Learn how you can leverage Prisma® Access as a firewall service to protect branch offices and mobile users from threats. With Prisma Access, you get the network security services you need in a next-generation firewall – and more.
See it in action and learn how you can:
Protect remote networks and mobile users in a consistent manner, wherever they are.
Ensure connectivity and security in order to access all your applications using firewall as a service (FwaaS).
Manage your changing environment with a cloud-based infrastructure that converges networking and network security capabilities.
Get hands-on with VM-Series on AWS®, and find out how easy it is to securely extend your corporate data center into Amazon Web Services with our Next-Generation Firewall. Get the tools and knowledge you need to protect your valuable applications and data from known and unknown threats like ransomware.
This exclusive live hands-on experience is your opportunity to:
Experience how the VM-Series firewall is deployed on AWS using the AWS console.
Learn how inline ML-powered malware and phishing prevention can stop most unknown attacks.
Utilize the VM-Series to monitor VM changes in AWS and apply the metadata in security policy using Dynamic Address Groups (DAGs).
Get tips for deploying the CN-Series in Amazon EKS and protecting Kubernetes environments by inspecting the inbound, outbound and E/W traffic.
Discover how Cloud Security Posture Management (CSPM) with Prisma Cloud Enterprise Edition can help you investigate and remediate alerts.
Join this virtual Ultimate Test Drive where you’ll get hands-on experience with VM-Series on Google Cloud Platform. In this free, two-hour workshop you will see how to prevent data loss and business disruption, allowing your adoption to move at the speed of the cloud. You will also:
Experience how VM-series firewall is deployed in GCP via the GCP console
Understand how VM-Series enhances GCP native security tools (like GCP firewall rules and Cloud Armor) by providing protection for advance attacks
Enhance security by converting port-based policy to application based-policy with Policy Optimizer in VM-Series
Experience how to deploy the CN-Series in GKE and protect the Kubernetes environments by inspecting the inbound, outbound and E/W traffic
A demonstration of Cloud Security Posture Management (CSPM) with Prisma Cloud Enterprise Edition and how to investigate and remediate an alert
Learn how to protect your network and detect known, unknown and zero-day threats 180X faster than any other platform or point solution – all within a single, integrated best-of-breed security platform.
Experience the value firsthand and see how you can:
Prevent 60% more unknown injection attacks that traditional IPS solutions miss.
Stop 26% more zero-day malware than traditional sandboxes.
Apply predictive analytics to disrupt attacks that attempt to exploit DNS traffic to cause harm.
Detect and prevent 40% more threats than traditional web filtering databases with inline machine learning (ML)-powered web security that blocks new and evasive malicious websites.
Discover 90% of devices in the first 48 hours and expand visibility to all devices for IT and security teams – even devices never seen before.
Join this virtual Ultimate Test Drive, where you’ll get hands-on experience with Palo Alto Networks Industrial Control Systems. In this free workshop, where you will receive hands-on experience using the Next-Gen Firewall (NGFW) to segment and gain better visibility in Operational Technology (OT), It also protects Industrial Control Systems (ICS) from ransomware and other advanced modern threats. Join us to learn more about:
Learn about the basic components of an ICS/OT environment and converged IT-OT networks
See how to use an NGFW for segmentation (62443/Purdue) and ICS protocol visibility/control
Learn how ransomware attacks breach OT using multiple attack methods, including encryption
Prevent successful pivoted (IT -> OT) ransomware attacks using the NGFW
Your security architecture needs to match your rapid cloud transformation. Protecting and controlling your branches and mobile users that go straight to the cloud for their app and data needs is challenging – but it doesn’t have to be.
We'll walk you through how to:
Get end-to-end visibility to understand users’ network and application performance at a per-application level that allows you to troubleshoot and resolve issues faster.
Understand SDK-based architecture to automate deployment, configuration and provisioning across branches and data centers while adopting SD-WAN at scale.
Remediate application performance in real time with automated failover based on continuously monitored performance degradation.
Sharpen your investigation and threat hunting skills with hands-on experience, and learn how to uncover adversaries anywhere in your environment and thwart sophisticated attacks against your enterprise.
Get hands-on experience with Cortex XDR and see how you can:
Get to containment faster with root cause and attack chain analysis.
Identify even the most elusive threats with machine learning and behavioral analytics.
Discover how enriched, contextualized data can accelerate your team’s threat hunting.
Identify suspicious behavior faster by creating custom rules for alerts.
Have a clear plan for implementing more effective and accurate investigations and threat hunting at your organization.
This is your chance to get behind the driver’s seat of the industry’s leading network security solutions. It’s a completely virtual, no-cost, guided, hands-on experience that’s designed for every experience level. Each workshop is customized to enhance your understanding of how our products work and how they can improve your organization’s security posture. We’ll take you step-by-step through each of our solutions, with an expert instructor to guide you. So, what are you waiting for?
This is way more than a demo. With Ultimate Test Drives, you’re running the show. Get access to our solutions in a virtual lab environment to discover exactly how they perform in the real world. You’ll work through an array of common enterprise security problems and see firsthand how you can use our security technologies to solve them.
Select a topic from the list above, and then choose from the available dates and times for your region.
After you register, you’ll receive an email confirmation with an event link for your workshop. During the workshop, you’ll need a reliable internet connection and an HTML5-compatible browser to communicate with the instructor and access the virtual lab. You will also need network access to some service ports in order to fully access the virtual lab.
After registering to an Ultimate Test Drive workshop, you will receive an email confirmation, and an event link for your workshop. During the workshop, you’ll need a reliable internet connection and a HTML5-compatible browser to communicate with the instructor and access the virtual lab. You will also need to have network access to some service ports in order to fully access the virtual lab — you can check the requested service ports access using this test site.
Get the latest news, invites to events, and threat alerts