Microsoft Ignite: Showcasing Our Cloud Offerings and the Depth of Our Microsoft Partnership

Matt Keil


Category: Cloud Computing

If you’ll be attending Microsoft Ignite in Orlando, Florida next week, we invite you to visit us at booth #606 to learn how the inline, API-based and workload-based enforcement and intelligence gathering points of our Security Operating Platform work together to protect our digital way of life on the network, in the cloud and on the endpoint.

In our booth, we’ll be highlighting:

  • How the VM-Series can be used to prevent threats from targeting your container workloads in Azure Kubernetes Service.
  • The latest updates to Evident that enable you to enforce Azure services configuration consistently across all of your subscriptions to eliminate potential security holes and compliance risks.
  • How Traps combines multiple methods of prevention to disrupt an attack before it can infect an endpoint on your network or a workload in Azure, effectively stopping it in its tracks.

In-Booth Presentation Schedule*

Monday, September 24: Show Floor Hours 12:30 – 7:30 PM
2:00 PM Protect Data in Office 365
4:00 PM Automating Azure Virtual WAN Connectivity
5:00 PM Gain the Upper Hand with Microsoft Security Graph & the Application Framework
Tuesday, September 25: Show Floor Hours 10 AM – 6 PM
11:30 AM Monitoring & Compliance for Azure
1:00 PM Enriching Windows Defender ATP With Third-Party Threat Intelligence
2:30 PM Protect Windows Endpoints & Servers
4:00 PM Securing Containers in Azure
Wednesday, September 26 Show Floor Hours 10 AM – 6 PM
11:30 AM Protect Data in Office 365
1:00 PM Protect Apps & Data in Azure
2:30 PM Monitoring & Compliance for Azure
4:00 PM Automating Azure Virtual WAN Connectivity
Thursday, September 27: Show Floor Hours 10 AM – 4 PM
11:30 AM Enriching Windows Defender ATP With 3rd Party Threat Intelligence
1:00 PM Securing Containers in Azure
3:00 PM Gain the Upper Hand with Microsoft Security Graph & the Application Framework

*Subject to change

 

In addition to the product presentations and demonstrations listed above, we’ll be showcasing several new integration efforts that are indicative of our ever-deepening relationship with Microsoft. As business and technology partners, Microsoft and Palo Alto Networks are working together on many different initiatives that help automate the use of threat intelligence and analytics to bring the power of numbers and automation to bear in the battle against cyberbreaches, including:

  • Microsoft Graph Security & the Application Framework: Using the Security Graph Provider App for the Application Framework, organizations can access alerts and other contextual information using the Microsoft Graph Security APIs to speed up their incident investigation and response to cyberthreats using a common API interface data model. Learn more at the booth or in sessions #BRK2102 and #THR2015. In addition, Francesco Vigo, principal solution architect for this integration effort will participate in session #BRK2404, where he will share his experiences in working with the Graph API.
  • Using Azure Information Protection Policies to Control Document Flow at the Firewall: This integration effort allows Palo Alto Networks Next-Generation Firewall users to detect documents that are using Azure Information Protection labels, allowing you to enforce policies that can prevent sensitive information from being sent outside of your organization. Visit the booth to learn more or attend session #THR3002.
  • Enriching Windows Defender ATP With Third-Party Threat Intelligence: Using MineMeld, customers can automate the delivery of third-party threat intelligence information from any of the 50+ supported sources or other, customer-defined sources to Microsoft Windows Advanced Threat Protection to more successfully gain the upper hand against attackers.
  • Automating Connectivity to Azure Virtual WAN: This integration effort automates VPN tunnel creation for a Palo Alto Networks firewall that is connecting to Microsoft Azure across the recently announced Azure Virtual WAN fabric. Learn more about the Azure Virtual WAN integration in our blog, during session #BRK2425, or swing by the booth.

Here are a few other sessions where you will learn how we can help protect your Microsoft infrastructure:

  • Session #BRK3384 Best Practices for Protecting Modern Cloud Application Architectures: The move to Azure is driving the adoption of modern cloud architectures that combine workloads, microservices, and platform services resulting in more agile, iterative delivery. To ensure workloads and data are protected, security must be embraced by a wide range of business groups, and it must be embedded into the application deployment process. This session covers the following topics: (1) security risks in the cloud (2) best practices for engaging developers, business groups, and compliance teams in a security conversation (3) the value of threat intelligence and applicability to securing Azure workloads and services.
  • Session #THR2287 – Is Your Office 365 Data Protected? SaaS applications like Microsoft Office 365 are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as:
    • Accidental data exposure with SharePoint
    • Uncontrolled use of personal OneDrive accounts
    • Data security violations in Exchange

Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance. This session covers how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.

If you cannot attend any of the sessions above, please swing by booth #606 to chat with the product experts who will be on hand to answer your questions.

Got something to say?

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.


© 2018 Palo Alto Networks, Inc. All rights reserved.