Hi [[ session.user.profile.firstName ]]

Serverless Done Right

So, your serverless application is up and running, well done! Now...are you certain there are no critical issues? Are you sure there are no application security vulnerabilities? Are you convinced there is nothing you need to fix?

Join our webinar and learn how to:
1) Monitor and set alerts for your serverless applications
2) Ensure your security posture is optimized
3) Automate deployment of distributed tracing to find the root-cause when something goes wrong.

With the right foundation, teams can maximize the benefits serverless deployments provide, while ensuring the applications and data handled within those applications are not compromised, and the application functionality works as expected.

Register today and learn best practice methods to ensure your serverless applications are running right!
Recorded Sep 4 2019 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Erez Berkner, CEO Lumigo, and Hillel Solow, Check Point Software
Presentation preview: Serverless Done Right
  • Channel
  • Channel profile
  • Les meilleures pratiques pour la mise en œuvre de la sécurité avec Azure Jun 18 2020 8:00 am UTC 60 mins
    Gonzalo ROCAMADOR: Cloud Security Architect, Check Point & Pascal SAULIERE: Cloud Solution Architect for Partners, Microsoft
    Pour adopter pleinement le cloud, les entreprises doivent comprendre où se situe l'équilibre des responsabilités entre la protection de l'infrastructure cloud (qui est la responsabilité du fournisseur) et la protection des données qui résident dans le cloud (qui est la responsabilité du client). C'est ce que les fournisseurs de services Cloud appellent le modèle de responsabilité partagée.
    Ce webinaire co-organisé par Check Point et Microsoft, découvrez les meilleures pratiques sur la façon de construire un déploiement Cloud sécurisé.

    En savoir plus :
    -Les capacités de l'infrastructure Cloud Azure pour une architecture de taille entreprise, en renforçant la résilience, l'évolutivité et la sécurité grâce aux technologies Azure.
    -Les recommandations de Microsoft et Check Point pour une migration sécurisée des produits Microsoft jusqu'à la fin du support en 2020.
    -Le plan de sécurité cloud Check Point, aide nos clients à concevoir des architectures de cloud sécurisées avec les solutions de sécurité CloudGuard.
  • Office 365 Webinar: Why you need more than your built-in email security Jun 16 2020 5:00 pm UTC 45 mins
    Ran Schwartz | Product Manager
    Did you know that over 90% of attacks on organizations start from a malicious email? Did you also know that platform-provided security misses on average 30% of those malicious emails? Join us for a live webinar where we will explore the most common weaknesses of built-in and traditional security solutions, and find out how to make sure you do not become a part of the statistics.

    If this time doesn't work for you we have another session you can attend: https://www.brighttalk.com/webcast/16731/411159

    A recording of the webinar will be sent to all registrants after the live session.
  • Office 365 Webinar: Why you need more than your built-in email security Jun 16 2020 8:00 am UTC 45 mins
    Ran Schwartz | Product Manager
    Did you know that over 90% of attacks on organizations start from a malicious email? Did you also know that platform-provided security misses on average 30% of those malicious emails? Join us for a live webinar where we will explore the most common weaknesses of built-in and traditional security solutions, and find out how to make sure you do not become a part of the statistics.

    A recording of the webinar will be sent to all registrants after the live session.
  • Best Practices for a Secure OCI Migration Jun 9 2020 6:00 pm UTC 60 mins
    Phil Griston, Sr. Principal Product Manager Oracle Cloud Infrastructure and Jeff Engel, Cloud Alliance Architect, Check Point
    Are you considering – or already in the process of – migrating to Oracle Cloud Infrastructure? Would you like to learn best practices for designing a secure cloud deployment? Do you need to provide scalable, secure remote access to your workforce?

    Join this webinar co-hosted by Check Point and Oracle for best practices on how to build a secure cloud deployment.
    Learn about:

    • Oracle Cloud Infrastructure key features and benefits
    • Scalable and secure remote access to corporate networks and resources
    • Check Point's cloud security blueprint, which helps customers design secure cloud architectures with CloudGuard cloud security solutions.

    11 AM PT | 2 PM ET
  • Best Practices for a Secure OCI Migration Jun 9 2020 1:00 pm UTC 60 mins
    Phil Griston, Sr. Principal Product Manager Oracle Cloud Infrastructure and Jeff Engel, Cloud Alliance Architect, Check Point
    Are you considering – or already in the process of – migrating to Oracle Cloud Infrastructure? Would you like to learn best practices for designing a secure cloud deployment? Do you need to provide scalable, secure remote access to your workforce?

    Join this webinar co-hosted by Check Point and Oracle for best practices on how to build a secure cloud deployment.

    Learn about:

    • Oracle Cloud Infrastructure key features and benefits
    • Scalable and secure remote access to corporate networks and resources
    • Check Point's cloud security blueprint, which helps customers design secure cloud architectures with CloudGuard cloud security solutions

    9am EST | 2pm UK | 4pm Moscow
  • Cyber Crime Trends during Coronavirus Jun 3 2020 3:00 pm UTC 45 mins
    Omer Dembinsky, Data Research Manager & Michael Abramzon, Threat Intelligence Analysis Team Leader
    This session will cover recent cyberattacks and some of the most crucial trends we witness during the last months, review activities by various APT groups, and dive into the Vicious Panda’s campaign against the Mongolian public sector.
  • Change Drivers: Impacts to Healthcare Cloud Security and Compliance Jun 2 2020 7:00 pm UTC 60 mins
    David Houlding, Director of Healthcare Experiences at Microsoft
    Coronavirus is driving major changes in healthcare with the introduction of newly created remote workstations, increased cloud application adoption, the launch new telemedicine services, and more.

    This has created a shift in the risk landscape, and healthcare must track this shift and ensure continuous security and compliance to thwart off new exploits from the pandemic.

    Learn how leading healthcare organizations are taking this issue head-on by leveraging cloud services, and seamlessly layering security and compliance solutions to ensure uninterrupted patient care, including,

    - Coronavirus impacts to the risk landscape, and emerging threats impacting healthcare organizations
    - Compliance strategies and to protect patient privacy
    - Security best practices to prevent threats
  • Meet the Experts – Ask Us Anything! May 27 2020 8:30 pm UTC 45 mins
    Avi Rembaum | Vice President, Security Solutions, Check Point
    Meet our cloud security experts and evangelists, share your top cloud security challenges and hear their responses.
  • Cybersecurity in the Age of Cloud May 27 2020 7:45 pm UTC 30 mins
    Sean Sweeney | Sr. Director & Chief Security Advisor, Microsoft
    Cloud is fundamentally changing how we need to be approaching cybersecurity. Digital transformation has pushed our organizations to adopt technologies that stretch beyond the traditional network boundaries and the attack techniques used against our organizations have transformed as well. Join Sean Sweeney, Microsoft Chief Security Advisor, in a review of the cybersecurity transformation that is occurring, the evolution of the threat landscape, and the new imperatives that allow organizations to operate in cloud securely.
  • SD-WAN Security: Best-of-Breed or Unified Approach? May 27 2020 7:00 pm UTC 30 mins
    Chris Federico | Head of Global Telco/GSI Architecture and Services, Check Point
    As enterprises move their branch applications to the cloud, they are adopting Software Defined Wide Area Networking (SD-WAN) for better application performance by intelligently and efficiently routing traffic directly to the internet without passing it through the data center.

    But this needs to happen without compromising security. This talk will address how using both application performance and security can be assured without one compromising the other.
  • It ain't done till it's automated. Security at the speed of DevOps May 27 2020 6:15 pm UTC 30 mins
    Tsion (TJ) Gonen | Head of Cloud Product Line, Check Point
    Amidst the growing buzz for shift-left developer centric security methods, this session will highlight the need for a common ground between security and DevOps and offer guidance on how to build in security without impeding agility.
  • Hybrid Cloud Blueprint: Best Practices for Designing Secure Cloud Deployments May 27 2020 5:30 pm UTC 30 mins
    Rodrique Boutros | Cloud Security Architect, Check Point
    Protecting you from you is the #1 challenge in the age of SDE - Software Defined Everything. Using public clouds for enterprise data centers is now mainstream; the advantages are significant and the gained agility indisputable.

    However, the number of services and options being offered is daunting. And with these choices come consequences; one misconfiguration can put your entire organization at risk…or worse.

    Join this session to learn the best practices to providing advanced threat prevention security for applications and data in private, public, and hybrid clouds.
  • Your Journey to the Cloud – The Secure Way May 27 2020 4:45 pm UTC 30 mins
    Avi Rembaum | Vice President, Security Solutions, Check Point
    In 2020 cloud-related attacks and breaches made even more headlines and companies realized they needed to get their act together.

    So they started to abandon homegrown open-source security tools and focused on consolidated cloud-based threat prevention frameworks offering complete coverage to cloud-related attacks. Going into 2020 & 2021, we're seeing this trend grow as more cloud-related technologies are gaining great security from the industry with specific answers to security challenges of containers, Kubernetes environments, and serverless workloads. In this session, we will cover recent trends and highlight some of the advancements made in fending off threats and turning security into an enabler force in enterprise digital transformation.
  • Best Practices for a Secure Google Cloud Design May 27 2020 4:00 pm UTC 60 mins
    Bahul Harikumar, Strategic Partnerships & PM- Security at Google; Lauren Mullennex, Cloud Alliance Architect at Check Point
    Are you in the process of migrating to Google Cloud? Would you like to learn best practices for designing a secure cloud deployment? Do you need to provide scalable, secure remote access to your workforce?

    Join this webinar co-hosted by Check Point and Google Cloud for best practices on how to build a secure cloud deployment.

    Learn about:
    • Google cloud infrastructure capabilities
    • Scalable and secure remote access to corporate networks and resources
    • Check Point's cloud security blueprint, which helps customers design secure cloud architectures with CloudGuard cloud security solutions.
  • Cloud Threat Landscape: Recent findings from Check Point Research May 27 2020 4:00 pm UTC 30 mins
    Maya Levine | Technical Marketing Engineer, Cloud Security, Check Point
    In the digital transformation era, cloud computing plays an integral role. Scalability, flexibility, agility and automation sound like magical words that make us more productive and innovative once we embrace cloud platforms and utilize cloud applications.

    But, how secure are these platforms and apps?

    This session reveals Check Point Research (CPR) latest cloud related findings. From a fraudulent wire transfer initiated through an email compromised on a cloud app to a vulnerability within a public cloud infrastructure, CPR analysis the latest risks and threat landscape of public cloud. The session will also include global threat intelligence stats related to COVID-19 and public cloud.
  • Mobile Threats to the Enterprise in 2020 May 26 2020 4:00 pm UTC 60 mins
    Aviran Hazum, Analysis and Response Team Leader and Yael Macias, Product Marketing Manager
    In the past few months, Check Point Researchers have seen an enormous rise in the number of mobile attacks and data breaches happening from the mobile endpoint. They have uncovered Coronavirus-related malicious campaigns, sophisticated mobile ransomware attacks, and even Mobile Device Management (MDM) getting weaponized to attack organizations.

    Join this webinar with Check Point Research to learn first hand from the experts:

    - Why Mobile cyber attacks are skyrocketing
    - How malicious actors are breaching unsuspecting organizations via their mobile endpoints
    - How to effectively secure a mobile workforce
  • Mobile Threats to the Enterprise in 2020 May 26 2020 8:00 am UTC 60 mins
    Aviran Hazum, Analysis and Response Team Leader and Yael Macias, Product Marketing Manager
    In the past few months, Check Point Researchers have seen an enormous rise in the number of mobile attacks and data breaches happening from the mobile endpoint. They have uncovered Coronavirus-related malicious campaigns, sophisticated mobile ransomware attacks, and even Mobile Device Management (MDM) getting weaponized to attack organizations.

    Join this webinar with Check Point Research to learn first hand from the experts:

    - Why Mobile cyber attacks are skyrocketing
    - How malicious actors are breaching unsuspecting organizations via their mobile endpoints
    - How to effectively secure a mobile workforce
  • Check Point Partners with Silver Peak to Secure SD-WAN Connections to the Cloud Recorded: May 22 2020 55 mins
    Aviv Ambramovich, Head of Product Management, Security Services, Check Point & Jonathan Florian,Systems Engineer, Silver Peak
    Enterprises need a solution that can intelligently and securely optimize branch office SD-WAN internet connections to the cloud. Check Point and Silver Peak have partnered to create a joint solution that addresses the network security challenges of a cloud-first architecture, enabling enterprises to securely automate branch office Internet connections to the cloud, leveraging Silver Peak’s Unity EdgeConnect SD-WAN edge platform and Check Point CloudGuard Connect cloud-hosted security service.
  • Threat Intelligence and Forensics in CloudGuard Dome9 Recorded: May 19 2020 23 mins
    Maya Levine, Technical Marketing Engineer, Cloud Security
    Check Point CloudGuard Dome9 has provided you an efficient way to visualize and evaluate security posture, while enforcing golden standard policies and compliance measures in the cloud.

    As part of this webinar, we will highlight how incidence response and forensics can further enhance your security posture across your multi-cloud environments.

    Join the webinar and learn how to use special capabilities within CloudGuard Dome9 for threat hunting and intelligence.

    What you will gain:
    •advanced cloud security intelligence,
    •contextualized visualization of threats,
    •actionable security insights
  • Threat Intelligence and Forensics in CloudGuard Dome9 Recorded: May 19 2020 42 mins
    Chris Beckett, Cloud Security at Check Point
    Check Point CloudGuard Dome9 has provided you an efficient way to visualize and evaluate security posture, while enforcing golden standard policies and compliance measures in the cloud.

    As part of this webinar, we will highlight how incidence response and forensics can further enhance your security posture across your multi-cloud environments.

    Join the webinar and learn how to use special capabilities within CloudGuard Dome9 for threat hunting and intelligence.

    What you will gain:
    •advanced cloud security intelligence,
    •contextualized visualization of threats,
    •actionable security insights
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Serverless Done Right
  • Live at: Sep 4 2019 3:00 pm
  • Presented by: Erez Berkner, CEO Lumigo, and Hillel Solow, Check Point Software
  • From:
Your email has been sent.
or close