{"id":7720,"date":"2014-12-23T05:00:42","date_gmt":"2014-12-23T13:00:42","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7720"},"modified":"2015-10-07T15:18:00","modified_gmt":"2015-10-07T22:18:00","slug":"looking-ahead-2015-whats-store-enterprise-security","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2014\/12\/looking-ahead-2015-whats-store-enterprise-security\/","title":{"rendered":"Looking Ahead to 2015 and What\u2019s in Store for Enterprise Security"},"content":{"rendered":"<p>If this wild 2014 taught us anything, it\u2019s that cyber threats are becoming more pervasive and no one is immune to them.\u00a0All organizations \u2013 regardless of vertical segment \u2013 need to apply a heightened sense of urgency and sophisticated security measures that:<\/p>\n<ul>\n<li>Lean more towards strict security policies versus a predominantly open environment<\/li>\n<li>Address attacks at every step in an attack lifecycle<\/li>\n<li>Cover all aspects of an enterprise \u2013 from the data center and branch offices to endpoints<\/li>\n<\/ul>\n<p><!--more--><\/p>\n<p>We invite you to learn more about the Palo Alto Networks <a href=\"https:\/\/www.paloaltonetworks.com\/products\/platforms.html\" target=\"_blank\">Enterprise Security Platform<\/a>, which offers a unique preventative approach with three essential components \u2013 Next-Generation Firewall, Advanced Endpoint Protection and Threat Intelligence Cloud \u2013 to secure computing environments, prevent known and unknown threats, and safely enable an increasingly complex and rapidly growing number of applications.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:59%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7442 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-500x295.jpg\" alt=\"2015 Predictions Image-01\" width=\"500\" height=\"295\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-500x295.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-230x135.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-510x300.jpg 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-67x40.jpg 67w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Below you\u2019ll find all of our 2015 predictions by subject.<\/p>\n<ul>\n<li><a href=\"http:\/\/bit.ly\/1vtWmjQ\" rel=\"nofollow,noopener\"  target=\"_blank\">Kate Taylor on Threat Prevention<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/1Av6kmU\" rel=\"nofollow,noopener\"  target=\"_blank\">Brian Tokuyoshi on Mobile Security<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/1y5QAUb\" rel=\"nofollow,noopener\"  target=\"_blank\">Del Rodillas on Securing Industrial Control Systems<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/11VyR6a\" rel=\"nofollow,noopener\"  target=\"_blank\">Isabelle Dumont on Security in the Healthcare<\/a> and <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/12\/2015-predictions-financial-services-and-payment-processing\/\" target=\"_blank\">Financial Services Industries<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/12\/2015-predictions-datacenter\/\" target=\"_blank\">Matt Keil on Datacenter Security<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/1CK5xk9\" rel=\"nofollow,noopener\"  target=\"_blank\">Scott Simkin on Tailored Threat Intelligence<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/12NYxBV\" rel=\"nofollow,noopener\"  target=\"_blank\">Sebastian Goodwin on Endpoint Security<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/12\/2015-predictions-web-security-cloud-applications\/\" target=\"_blank\">Joerg Sieber\u00a0on\u00a0Web Security and Cloud Applications<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em>These topics are\u00a0among many planned for\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/content\/campaigns\/ignite\/2015\/index.html\" target=\"_blank\">Ignite 2015<\/a>, where you will tackle your toughest security challenges, get your hands dirty in one of our workshops, and expand your threat IQ.\u00a0<a href=\"https:\/\/ignite2015.paloaltonetworks.com\/portal\/createAccount.ww\" target=\"_blank\">Register now<\/a>\u00a0to join us March 30-April 1, 2015 in Las Vegas \u2014 the best security conference you\u2019ll attend all year.<\/em><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:27.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-7354 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1.jpg\" alt=\"ignite 2015\" width=\"500\" height=\"138\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1.jpg 400w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1-230x63.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1-145x40.jpg 145w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If this wild 2014 taught us anything, it\u2019s that cyber threats are becoming more pervasive and no one is immune to them.\u00a0All organizations \u2013 regardless of vertical segment \u2013 need to apply &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[113,75,598,416,138,76,229,566,108,744],"tags":[925],"coauthors":[709],"class_list":["post-7720","post","type-post","status-publish","format-standard","hentry","category-cloud-computing-2","category-data-center-2","category-endpoint-2","category-financial-services","category-healthcare","category-mobility","category-predictions","category-scada-ics","category-threat-prevention-2","category-web-security","tag-2015-predictions"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7720"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7720\/revisions"}],"predecessor-version":[{"id":7724,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7720\/revisions\/7724"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7720"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}