Click here to register

Date: 22nd October 2014 
Time: 2:00 p.m. - 3:00 p.m. BST

Today's cyber threats hide in plain sight amidst your network traffic, making them nearly impossible to defend against. These advanced threats use applications as their infiltration vector, exhibit application-like evasion tactics and they leverage commonly used network applications for exfiltration.

Palo Alto Networks invites you to join us for this exclusive webinar where we will analyze the intertwined relationship between cyber attacks and applications based on recent data collected from over 1,499 networks in Europe, the Middle East, South Africa, Russia and the Baltics.

This session will include how to defend your network from advanced threats and which applications:

  • Are the most common threat vectors
  • Are the most vulnerable or used to mask malware activity
  • Are capable of using SSL

Speaker: James Sherlow, SE Manager WEUR & Africa, Palo Alto Networks