TEST DRIVE FROM HOME
See our list of upcoming classes
Product:
Region:
Learn how you can confidently automate threat identification and enforcement across cloud, network and endpoints using a data-driven approach and precise analytics.
Get hands-on experience with the tools you need to:
Get hands-on experience with the tools you need to:
- Protect users from ransomware attacks with malware protection modules.
- Prevent unknown threats with ML-Powered NGFW.
- Protect cloud deployment with the Prisma platform.
- Automate, detect and investigate with the Cortex platform.
Learn to ensure application access is by user-IDs. Configure Cloud Identity Engine for authentication and identity/User-ID.
- Create application-based policy with Policy Optimizer. Setup granular control for Social Media and Sanctioned SaaS Applications.
- Add new decryption policies to decrypt SSL (TLS 1.3) traffic.
- Create a custom report in the Application Command Center.
- Learn to use the new AIOps dashboards.
Our Ultimate Test Drive for secure access service edge (SASE) offers a unique hands-on experience with Prisma® SASE from Palo Alto Networks, the industry’s most complete SASE solution.
Experience the superior security of Zero Trust Network Access (ZTNA) 2.0 while providing exceptional user experiences from a unified, cloud-native security product.
In this unique hands-on workshop, you’ll get acquainted with:
Experience the superior security of Zero Trust Network Access (ZTNA) 2.0 while providing exceptional user experiences from a unified, cloud-native security product.
In this unique hands-on workshop, you’ll get acquainted with:
- Applying the principles of ZTNA 2.0 best practices to protect critical business applications.
- How to secure SaaS access and internet applications with best-in-class security that delivers continuous trust verification and inspection.
- The implementation of least-privileged access for all applications based on Layer 7 to enable precise access control at the app and sub-app level.
Get hands-on with VM-Series on AWS®, and find out how easy it is to securely extend your corporate data center into Amazon Web Services with our Next-Generation Firewall. Get the tools and knowledge you need to protect your valuable applications and data from known and unknown threats like ransomware.
This exclusive live hands-on experience is your opportunity to:
This exclusive live hands-on experience is your opportunity to:
- Experience how the VM-Series firewall is deployed on AWS using the AWS console.
- Learn how inline ML-powered malware and phishing prevention can stop most unknown attacks.
- Utilize the VM-Series to monitor VM changes in AWS and apply the metadata in security policy using Dynamic Address Groups (DAGs).
- Get tips for deploying the CN-Series in Amazon EKS and protecting Kubernetes environments by inspecting the inbound, outbound and E/W traffic.
- Discover how Cloud Security Posture Management (CSPM) with Prisma Cloud Enterprise Edition can help you investigate and remediate alerts.
Get hands-on with our industry-leading solutions for Microsoft Azure® to discover how you can achieve comprehensive cloud security.
In this exclusive live hands-on webinar, you will:
In this exclusive live hands-on webinar, you will:
- Experience how the VM-Series is deployed in Azure using the Azure portal.
- Get actionable tools for utilizing VM-Series integration with Azure Application Insights to publish PAN-OS® metrics.
- Learn how to redirect traffic to an active VM-Series firewall for fault tolerance.
- Discover how Cloud Security Posture Management (CSPM) with Prisma Cloud Enterprise Edition can help you investigate and remediate alerts.
Join this virtual Ultimate Test Drive where you’ll get hands-on experience with VM-Series on Google Cloud Platform. In this free, two-hour workshop you will see how to prevent data loss and business disruption, allowing your adoption to move at the speed of the cloud. You will also:
- Experience how VM-series firewall is deployed in GCP via the GCP console
- Understand how VM-Series enhances GCP native security tools (like GCP firewall rules and Cloud Armor) by providing protection for advance attacks
- Enhance security by converting port-based policy to application based-policy with Policy Optimizer in VM-Series
- Experience how to deploy the CN-Series in GKE and protect the Kubernetes environments by inspecting the inbound, outbound and E/W traffic
- A demonstration of Cloud Security Posture Management (CSPM) with Prisma Cloud Enterprise Edition and how to investigate and remediate an alert
Learn how to view all firewall traffic, manage all aspects of device configuration, push global policies and generate reports – all from the Panorama™ console.
See the tool up close and discover how you can:
See the tool up close and discover how you can:
- Centrally deploy corporate and local policies using device groups.
- Utilize templates and template stacks for easy device and network configuration.
- Sort devices into logical, hierarchical device groups for greater management.
- Easily import existing device configurations into Panorama.
Learn how to protect your network and detect known, unknown and zero-day threats 180X faster than any other platform or point solution – all within a single, integrated best-of-breed security platform.
Experience the value firsthand and see how you can:
Experience the value firsthand and see how you can:
- Prevent 60% more unknown injection attacks that traditional IPS solutions miss.
- Stop 26% more zero-day malware than traditional sandboxes.
- Apply predictive analytics to disrupt attacks that attempt to exploit DNS traffic to cause harm.
- Detect and prevent 40% more threats than traditional web filtering databases with inline machine learning (ML)-powered web security that blocks new and evasive malicious websites.
- Discover 90% of devices in the first 48 hours and expand visibility to all devices for IT and security teams – even devices never seen before.
See how you can protect your data no matter where it lives. Get hands-on experience in the virtualized data center lab.
Get actionable insights into how you can:
Get actionable insights into how you can:
- Protect your VMs with granular control of VM-to-VM traffic based on specific applications.
- Gain full visibility into all applications traversing your data center and protect against known and unknown attacks.
- Integrate VM-Series NGFW with VMware NSX-T for east-west and north-south traffic inspection.
- Create Dynamic Address Groups using Panorama network security management configurations for your data center VMs.
Learn about our approach to Cloud Security Posture Management and Cloud Workload Protection with Prisma Cloud Enterprise Edition and Prisma Cloud Compute Edition.
Get the tools and hands-on experience you need to:
Get the tools and hands-on experience you need to:
- Monitor and manage security postures for public cloud services like AWS, Azure and Google Cloud.
- Gain deep visibility and detect and respond to threats across multiple cloud service providers.
- Secure workloads, including hosts, containers and serverless across the application lifecycle.
- Integrate vulnerability scanning and compliance checks into the CI/CD workflow.
- Analyze containerized applications at runtime, with visibility into vulnerabilities and compliance status.
Join this virtual Ultimate Test Drive, where you’ll get hands-on experience with Palo Alto Networks Industrial Control Systems. In this free workshop, where you will receive hands-on experience using the Next-Gen Firewall (NGFW) to segment and gain better visibility in Operational Technology (OT), It also protects Industrial Control Systems (ICS) from ransomware and other advanced modern threats. Join us to learn more about:
- Learn about the basic components of an ICS/OT environment and converged IT-OT networks
- See how to use an NGFW for segmentation (62443/Purdue) and ICS protocol visibility/control
- Learn how ransomware attacks breach OT using multiple attack methods, including encryption
- Prevent successful pivoted (IT -> OT) ransomware attacks using the NGFW
Find out how you can empower your team to completely secure IoT without the need to form a new team, create a new process or invest in new siloed tools.
Get a deep-dive overview and firsthand experience on advanced IoT security, including:
Get a deep-dive overview and firsthand experience on advanced IoT security, including:
- Discovery, classification and rich context of diverse IoT and OT devices.
- In-depth risk assessment based on vendor advisories, vulnerability information, anomalous device behavior, Unit 42 and other intel.
- Applying risk reduction policies based on policy recommendations.
- Preventing IoT targeted known threats.
- Detection and prevention of unknown threats.
Your security architecture needs to match your rapid cloud transformation. Protecting and controlling your branches and mobile users that go straight to the cloud for their app and data needs is challenging – but it doesn’t have to be.
We'll walk you through how to:
We'll walk you through how to:
- Get end-to-end visibility to understand users’ network and application performance at a per-application level that allows you to troubleshoot and resolve issues faster.
- Understand SDK-based architecture to automate deployment, configuration and provisioning across branches and data centers while adopting SD-WAN at scale.
- Remediate application performance in real time with automated failover based on continuously monitored performance degradation.
Sharpen your investigation and threat hunting skills with hands-on experience, and learn how to uncover adversaries anywhere in your environment and thwart sophisticated attacks against your enterprise.
Get hands-on experience with Cortex XDR and see how you can:
Get hands-on experience with Cortex XDR and see how you can:
- Get to containment faster with root cause and attack chain analysis.
- Identify even the most elusive threats with machine learning and behavioral analytics.
- Discover how enriched, contextualized data can accelerate your team’s threat hunting.
- Identify suspicious behavior faster by creating custom rules for alerts.
- Have a clear plan for implementing more effective and accurate investigations and threat hunting at your organization.
Enhance your SecOps automation skills so you can better deal with the onslaught of alerts as well as speed up incident investigation and response.
Experience automated playbooks in action and learn how you can:
Experience automated playbooks in action and learn how you can:
- Examine the out-of-the-box actions that make up the building blocks of a playbook.
- Discover how automated data enrichment can help you improve your decision-making when it comes to incident resolution.
- Make faster, smarter incident response decisions.
- Customize layouts to suit multiple teams’ preferences.
- Seamlessly interweave real-time actions and team collaboration into automated routines.
OT assets in industrial organizations are vulnerable and exposed. Gartner predicts that by 2025, 30% of organizations in the industrial sector will experience a security breach that will halt operations or mission-critical cyber-physical systems.
Gain firsthand experience on how to protect your OT assets and networks. You’ll learn how to:
Gain firsthand experience on how to protect your OT assets and networks. You’ll learn how to:
- Know and assess your OT threat surface with accurate asset visibility and extensive OT asset vulnerability and risk assessment.
- Visualize your OT assets and communication patterns mapped to the Purdue Model.
- Protect the OT perimeter and assets with granular segmentation using OT device context and OT/ICS process integrity.
FAQ
This is your chance to get behind the driver’s seat of the industry’s leading network security solutions. It’s a completely virtual, no-cost, guided, hands-on experience that’s designed for every experience level. Each workshop is customized to enhance your understanding of how our products work and how they can improve your organization’s security posture. We’ll take you step-by-step through each of our solutions, with an expert instructor to guide you. So, what are you waiting for?
This is way more than a demo. With Ultimate Test Drives, you’re running the show. Get access to our solutions in a virtual lab environment to discover exactly how they perform in the real world. You’ll work through an array of common enterprise security problems and see firsthand how you can use our security technologies to solve them.
Select a topic from the list above, and then choose from the available dates and times for your region.
After you register, you’ll receive an email confirmation with an event link for your workshop. During the workshop, you’ll need a reliable internet connection and an HTML5-compatible browser to communicate with the instructor and access the virtual lab. You will also need network access to some service ports in order to fully access the virtual lab.
After you register, you’ll receive an email confirmation with an event link for your workshop. During the workshop, you’ll need a reliable internet connection and an HTML5-compatible browser to communicate with the instructor and access the virtual lab. You will also need network access to some service ports in order to fully access the virtual lab.
After registering to an Ultimate Test Drive workshop, you will receive an email confirmation, and an event link for your workshop. During the workshop, you’ll need a reliable internet connection and a HTML5-compatible browser to communicate with the instructor and access the virtual lab. You will also need to have network access to some service ports in order to fully access the virtual lab — you can check the requested service ports access using this test site.