InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Best Practices for a Secure Google Cloud Design

Presented by

Bahul Harikumar, Google and John Michealson, Check Point

About this talk

With experts: Bahul Harikumar, Head of Infrastructure Security Partnerships at Google and John Michealson, Head of Partner and Integration Engineering, at Check Point Are you in the process of migrating to Google Cloud? Would you like to learn best practices for designing a secure cloud deployment? Do you need to provide secure remote access to your workforce? Join this webinar co-hosted by Check Point and Google Cloud for best practices on how to build a secure cloud deployment. Learn about: • Google cloud infrastructure capabilities • Scalable and secure remote access to corporate networks and resources • Check Point's cloud security blueprint, which helps customers design secure cloud architectures with CloudGuard cloud security solutions.
Check Point Software

Check Point Software

58735 subscribers422 talks
The Leading Cyber Security Platform
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.
Related topics