Hi [[ session.user.profile.firstName ]]

Endpoint security – not all are created equal

Endpoint security solutions have been around for so long that most of us take them for granted. However, not all are effective in protecting against today’s cyber threats. In this webinar, Adeline Chan, product marketing manager at Check Point will highlight the five key differentiators of an effective endpoint security solution. Join this webinar to learn how you can attain a higher level of protection and efficiency with the right endpoint security.
Recorded Apr 13 2020 41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Adeline Chan | Product Marketing Manager, Check Point
Presentation preview: Endpoint security – not all are created equal
  • Channel
  • Channel profile
  • The next decade: opportunity in uncertain times Oct 13 2020 3:00 pm UTC 60 mins
    Yahli Admati, a leading futurist and strategist
    Despite the cataclysmic events of 2020, Yahli Admati, a leading futurist and strategist is optimistic. Over the next decade, she envisions opportunities with technological innovations creating a brighter future.

    Join Yahli Admati in the next episode of Talking iTech with Eddie Doyle series as they discuss key technology capabilities fueled by artificial intelligence (AI). Topics to be discussed include:

    • Medical advancements, including the speed up of coronavirus gen editing
    • Rapid transformation of micro to megatrend predictions
    • Major advancements with industrial and service robots
    • A new quantum computing paradigm for the future

    Yahli Admati has worked with senior executives from such diverse companies as Cadbury’s, Citibank, Coca-Cola, Colgate-Palmolive, L’OREAL, Nestle, Orange, among others.

    This must-attend webinar event offers vital implications for everyone.
  • Hacking the Brain Sep 29 2020 3:00 pm UTC 60 mins
    Moran Cerf, Neuroscientist & Business Professor @Northwestern University I Eddie Doyle, Global Security Strategist
    The ability to implant thoughts and manipulate a person’s behavior may be closer than we believe.
    Professor Moran Cerf, Neuroscientist and Business Professor at the Kellogg School of Management, at Northwestern University (and a former hacker), will discuss how advances in artificial intelligence (AI) could be used to control human thoughts.

    This month, Talking iTech with Eddie Doyle will interview Prof. Cerf to discuss how:
    • Neuroscience can be used to change human behavior
    • AI is affecting our futures
    • We can program ourselves for success? Or program others for failure?

    Shocking as it may seem, hacking brains to “embed” thoughts and ideas into our mind may have already been here? Nation-states using cyber warfare to influence outcomes, such as impacting democratic elections, is just one example.
    Join us in September to see where Science Fiction meets a new reality.
  • Unveiling the Top Cloud Security Trends for 2021 Sep 24 2020 9:00 am UTC 60 mins
    Stuart Green, Cloud Security Architect at Check Point
    Did you know that 68% of enterprises today regard the misconfiguration of assets in the cloud as one of the biggest contributors to cloud security threats? In fact, 75% of enterprises are either very concerned or extremely concerned about how secure they are in the cloud.

    Join our talk around the findings of our most recent Cloud Security Report, to discover what over 650 cyber-security professionals had to say about the current state of cloud security, including:
    • Today's biggest cloud security threats
    • Cloud migration security concerns and barriers
    • Key features to consider when evaluating cloud security solutions
    • Strategies they are adopting to address their modern multi-cloud environments
  • Public Sector: Navigating the post-coronavirus world with a strong cyber-defence Recorded: Sep 17 2020 18 mins
    Eddie Doyle, Cyber Security Evangelist Check Point Software Technologies
    Public Sector Talk: Covid-19 not only caused a health pandemic but a cybercrime pandemic too. Its effects have dramatically changed the way Public Sector works, and these changes are here to stay.
    The accelerated pace of digital transformation, remote access infrastructure, the drastic move to the cloud have already gotten the attention of cybercriminals. The dramatic changes in your organisation’s infrastructure present a unique opportunity to assess your security investments. Are you really getting what you need? Are there areas you’ve overlooked?
  • Erratic Times, Solid Security. Navigating Cloud Native Security in 2020 Recorded: Sep 15 2020 42 mins
    Trisha Paine, Head of Cloud Product Marketing and Programs & Jonathan Maresky, Product Marketing Manager
    2020 has been a year of firsts for organizations as they had to expedite the expansion of their cloud infrastructure to meet the requirements of their overnight remote workforce. The proliferation of new cloud applications, the numbers of workers connecting remoting, and the security gaps from this overnight transformation, resulted in 91% of organizations stating they experienced an increase in cyber-attacks. But what were those biggest threats, and how are organizations shifting their approach to address them now, and in the future.

    In this webinar, we will uncover:
    o Findings from the 2020 Cloud Security Report,
    o The current threats plaguing organizations, and
    o Strategies they are adopting to address their modern multi-cloud environments.
  • What Every CISO Must Know About the Law and Cyber Security Recorded: Sep 15 2020 35 mins
    Daniel Garrie, Co-Founder at Law and Forensics | Eddie Doyle, Global Security Strategist at Check Point
    While preventing a breach should be a top concern for organizations, it's also important to prepare for the legal ramifications in case a breach does occur. Research shows that breach related legal costs can you tens or even hundreds of millions of dollars in consumer class action suits and settlements. So what can you do to mitigate the potential damage?

    In this talk, you will learn practical tips concerning how CISOs can keep their companies safe from litigation fallout in the wake of cyber crime. You'll also learn the latest on current cyber-related court cases.

    Our host Eddie Doyle will speak with Daniel Garrie, Co-Founder at Law and Forensics, who is an expert in the latest cyber security, legal, and forensic issues.

    Click the "ATTEND" button above to reserve your spot now!
  • Check Point Best Practices for a Secure Migration to AWS Recorded: Sep 10 2020 77 mins
    Matthieu Bouthors, Security Solutions Architect at AWS and Gonzalo Rocamador, Cloud Security Architect at Check Point
    To fully embrace the cloud, businesses need to understand where the balance of responsibilities lie between protecting the cloud infrastructure (which is the responsibility of AWS) and protecting the data that resides in the cloud (which is the responsibility of the customer). This is what AWS refers to as the shared responsibility model.

    Join this webinar co-hosted by Check Point and AWS for best practices on how to build a secure cloud deployment.

    Learn about:
    • AWS infrastructure and security capabilities.
    • Check Point's cloud security blueprint, which helps customers design secure cloud architectures.
    • How CloudGuard cloud security solutions can help AWS customers meet their shared responsibility requirements.

    We will also have surprise announcements and offers during the webinar!
  • Value preservation, lessons from the Florentine Banker attack Recorded: Sep 10 2020 55 mins
    Aseel Kayal (Malware Analyst @ Check Point Software) and Dr. Rois Ni Thuama (Head of Cyber Governance @ Red Sift)
    Join Dr. Rois Ni Thuama, Head of Cyber Governance at Red Sift
    and our threat expert Aseel Kayal as they unravel the story on The Florentine Banker attack and shed light on how sophisticated Business Email Compromise attacks take place.

    You will:

    - Enjoy a deep dive breakdown of how bad actors were able to steal over one million pounds in the Florentine Banker attack
    - Discover the legal implications for decision makers who fall victim to similar attacks including FCA censure, fines and the case for shareholder class actions
    - Discuss the importance of value preservation and how firms can easily avoid similar attacks in the future
  • Check Point Infinity Architektur Recorded: Sep 8 2020 27 mins
    Mirko Kürten, Strategic Sales Manager, Check Point
    In unserem Check Point Infinity Webinar am 8. September 2020 um 11:00 Uhr zeigt Ihnen Mirko Kürten, Strategic Sales Manager von Check Point, wie der Weg zur ganzheitlichen Absicherung Ihres Unternehmens aussieht. Mit Infinity haben Sie eine All-In-One Cyber Sicherheitsarchitektur für PCs, Netzwerke, Cloud und mobile Geräte kombiniert mit Echtzeitprävention und herausragenden Management.
  • SASE Securely Connects Remote and Branch Users to the Cloud Recorded: Sep 3 2020 64 mins
    Russ Schafer, Head of Product Marketing, Security Platforms
    Today’s enterprises are hyper-distributed, with applications residing everywhere including traditional datacenters, cloud data centers or accessed as cloud services, like Office 365.

    Branches are now bypassing data center security and connecting to local internet providers to reduce application latency and costs.

    Remote User connectivity is the new normal, so enterprises need to use zero trust access controls to support network connectivity at anytime from anywhere.

    The only way to secure a distributed enterprise is with distributed security. How do you do that without losing control? Check Point Secure Access Service Edge (SASE) is the solution.

    Join the webinar on September 3rd to learn more. Can't join this session? Please join us for another session on September 3rd at 9 am London | 10 am Paris | 4 pm HKT: https://bit.ly/3gVFkpe
  • SASE Securely Connects Remote and Branch Users to the Cloud Recorded: Sep 3 2020 70 mins
    Russ Schafer, Head of Product Marketing, Security Platforms
    Today’s enterprises are hyper-distributed, with applications residing everywhere including traditional datacenters, cloud data centers or accessed as cloud services, like Office 365.

    Branches are now bypassing data center security and connecting to local internet providers to reduce application latency and costs.

    Remote User connectivity is the new normal, so enterprises need to use zero trust access controls to support network connectivity at anytime from anywhere.

    The only way to secure a distributed enterprise is with distributed security. How do you do that without losing control? Check Point Secure Access Service Edge (SASE) is the solution.

    Join the webinar on September 3rd to learn more. Can't join this session? Please join another session on September 3rd at 9 am PT | 12 pm ET: https://bit.ly/3h6CzRO
  • How the US Government Combats Cyber Threats Recorded: Sep 1 2020 36 mins
    Michael Balboni, Founder, Redland Strategies | Eddie Doyle, Global Security Strategist, Check Point Software
    What is the role of government in developing cyber security policies? How much responsibility does the private sector have in defending against cyber attacks? Listen to what Eddie Doyle and Michael Balboni, President of Redland Strategies, former Senator and advisor to Homeland Security, have to say about this topic and more.

    In this talk, you'll learn:
    • What government agencies are currently doing to tackle cyber security
    • The challenges of protecting critical infrastructure and how to best secure it
    • Recommendations for CISOs on how to deal with risk in cyber security
  • 5 ways to maintain, enforce and enhance your cyber security compliance levels Recorded: Sep 1 2020 38 mins
    Kai Vaksdal, Compliance Product Manager for Europe at Check Point
    In 2019 we witnessed a record number of data breaches with employees and client's information stolen in enormous quantities. More than 90% of UK data breaches were due to human error.
    And, according to Check Point’s Cyber Security Report in 2020:
    •>80% of companies had unused or expired rules
    •77% of corporates had not fully documented their firewall rules
    •75% of corporates had not implemented anti-spoofing measures

    Join Kai Vaksdal, Compliance Product Manager for Europe at Check Point on 1st September to learn how to:
    - Detect incorrect configurations
    - Monitor policy changes
    - Translate complex regulatory requirements into actionable best practices
    - Boost your security levels
    - Get the best from your Check Point environment

    Why you should attend:

    Many Check Point customers already have the Compliance Blade included in their management, but have not activated it and are not benefitting from its best practices. Equally, most Check Point customers have a level of misconfiguration which the Compliance Blade can detect and help you to correct.

    Register and raise your security level across your entire Check Point environment with a dynamic solution that monitors your security infrastructure, gateways, blades, policies, and configuration settings in real-time.
  • Humans are the Weakest Link – Corona Edition Recorded: Aug 17 2020 44 mins
    Brian Linder, Threat Prevention Expert
    In this session you'll get up to speed and current on:

    - How humans are our weakest link in Corona times, in the new "Work From Anywhere" normal
    - Cybersecurity “blind spots” which may have been revealed, or further disguised in Corona times
    - Peek into the minds of a global Cyber research powerhouse and understand how it can benefit your security strategy
    - Implications of a potential cyber “pandemic” on a different order of magnitude mirroring the biological pandemic
  • Over 400 Vulnerabilities in Qualcomm's chip - Are you at Risk? Recorded: Aug 13 2020 63 mins
    Jonathan Shimonovich
    For the EMEA/APAC session: https://www.brighttalk.com/webcast/16731/431231

    A new Check Point Research reveals more than 400 vulnerable pieces of code in one of Qualcomm Technologies DSP chips, which are imbedded into over 40% of the mobile phone market.

    Is your mobile workforce protected? Is your corporate data secure? What is a DSP and how did we reveal these vulnerabilities?

    Get the full story on our live webinar.
  • Preventing Cyber Attacks on Industrial OT Networks and ICS Assets Recorded: Aug 13 2020 60 mins
    Mati Epstein, Head of ICS Sales, Check Point Software & Emanuel Salmona, VP of Global Partnerships, Claroty
    Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 92% of industrial organizations use IoT, many organizations are exposed.

    A range of IoT devices are connected to corporate networks, which extends the attack surface, providing more entry points for hackers.

    Join the webinar to learn how to prevent industrial-related cyber attacks by:

    •Exposing all IoT security risks across Industrial and OT networks
    •Easily creating zero trust policies to secure thousands of IoT devices
    •Enforcing multi-layered protections at the network and device levels

    Can't make this session? Please join us for another session on August 13th at 9 am London | 11 am Paris | 4 pm HKT: https://bit.ly/2DTcG9L
  • Preventing Cyber Attacks on Industrial OT Networks and ICS Assets Recorded: Aug 13 2020 60 mins
    Mati Epstein, Head of ICS Sales, Check Point Software & Emanuel Salmona, VP of Global Partnerships, Claroty
    Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 92% of industrial organizations use IoT, many organizations are exposed.

    A range of IoT devices are connected to corporate networks, which extends the attack surface, providing more entry points for hackers.

    Join the webinar to learn how to prevent industrial-related cyber attacks by:

    •Exposing all IoT security risks across Industrial and OT networks
    •Easily creating zero trust policies to secure thousands of IoT devices
    •Enforcing multi-layered protections at the network and device levels

    Can't make this session? Join us for another session on August 13th at 9 am PST | 12 pm EST: https://bit.ly/2DPPPMa
  • Uncompromised Security with the Industry's Fastest 1U Security Gateway Recorded: Aug 11 2020 39 mins
    Michael Greenberg, Product Marketing Manager, Check Point Software
    Check Point recently revealed the new Quantum Security GatewaysTM that provide ultra-scalable, power-efficient protection against Gen V cyber threats. For the first time in Check Point’s history, all Quantum Security GatewaysTM are bundled with Check Point’s award-winning SandBlast Zero Day Protection, right out of the box.

    Today, meet the new 28600 Quantum Hyperscale Security Gateway with 30 Gbps of Threat Prevention performance and a Hyperscale span of 1.5 Tera-bps. The new gateway provides telco-grade architecture with N+1 clustering capabilities for full resiliency and redundancy. Customers can use the new 28600 Quantum Hyperscale with Check Point Maestro to cluster Quantum Security GatewaysTM and take advantage of unified security management control across networks, clouds, mobile and IoT environments to secure their everything.

    Check Point Maestro and the Hyperscale designed Quantum Gateways offer flexibility that can support many modern use cases, such as:

    • Capacity planning. Rather than allocate for large expenses, Maestro promotes a “pay as you grow” financial model with N+1 redundancy compared to traditional clusters. It also delivers the power to help organizations detect threats in the growing volumes of encrypted traffic
    • Work-from-home needs. Easily address unplanned needs by adding gateways to clusters, applying policy management rules to new security groups, and balancing overall traffic loads
    • Mergers & Acquisition activity. Organizations that grow through acquisition can rely on their security operations teams to increase scale and manage policies quick and easily

    Register for the webinar “Uncompromised security with the industry's fastest 1U Security gateway” and take a deeper dive into what is really inside this box: both hardware and software. Together, they provide a quantum leap for network security.
  • Creating Essential Cyber Policies During the Pandemic Recorded: Aug 11 2020 41 mins
    Larry Clinton, ISA | Jason Harrell, DTCC | Robert Falzon, Check Point | Eddie Doyle, Check Point
    Cyber security policies are crucial to preventing costly data breaches and cyber threats. However, many policies were written before COVID-19. Now, our entire work culture has changed: remote work has become the new norm, and companies have accelerated their digital transformation efforts. Are your security policies up to date? Are you following current best practices?

    In this talk, you’ll learn the most effective cyber security policies for the new normal, backed by data from the ESI ThoughtLab survey of over 1,000 CISOs.
  • Check Point Best Practices for a Secure Migration to AWS Recorded: Aug 6 2020 74 mins
    Brett Looney, Global Solutions Architect at AWS and Richard Cove, Cloud Sales Architect, APAC at Check Point
    To fully embrace the cloud, businesses need to understand where the balance of responsibilities lie between protecting the cloud infrastructure (which is the responsibility of AWS) and protecting the data that resides in the cloud (which is the responsibility of the customer). This is what AWS refers to as the shared responsibility model.

    Join this webinar co-hosted by Check Point and AWS for best practices on how to build a secure cloud deployment.

    Learn about:
    • AWS infrastructure capabilities for enterprise class architecture, building resiliency, scalability and security in your architecture using AWS services.
    • Check Point's cloud security blueprint, which helps customers design secure cloud architectures.
    • How CloudGuard cloud security solutions can help AWS customers meet their shared responsibility requirements.

    We will also have surprise announcements and offers during the webinar!
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Endpoint security – not all are created equal
  • Live at: Apr 13 2020 7:00 pm
  • Presented by: Adeline Chan | Product Marketing Manager, Check Point
  • From:
Your email has been sent.
or close