Pre-Game Meeting starts at 6pm at LA Live 800 Olympic Blvd.
CETPA 2019 Presentation Slides
Palo Alto Networks PAN-OS recommended releases
SSL Decryption Deployment at Monterey County
Here is our presentation given at the Palo Alto Networks Ignite Conference in march 2018 with Monterey County.
CETPA 2017: Network Segmentation using Palo Alto Networks
Network segmentation is a design strategy that allows an organization to more easily prevent, detect and contain threats.
SSL Decryption: The Good, the Bad, and the Ugly
SSL Decryption is a popular topic and the information in this presentation can be a big help for organizations trying to get this feature configured.
Lightspeed to PAN-DB Category Mapping
The following is a breakdown of Lightspeed URL categories and their PAN-DB equivalent...
Webinar: Chromebook Extension for Palo Alto Networks User-ID
We recently hosted a webinar to explain the implementation of a newly available Chromebook extension. Check out the slides and video.
SSL Decryption Implementation
It is essential to understand that SSL and TLS traffic accounts for approximately 30-50% of internet traffic across organizations. Why is this important? Because locking your front door, while leaving the back door open doesn’t help secure your house. Similarly, inspecting unencrypted traffic while letting encrypted...
ISACA OC - Next Generation Firewalls Talk
Next Generation firewalls can provide far more than the standard port based access rules - as long as they are configured correctly...
Datacenter Network Segmentation
Shifting a Palo Alto Networks firewall into the role of controlling East-West traffic in your datacenter is a process unique to every organization. It typically involves the process of moving the routing decisions for your datacenter networks to the Palo Alto. In this way you can force traffic to go through the firewall where it must be matched against security policies and be inspected for threats...
Palo Alto Networks URL Filtering
This article provides an introduction and answers to commonly asked URL filtering questions...
Palo Alto Networks Training
This post provides you with an overview of the various training courses available from Palo Alto Networks Education...
CETPA 2015 Presentation
CETPA 2015 Palo Alto Networks Use Cases Presentation...
PAN Settings for Tunnels in a NAT-T Environment
This post describes the PAN firewall settings necessary to configure tunnels in a NAT-T environment...
Nmap Cheat Sheet
A central tenet of network security is to know which assets you are protecting. Another is to limit your services to just the necessary ones. NMAP helps you do both...
Traps Endpoint Protection Highlights
By focusing on the exploit techniques and not the attack itself, Traps can prevent the attack without prior knowledge of the vulnerability,regardless of patches in place, and without signatures or software updates...
Palo Alto Networks Highlights
Here are a few things that set the Palo Alto Networks firewall apart from the rest. See what you've been missing. Find what you are looking for. Within minutes of installing the the firewall on your network, you will see which users are using which applications - and whether they harbor any threats...
Application Visibility and Control
Do you know with certainty what applications your users are running on the network? Just because your firewall is only allowing, say, ports 80, 443, and 53 doesn't guarantee that only web browsing, secure web browsing, and DNS query traffic is passing thru your firewall...
Securing Your Data Center with a Next-Generation Palo Alto Networks Firewall
Whether you are in control of an enterprise data center that keeps your employees connected and productive, or you run an Internet-facing data center that supplies remote functionality to hosted users, one thing is consistently true: your business is at constant risk...
The First Step to Network Security
In our years of experience providing high quality perimeter protection and web security services, we at Digital Scepter have given businesses of all sizes the insight and expertise they require to navigate the complex – and often dangerous – arena of network security...
How a Next-Generation Firewall Can Keep Your Data Center Secure and Productive
Whatever the scale of your business or organization, the network infrastructure of your data center is often just as vital as the premises you operate from or the utilities that power your office. In modern business, data is your most valuable asset, and keeping this data protected against misuse and malware is incredibly important...
Useful Palo Alto Networks CLI Commands
This is a list of useful CLI Commands that will allow you to quickly and effectively perform common troubleshooting tasks...
Palo Alto Networks High Availability and Support Options
Deciding how to handle your HA needs is a business decision based on the probability and impact of down time. Regardless of where you are on the scale, there are options for you. These are specific to Palo Alto Networks, but most vendors have similar offerings...
Palo Alto Networks Global Protect SSL VPN Jumpstart Guide
Palo Alto Stuck Downloads
With Palo Alto Networks, you may encounter an Antivirus or Threat database download that never completes and hence appears “stuck”...
Palo Alto Networks Documentation
Here are links to Palo Alto Networks documentation...
Security Posture Survey
Fill out this survey for a quick and easy gap analysis of your existing controls to see how you measure up against the 20 Critical Security Controls...
Palo Alto Networks Quick Start
These steps will get you started if you have some shiny new Palo Alto Networks gear to install. Sign up at support.paloaltonetworks.com and register your serial number you received in the order confirmation email from Palo Alto...
Palo Alto Networks Registration and Management Setup
Create support account at support.paloaltonetworks.com This will allow you to register your device(s), open support cases, view subscription and license information...