Network Security at Ignite ‘21: What to Expect

Nov 11, 2021
6 minutes
45 views

Palo Alto Networks Ignite, our company’s signature annual global event, is happening virtually November 15th to 18th. One of the six tracks that attendees can immerse themselves in is the Firewall Track, where attendees will be able to learn how to deploy network security for the Zero Trust Enterprise, understand best practices for deploying and managing different NGFW form-factors (hardware, virtual and  containerized NGFWs), and hear from our Firewall customers.

On Nov. 1, 2021, Gartner named Palo Alto Networks a Leader for the tenth consecutive time in its Gartner® Magic Quadrant™ for Network Firewalls, positioned highest for Ability to Execute and furthest for Completeness of Vision, in their 2021 report. The Firewall track at Ignite 2021 will be a great opportunity for attendees to understand our Network Security Vision for every secure enterprise.

The Firewall track will feature talks by customers like Cox Communications Inc, AT&T and FTDI, strategic cloud partners like Google, industry experts from organizations such as Accenture, and Palo Alto Networks leaders including our founder Nir Zuk and Chief Product Officer Lee Klarich.

Read on to find the information on the Firewall track and fill out your Palo Alto Networks Ignite agenda.

With the always-evolving threat landscape and rapid expansion of business needs, traditional network security has become inadequate. You need a proactive, cloud-based and machine-learning-driven approach to protect your network. When it comes to securing containers, it's a whole new ball game. Join Jaimin Patel, Product Line Manager at Palo Alto Networks, and Sam Alian, Sr. Cloud Network Engineer at FTD, a global leader in the floral industry, to learn how to protect your container deployments. You’ll get answers to questions like:

1. What is the Role of Network Security in Container Deployments?

2. What is the container threat landscape and ways to mitigate.

3. What are real world customer use cases for CN-Series

4. How to operationalize CN-Series in production Kubernetes environments

Cloud IDS is Google Cloud’s network-based threat detection technology that detects malware, spyware, command-and-control attacks, and many other classes of exploits. Cloud IDS is built with Palo Alto Networks’ industry-leading threat detection technologies, backed by Unit 42’s high-quality threat research for high security efficacy. Gregory Lebovitz from Google and Greg Smith from Palo Alto Networks will cover best practices for threat detection, compliance and network forensics leveraging Cloud IDS. Learn how Cloud IDS compliments a PANW security framework on Google Cloud, how Cloud IDS gets deployed in a GCP environment, what it can protect, and how.

Identity is a critical component of a Zero Trust approach to network security. With enterprises increasingly migrating from on-prem to cloud identity providers, and users connecting from anywhere, it has become difficult to keep security and identity connected and in sync across the network. Networks are designed for a single source of identity, and this can lead to inconsistent security between datacenters , campus networks, public clouds, and hybrid environments. In this session, Palo Alto Networks Principal Technical Marketing Engineer Imran Bashir will expand on these new challenges, and describe a new cloud-based architecture for identity designed to authenticate and authorize users against a variety of identity sources, whether they are on-prem, in the cloud or in a hybrid scenario.

Managing more than one firewall can be difficult, especially if they have unique configurations for different use cases. Panorama saves time and reduces complexity by managing network security with a single pane of glass. Learn about Panorama Best Practices and how to efficiently manage your firewalls from Palo Alto Networks experts Mohit Bhasin (Product Marketing Manager), Krishna Chaganti (Sr. Technical Marketing Engineer) and James Holland (Consulting Engineer for Automation). Get a deep dive into managing firewalls logs and understanding your network security data. Simplify configuration sharing by leveraging templates and device groups. Lastly, take advantage of device management functionality to efficiently onboard firewalls, make changes, and keep firewalls updated.

ML-Powered NGFW Technology from Palo Alto continues to deliver unmatched advances in security. In this session, you will learn from the experts - Dave Burns, Certified Information Systems Security Professional at Cox Communications, Inc. and Jerry McLaughlin, Product Manager, Palo Alto Networks - how to use these latest advances to best secure your Data Centers. Get the most out of your workloads with Next-Generation Firewalls in your Data Centers.

ML-Powered NGFW Technology from Palo Alto Networks continues to deliver unmatched advances in security. In this session, you will learn from Brian Levin, Product Line Manager at Palo Alto Networks, how to use these latest advances to best secure your Internet Gateways. We will discuss best practices for securing the perimeter/internet edge, including deploying decryption and the most modern security services to secure north-south traffic.

In this presentation, AT&T’s Senthil Ramakrishnan (AVP Product Management Cybersecurity) and Palo Alto Networks Emma Carpenter (VP World Wide Service Provider Sales) will discuss AT&T’s new Premise-Based Firewall offering and key strategies for how enterprises can:

- Secure their on-prem 5G networks, including private networks and multi-access edge computing (MEC) environments

- Protect their user data traffic with enterprise-grade security

- Extend zero trust to their 5G environments

They will also deep-dive into the shared responsibility model and how service providers and enterprises can best partner to take enterprise 5G security to the next level.

Looking at the security performance of 4700 companies, Accenture has analyzed the characteristics that drive the most resilient businesses. Ryan LaSalle, Senior Managing Director, North America Lead, Accenture Security, will cover the determinant success factors of those businesses and connect them to the principles of Zero Trust. You will come away with prescriptive guidance based on experiences of the study’s Cyber Champions so you can get from “no” to “yes”, while securing your company’s growth.

Don’t miss our Firewall Product Training

Learn how PAN-OS 10.1 grants visibility & control over network traffic through a single powerful rule base.

PAN-OS Controls Applications with App-ID led by Baba Diao, Cyber Security Trainer, Fast Lane Training

Controlling Access to network resources using User-ID led by Robert Donohoe, Security Consultant and Trainer at Exclusive Networks Limited UK

Troubleshooting Firewalls with Flow Logic led by Lars Meyer, Technical Director, Consigas

Register Today for Palo Alto Networks Ignite ‘21.

Read a complimentary copy of the Garter Magic Quadrant for Network Firewalls.

Gartner and Magic Quadrant are registered trademarks of Gartner, Inc and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

Gartner, Magic Quadrant for Network Firewalls, Rajpreet Kaur | Adam Hils | Jeremy D’Hoinne | Nat Smith | Aaron McQuaid, 1 November 2021.

Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.


Subscribe to Network Security Blogs!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.