{"id":9998,"date":"2015-08-22T04:00:44","date_gmt":"2015-08-22T11:00:44","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9998"},"modified":"2021-03-22T08:39:32","modified_gmt":"2021-03-22T15:39:32","slug":"palo-alto-networks-news-of-the-week-august-22","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/08\/palo-alto-networks-news-of-the-week-august-22\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 August 22"},"content":{"rendered":"<p>Here is the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/news-of-the-week\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a> from the past week.<\/p>\n<p>We <a href=\"http:\/\/bit.ly\/1IZkn4t\" target=\"_blank\" rel=\"noopener\">announced the PA-7080<\/a>: our highest end firewall, delivering breach prevention at scale.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/PA-7080_unracked_MED_SM.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9999 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/PA-7080_unracked_MED_SM-500x333.jpg\" alt=\"PA-7080_unracked_MED_SM\" width=\"500\" height=\"333\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/PA-7080_unracked_MED_SM-500x333.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/PA-7080_unracked_MED_SM-230x153.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/PA-7080_unracked_MED_SM-450x300.jpg 450w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/PA-7080_unracked_MED_SM-60x40.jpg 60w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/PA-7080_unracked_MED_SM.jpg 1024w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><!--more--><\/p>\n<p>We celebrated\u00a0<a href=\"http:\/\/bit.ly\/1J5hHCr\" target=\"_blank\" rel=\"noopener\">the Palo Alto Networks Global Partner Award Winners<\/a> at this year\u2019s Sales Kickoff in Las Vegas, and\u00a0CRN Associate Editor Sarah Kuranda was also with us, and met with <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/08\/partners-are-part-of-the-team-at-palo-alto-networks\" target=\"_blank\" rel=\"noopener\">many of our partners and executives, including President and CEO Mark McLaughlin<\/a>.<\/p>\n<p>NextWave Partners: Follow our <a href=\"http:\/\/bit.ly\/1TN1g2C\" target=\"_blank\" rel=\"noopener\">dedicated partner handle<\/a> on Twitter to stay informed and receive relevant and timely information that will help maximize your partnership with Palo Alto Networks.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-nextwave.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7597 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-nextwave-500x68.png\" alt=\"blog-title-nextwave\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-nextwave-500x68.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-nextwave-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-nextwave-510x69.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-nextwave-240x32.png 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-nextwave.png 632w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Unit 42 <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/08\/retefe-banking-trojan-targets-sweden-switzerland-and-japan\/\" target=\"_blank\" rel=\"noopener\">detected the Retefe banking Trojan<\/a> targeting Sweden, Switzerland and Japan.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7596 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-500x68.png\" alt=\"blog-title-unit42\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-500x68.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-510x69.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-240x32.png 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42.png 632w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Our <a href=\"http:\/\/bit.ly\/1K2KhZ7\" target=\"_blank\" rel=\"noopener\">technical documentation team detailed<\/a> how to help you get the most out of IPv6.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/tech-doc-updated.png\"><div style=\"max-width:100%\" data-width=\"498\"><span class=\"ar-custom\" style=\"padding-bottom:62.45%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-8715 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/tech-doc-updated.png\" alt=\"tech doc updated\" width=\"498\" height=\"311\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/tech-doc-updated.png 498w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/tech-doc-updated-230x143.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/tech-doc-updated-480x300.png 480w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/tech-doc-updated-64x40.png 64w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/span><\/div><\/a><\/p>\n<p>Check out Ben Rothke's nomination for the Cybersecurity Canon, <a href=\"http:\/\/bit.ly\/1NrJfqU\" target=\"_blank\" rel=\"noopener\">The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography<\/a> by Simon Singh.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9648 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png\" alt=\"cybersec canon red\" width=\"500\" height=\"218\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-230x100.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-510x223.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-91x40.png 91w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png 786w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Watch <a href=\"http:\/\/bit.ly\/1JryyVu\" rel=\"nofollow,noopener\" >Arthur Capella's interview with B!T Magazine<\/a> at the Gartner Security &amp; Risk Management Summit in Brazil, and check out a few photos from the event.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/3.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9989 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/3-500x375.jpg\" alt=\"3\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/3-500x375.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/3-230x173.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/3-400x300.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/3-53x40.jpg 53w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/3.jpg 1600w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlMzgyMA==\">Extending Zero Trust to the Endpoint<\/a><\/p>\n<ul>\n<li>When: August 25, 2015 11:00 AM - 12:00 PM GMT+4:00<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzgyMw==\">Mobile Threat Workshop \u2013 Omaha<\/a><\/p>\n<ul>\n<li>When: August 25, 2015 11:30 AM - 1:30 PM CST<\/li>\n<li>Where: Omaha, NE<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzg0OA==\">UTD Threat Prevention Integratium<\/a> [Spanish]<\/p>\n<ul>\n<li>When: August 25, 2015 8:00 AM - 1:00 PM CST<\/li>\n<li>Where: M\u00e9rida, Yucat\u00e1n<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzg1Mg==\">UTD Threat Prevention Integratium vespertino<\/a> [Spanish]<\/p>\n<ul>\n<li>When: August 25, 2015 2:00 PM - 7:00 PM CST<\/li>\n<li>Where: M\u00e9rida, Yucat\u00e1n<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzgyOA==\">Mobile Threat Workshop - St. Louis<\/a><\/p>\n<ul>\n<li>When: August 26, 2015 11:30 AM - 1:30 PM CST<\/li>\n<li>Where: St. Louis, MO<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzgyMQ==\">Palo Alto Networks Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: August 26, 2015 7:00 AM - 11:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzc3MQ==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: August 26, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzg0Mw==\">\u7b2c\u4e00\u56de\u8a8d\u5b9a\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0 (8\/26\uff5e27)<\/a> [Japanese]<\/p>\n<ul>\n<li>When: August 26, 2015 10:00 AM - 6:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzcwMQ==\">8\u670828\u65e5(\u91d1)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70<\/a> [Japanese]<\/p>\n<ul>\n<li>When: August 28, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzc0NQ==\">9\/2(\u6c34)\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7<\/a> [Japanese]<\/p>\n<ul>\n<li>When: September 2, 2015 2:00 PM - 5:30 PM GMT+9:00<\/li>\n<li>Where: \u6e2f\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzgxOA==\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: September 2, 2015 11:30 AM - 4:00 PM CST<\/li>\n<li>Where: Austin, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzkwNQ==\">NGFW Seminar \u2013 Next-generation Network Security<\/a><\/p>\n<ul>\n<li>When: September 2, 2015 11:30 AM - 1:30 PM CST<\/li>\n<li>Where: Minneapolis, MN<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzc3Mg==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: September 2, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzkwOA==\">Threat Prevention Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: September 2, 2015 8:30 AM - 12:00 PM EST<\/li>\n<li>Where: New York, NY<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzkwMA==\">Cowboys vs. Texans: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: September 3, 2015 4:00 PM - 9:30 PM CST<\/li>\n<li>Where: Arlington, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzY0Ng==\">Invite-only Event: Crack the Code with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: September 3, 2015 11:00 AM - 1:00 PM EST<\/li>\n<li>Where: Philadelphia, PA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMzcwMg==\">9\u67084\u65e5(\u91d1)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70<\/a> [Japanese]<\/p>\n<ul>\n<li>When: September 4, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here is the top Palo Alto Networks news from the past week. We announced the PA-7080: our highest end firewall, delivering breach prevention at scale.<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[1394,1386,1240,156,355,1380],"coauthors":[709],"class_list":["post-9998","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-bt-magazine","tag-fy16-sales-kickoff","tag-gartner-security-risk-management-summit","tag-ipv6","tag-nextwave","tag-pa-7080"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9998"}],"version-history":[{"count":8,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9998\/revisions"}],"predecessor-version":[{"id":128785,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9998\/revisions\/128785"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9998"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}