Contact us
(852) 2114 1100
Facebook
Linkedin
Palo Alto Networks Video
Home
About The Company
History
Our customers
Newsroom
Products
Security
Cyberark
F5 Networks
Keysight
Micro Focus
Palo Alto Networks
Trellix
Yunke
Cloud
Skyhigh
Alibaba Cloud
Software Life Cycle
New Relic
Services
(current)
(current)
Resources Centre
Palo Alto Networks
Contact us
(current)
×
Video Title
Back
Cortex – Secure the Future
XSOAR make your security operation easy
Cortex XSOAR is the industry’s first extended security orchestration and automation platform that simplifies security operations by unifying automation, case management, real-time collaboration and threat intel management. It make your security operation fast, easy and standardize, let see how its work.
Demo video on detect attack with XDR
Cortex XDR provide wide visibility and deep analytics needed to find threats. Cortex XDR provide first extended detection and response platform that integrates endpoint and network to stop sophisticated attacks. This demo show how to detect sophisticated attack based on correlated network and endpoint artifacts.
Strata – Secure the Enterprise
Demo video on realtime DNS analysis
Attackers can also abuse DNS using a multitude of techniques to deliver malware and exfiltrate data. ML-Powered NGFW can predict and stop malicious domains from domain generation algorithm-based malware with instant enforcement, protecting you against these automated attacks. This video shown how to configure and realtime sinkhole the unknown malicious DNS query
How inline machine learning help you to block unknown malware
Everyday have new malware and they are keep automatically mutate in order to evade detection, now PA firewall can make use of machine learning to detect new or mutated malware and stop it inline
How to strengthen your work from home (WFH) policy
GlobalProtect Device Quarantine strengthens your security by providing a reliable and automated approach to identify and quarantine compromised endpoints. Utilizing the endpoint’s immutable characteristics such as the Host-ID and Serial number, you can identify a compromised device and restrict its network access as well as prevent it from infecting other users and devices.
Prisma – Secure the Cloud
©2020 B & Data Technology Co., Ltd. All rights reserved.