With all the confusion with #Cloud computing should enterprises be more worried about location of their data or how they architect the cloud solution... private cloud vs hybrid..
I think there many security challenges, both network related and non-network related that need to be solved before public cloud becomes a viable solution for large enterprises
@iSocial_Fanz all top sites are going on perm. I just talked to the lead architect at Spotify and it's all on prem not cloud bc latency is issue not so much security
as attackers target end users as a waypoint to the data center, enterprises are realizing that they need to spend on the border between their users and the data center together with the border to the Internet
@nirzuk We hear much about APT's - how best to mitigate? Analytic security products seem own the headlines but not everyone is ready just yet - Are slow-adopters left to process/technology?
the solution will be a combination of processes and technologies all working together. enterprises are still trying to figure out what to do. a quick advise - if you think you found a killer solution - you are probably wrong
I think compliance is an important part of enterprise security spending while the focus has been and will continue to be the quality of the security rather than just compliance with doesn't always equate seucirty
I have been noticing that other vendors are starting have a similar feature like wildfire. Is PANW looking to add or enhance current security features?
we have already gotten used to the other fw vendors copying everything we do. luckily we are good at staying ahead of them and increasing the gap with every release
They don't have a choice. End users are not asking them whether it's okay to BYOD. Sensitive coprorate information is making its way to personal mobile devices and something needs to be done to protect it
I think that everything you do uses a combination of all your past experiences. I am not sure I can put my finger on specific things I have learnt at NetScreen
i disagree. Signatures are still the only mechanism that can scan traffic at multi gig speeds with acceptable latency. I think that the new network security architecture changes how quickly *relevant* signatures get generated and delivered
there is no much difference anymore, given that the outsiders favorite attack vector is to take over an internal machine and from there jump to the data center. For the purpose of securing the enterprise they are both the same