow,noopener\" >#RSAC2015<\/a> <a href=\"http:\/\/t.co\/tMqFM0rEVL\">pic.twitter.com\/tMqFM0rEVL<\/a><\/p>\n<p>\u2014 Cabrio Taxi (@CabrioTaxi) <a href=\"https:\/\/twitter.com\/CabrioTaxi\/status\/590707955839983617\" rel=\"nofollow,noopener\" >April 22, 2015<\/a>\n<\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\"><p>Cybersecurity Canon - just bought a few books during your talk <a href=\"https:\/\/twitter.com\/raceBannon99\" rel=\"nofollow,noopener\" >@raceBannon99<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/rsac?src=hash\" rel=\"nofollow,noopener\" >#rsac<\/a> <a href=\"https:\/\/t.co\/EwIVnUZ7qy\">https:\/\/t.co\/EwIVnUZ7qy<\/a><\/p>\n<p>\u2014 Michael Rowe (@michaelrowe01) <a href=\"https:\/\/twitter.com\/michaelrowe01\/status\/591265783700791297\" rel=\"nofollow,noopener\" >April 23, 2015<\/a><\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks had a strong showing at RSA Conference 2015 in San Francisco this week, showcasing the importance of preventing breaches before they happen. Check out scenes from the conference below. &hellip;<\/p>\n","protected":false},"author":100,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,133],"tags":[1132,454,1057,129,1103,922],"coauthors":[888],"class_list":["post-8911","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-events","tag-autofocus","tag-enterprise-security-platform","tag-prevention","tag-rsa-conference","tag-rsa-conference-2015","tag-threat-intelligence"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/100"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8911"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8911\/revisions"}],"predecessor-version":[{"id":8923,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8911\/revisions\/8923"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8911"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}