Hi [[ session.user.profile.firstName ]]

Threat Intelligence and Forensics in CloudGuard Dome9

Check Point CloudGuard Dome9 has provided you an efficient way to visualize and evaluate security posture, while enforcing golden standard policies and compliance measures in the cloud.

As part of this webinar, we will highlight how incidence response and forensics can further enhance your security posture across your multi-cloud environments.

Join the webinar and learn how to use special capabilities within CloudGuard Dome9 for threat hunting and intelligence.

What you will gain:
•advanced cloud security intelligence,
•contextualized visualization of threats,
•actionable security insights
Recorded May 19 2020 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Beckett, Cloud Security at Check Point
Presentation preview: Threat Intelligence and Forensics in CloudGuard Dome9
  • Channel
  • Channel profile
  • How to get started with Zero Trust Network Access – 3 Top Use Cases Sep 29 2021 3:00 pm UTC 30 mins
    Jacob Lee, Humza Ismaiel
    Looking to get started with zero trust network access (ZTNA)?

    Join us for a live 30-minute Zero Trust Expert Session to get all the basics.

    Learn how to implement ZTNA-as-a-service for the top three use cases:

    • BYOD and Contractors – Deploy user-friendly clientless remote access, with no agent required
    • Managed Devices – Extend remote access with a simple, scalable and more secure solution
    • DevOps Access - Simplify cloud operations with tag-based management, PAM and SSO

    In this session, you’ll discover how to:

    • Offer users a breezy access experience
    • Synch users with your current identity provider
    • Enforce granular policies at the app, command and query level
    • Gain full visibility into user activity post-login

    Get your questions answered in this live demo and Q&A.

    Or explore upcoming 30-minute Zero Trust Expert Sessions below:

    How to get started with Zero Trust Network Access – Top Three Use Cases
    Weds. 8th Sept, 4pm London | 8am Pacific | 11am Eastern
    You're signing up for this session. Can't make this time?
    For APAC sessions, go here: https://www.brighttalk.com/webcast/16731/502287

    How to integrate Azure AD identities with cloud-based Zero Trust
    Watch replay of Weds. 8th Sept session
    https://www.brighttalk.com/webcast/16731/502225

    ZTNA in 15 Minutes for Employees & Contractors
    Watch replay of Weds. 18th August session
    https://www.brighttalk.com/webcast/16731/502279
  • How to get started with Zero Trust Network Access – 3 Top Use Cases Sep 29 2021 2:00 am UTC 30 mins
    Jacob Lee, Manish Upadhaya
    Looking to get started with zero trust network access (ZTNA)?

    Join us for a live 30-minute Zero Trust Expert Session to get all the basics.

    Learn how to implement ZTNA-as-a-service for the top three use cases:

    • BYOD and Contractors – Deploy user-friendly clientless remote access, with no agent required
    • Managed Devices – Extend remote access with a simple, scalable and more secure solution
    • DevOps Access - Simplify cloud operations with tag-based management, PAM and SSO

    In this session, you’ll discover how to:

    • Offer users a breezy access experience
    • Synch users with your current identity provider
    • Enforce granular policies at the app, command and query level
    • Gain full visibility into user activity post-login

    Get your questions answered in this live demo and Q&A.

    Can't make this time? For the AMER/EMEA session, go here: https://www.brighttalk.com/webcast/16731/502226

    Explore other upcoming 30-minute Zero Trust Expert Sessions below:

    How to get started with Zero Trust Network Access – Top Three Use Cases
    Weds. 29th Sept, 10am Singapore | 11am Tokyo | 12pm Sydney
    You're signing up for this session.

    How to integrate Azure AD identities with cloud-based Zero Trust
    Watch replay of Weds. 8th Sept session
    https://www.brighttalk.com/webcast/16731/502283

    ZTNA in 15 Minutes for Employees & Contractors
    Watch replay of Weds. 18th August session
    https://www.brighttalk.com/webcast/16731/502279
  • How to integrate Microsoft Azure AD identities with cloud based Zero Trust Sep 8 2021 3:00 pm UTC 30 mins
    Jacob Lee, Humza Ismaiel
    Discover how you can easily extend Microsoft Azure AD identities to zero trust network access (ZTNA).

    Join us for a live 30-minute Zero Trust Expert Session to see how you can:

    • Replace legacy VPNs with ZTNA-as-a-service
    • Enforce granular permissions at the app, command and query level
    • Leverage Azure AD multi-factor authentication and SSO
    • Choose between Just-In-Time (JIT) onboarding or full ongoing sync
    • Gain full visibility with session recordings and audit trail

    Get your questions answered in this live demo and Q&A.

    Can't make this time? For APAC sessions, go here: https://www.brighttalk.com/webcast/16731/502283

    Explore other 30-minute Zero Trust Expert Sessions below:

    How to integrate Azure AD identities with cloud-based Zero Trust
    Weds. 8th Sept, 4pm London | 8am Pacific | 11am Eastern
    You're signing up for this session.

    How to get started with Zero Trust Network Access – Top Three Use Cases
    Weds. 29th Sept, 4pm London | 8am Pacific | 11am Eastern
    https://www.brighttalk.com/webcast/16731/502226

    ZTNA in 15 Minutes for Employees & Contractors
    Watch replay of Weds. 18th August session
    https://www.brighttalk.com/webcast/16731/501736
  • How to integrate Microsoft Azure AD identities with cloud-based Zero Trust Sep 8 2021 2:00 am UTC 30 mins
    Jacob Lee, Manish Upadhaya
    Discover how you can easily extend Microsoft Azure AD identities to zero trust network access (ZTNA).

    Join us for a live 30-minute Zero Trust Expert Session to see how you can:

    • Replace legacy VPNs with ZTNA-as-a-service
    • Enforce granular permissions at the app, command and query level
    • Leverage Azure AD multi-factor authentication and SSO
    • Choose between Just-In-Time (JIT) onboarding or full ongoing sync
    • Gain full visibility with session recordings and audit trail

    Get your questions answered in this live demo and Q&A.

    Register for the upcoming 30-minute Zero Trust Expert Sessions below:

    How to integrate Azure AD identities with cloud-based Zero Trust
    Weds. 8th Sept, 10am Singapore | 11am Tokyo | 12pm Sydney
    You're signing up for this session. Can't make this time?
    For AMER/EMEA sessions, go here: https://www.brighttalk.com/webcast/16731/502225

    ZTNA in 15 Minutes for Employees & Contractors
    Watch replay of Weds. 18th August session:
    https://www.brighttalk.com/webcast/16731/502279

    How to get started with Zero Trust Network Access – Top Three Use Cases
    Weds. 29th Sept, 10am Singapore | 11am Tokyo | 12pm Sydney
    https://www.brighttalk.com/webcast/16731/502287
  • Nine Best Practices for Cloud Security Aug 24 2021 5:00 am UTC 75 mins
    Shawne Luyke, Cloud Security Architect, ANZ and Jonathan Maresky, Cloud Security Product Marketing Manager
    Cloud security has become business-critical as organizations expand and deepen their cloud presence.
    A key foundational layer is cloud network security, where organizations should deploy virtual security gateways to provide advanced threat prevention, traffic inspection and micro-segmentation.

    Join this webinar to learn from the leading cloud security experts:
    - Top ten criteria you should be using to choose your cloud network security solution
    - Nine best practices for cloud security
    - Three cool new capabilities - fresh out of the Check Point technology brains-trust
  • Blocking Sophisticated Attacks with the Power of AI Aug 19 2021 3:00 pm UTC 45 mins
    Yaniv Shechtman, Head of Product Management -Threat Prevention, Check Point Software Technologies
    The threat landscape in 2021 shows a significant increase in sophisticated attack vectors such as ransomware, phishing, supply-chain, SW vulnerabilities exploits, and others. In this session, we will cover some examples of these vectors, and explain how security solutions can stay ahead of the attackers and their ever-evolving tactics by using the power of AI.
  • How to deploy Zero Trust Network Access in 15 mins for employees & contractors Aug 18 2021 3:00 pm UTC 30 mins
    Jacob Lee, Humza Ismaiel
    You may not know it, but Zero Trust Network Access (ZTNA) can take just 15 minutes to deploy.

    For employees, contractors and partners, you can now quickly ensure least privilege access—flawlessly.

    Join us for a live 30-minute Zero Trust Expert Session to see how you can:

    • Deploy *clientless* remote access, with no agent required
    • Offer single sign-on with your current identity provider
    • Define and enforce granular in-app policies
    • Prevent lateral movement with application layer access
    • Gain full visibility into all user activity post-login

    Get your questions answered in this live demo and Q&A.

    Can't make this time? For APAC sessions, go to: https://www.brighttalk.com/webcast/16731/502279


    Explore other 30-minute Zero Trust Expert Sessions below:

    ZTNA in 15 Minutes for Employees & Contractors
    Weds. 18th Aug., 4pm London | 8am Pacific Time | 11am Eastern Time
    You're signing up for this session.

    How to integrate Azure AD identities with cloud-based Zero Trust
    Weds. 8th Sept, 4pm London | 8am Pacific Time | 11am Eastern Time
    https://www.brighttalk.com/webcast/16731/502225

    How to get started with Zero Trust Network Access – Top Three Use Cases
    Weds. 29th Sept, 4pm London | 8am Pacific Time | 11am Eastern Time
    https://www.brighttalk.com/webcast/16731/502226
  • How to deploy Zero Trust Network Access in 15 mins for employees and contractors Aug 18 2021 2:00 am UTC 30 mins
    Jacob Lee, Manish Manish Upadhaya
    You may not know it, but Zero Trust Network Access (ZTNA) can take just 15 minutes to deploy.

    For employees, contractors and partners, you can now quickly ensure least privilege access—flawlessly.

    Join us for a live 30-minute Zero Trust Expert Session to see how you can:

    • Deploy *clientless* remote access, with no agent required
    • Offer single sign-on with your current identity provider
    • Define and enforce granular in-app policies
    • Prevent lateral movement with application layer access
    • Gain full visibility into all user activity post-login

    Get your questions answered in this live demo and Q&A.

    Can't make this time? For AMER/EMEA sessions, register here: https://www.brighttalk.com/webcast/16731/501736

    Explore upcoming 30-minute Zero Trust Expert Sessions below:

    ZTNA in 15 Minutes for Employees & Contractors
    Weds. 18th Aug., 10am Singapore | 11am Tokyo | 12pm Sydney
    You're signing up for this session.

    How to integrate Azure AD identities with cloud-based Zero Trust
    Weds. 8th Sept, 10am Singapore | 11am Tokyo | 12pm Sydney
    https://www.brighttalk.com/webcast/16731/502283

    How to get started with Zero Trust Network Access – Top Three Use Cases
    Weds. 29th Sept, 10am Singapore | 11am Tokyo | 12pm Sydney
    https://www.brighttalk.com/webcast/16731/502287
  • Prevent Cyber Attacks through AI-Driven Threat Prevention & Security Management Aug 17 2021 7:00 pm UTC 45 mins
    Guy Israeli, Product Manager- Security Services, Check Point
    Ransomware, zero-day and supply chain security threats have become more sophisticated, so automated threat prevention and security policy orchestration will be the key to protecting your enterprise from the expanding threat landscape.

    Check Point's Quantum Cyber Security Platform is the industry's most advanced AI & ML-driven network security threat prevention and security management software. In 2020, R81 introduced the first Autonomous Threat Prevention system with 60+ AI & ML threat prevention engines for complete protection against zero-day threats.

    With support from the Check Point ThreatCloud global threat intelligence database, your enterprise network security is automatically updated to protect against the latest threats.

    Join the session to learn how Check Point's Cyber Security Platform with automated threat prevention and security management can protect your enterprise.
  • Prevent Cyber Attacks with AI-Driven Threat Prevention and Security Management Aug 17 2021 8:00 am UTC 60 mins
    Guy Israeli, Product Manager
    Ransomware, zero day and supply chain security threats have become more sophisticated, so automated threat prevention and security policy orchestration will be the key to protecting your enterprise from the expanding threat landscape.

    Check Point's Quantum Cyber Security Platform is the industry's most advanced AI & ML driven network security threat prevention and security management software. In 2020, R81 introduced the first Autonomous Threat Prevention system with 60+ AI & ML threat prevention engines for complete protection against zero-day threats.

    With support from the Check Point ThreatCloud global threat intelligence database, your enterprise network security is automatically updated to protect against the latest threats.

    Join the session to learn how Check Point's Cyber Security Platform with automated threat prevention and security management can protect your enterprise
  • The ROI of Cloud Security with Microsoft and Check Point (Portuguese) Aug 12 2021 1:00 pm UTC 75 mins
    TBD
    Cloud network security is a key foundational layer to protect customers’ cloud migration and cloud assets.
    Check Point commissioned Forrester Consulting to conduct a Total Economic Impact study on Check Point CloudGuard Network Security and found that in addition to CloudGuard securing hybrid-cloud assets, it also provided a 169% return on investment over 3 years.
    Join this webinar to:
    • Learn more about the study which was based on interviews with a CloudGuard and Azure customer – a large US-based healthcare company with over $10B annual revenue.
    • Understand the ROI of migrating workloads to Azure
    • Participate in a fireside chat and Q&A with Microsoft and Check Point execs in Latin America around Digital Transformation and how best to secure your cloud journey
  • Cisco ACI Security Improvements with CloudGuard Aug 11 2021 5:00 am UTC 75 mins
    Sammo Li, Cloud Security Architect, and Jon Ng, Cloud Security Engineer Team Leader, both at Check Point
    Are you using Cisco ACI or are you planning a Cisco ACI deployment?
    Do you want to design security into your deployment, or improve the security of your current network?

    Join Christoph Strebl, Cloud Security Architect at Check Point, and learn about:
    - Cisco ACI networking features and functionality, THEN and NOW (including Single, Multipod, and Multisite architectures)
    - Security architecture and Check Point integration design principles
    - Requirements and design considerations for a secure Cisco ACI deployment
  • The History, Evolution and Future of Social Engineering Aug 3 2021 3:00 pm UTC 60 mins
    Maya Horowitz
    Throughout history people have been taking advantage of others through different (some more sophisticated than others) social engineering techniques that exploit the human nature and its inherent vulnerabilities.

    In this webinar, Maya Horowitz, Check Point's VP Research, will take you through some of the most shocking social engineering scams in history, all the way to social engineering in emails, and where it's headed in the near future.

    Join us in a fascinating journey through time and hear the stories that truly show how humans can be incredibly smart and sophisticated on one hand, and insanely easy to manipulate on the other.
  • Protecting Healthcare Organizations from DDoS Threats - Before, During and After Recorded: Jul 27 2021 19 mins
    Etienne Lopez, Debra Price
    IT’S INEVITABLE! Somewhere, at some point, you will be the target of a DDoS attack. At just the beginning of this year we saw approximately 2.9M DDoS attacks, an increase of 31% since 2020. DDoS attacks are a nightmare for healthcare organizations as they flood the network with malicious traffic which can bring critical applications down, prevent patients from accessing services, or even expose private patient information. The good news, however, is that there is plenty to be done about it. While you can’t predict when an attack will happen, we will help by providing some security best practices you can implement to allow you to minimize the impact of the attack, recovery quickly, and ensure it doesn’t happen again.

    Join us in this discussion to learn how you can protect your healthcare organization against DDoS attacks.
  • Navigating Cloud Security – No two organisations are the same Recorded: Jul 27 2021 52 mins
    Matt Irvine | Stuart Green
    Join this interaction between Matt Irvine and Stuart Green on how they see different types of businesses approach securing their cloud environments, the pitfalls and challenges they faced, and the solutions they implemented to address them.

    In this session, they discuss how some of their clients tackle areas such as visibility, misconfiguration, identity & access management (IAM), while maintaining agility in the ever evolving world of cloud.
  • Webinar: Mejoras de Seguridad con CloudGuard integrado con Cisco ACI Recorded: Jul 22 2021 59 mins
    Elier Cruz, arquitecto de seguridad global
    ¿Está utilizando Cisco ACI o planea una implementación de Cisco ACI?

    ¿Quiere aprender a diseñar la seguridad de su nueva red o a mejorar la seguridad de la red actual?

    Únase a los expertos de Check Point y aprenda sobre:
    • Caracteristicas y funciones de red Cisco ACI: ENTONCES y AHORA (incluidas las arquitecturas Single, Multipod y Multisitio)
    • Arquitectura de seguridad y diseño de integración con Check Point
    • Principios, Requisitos y consideraciones de diseño para una implementación segura de Cisco ACI

    ---------------------------------------------------------

    Are you using Cisco ACI or are you planning a Cisco ACI deployment?
    Do you want to design security into your deployment, or improve the security of your current network?

    Join Elier Cruz, Global Security Architect at Check Point, and learn about:
    - Cisco ACI networking features and functionality, THEN and NOW (including Single, Multipod, and Multisite architectures)
    - Security architecture and Check Point integration design principles
    - Requirements and design considerations for a secure Cisco ACI deployment
  • Cisco ACI Security Improvements with CloudGuard Recorded: Jul 20 2021 60 mins
    Elier Cruz, Global Security Architect, and Maya Levine, Cloud Technical Marketing Engineer, both at Check Point
    Are you using Cisco ACI or are you planning a Cisco ACI deployment?
    Do you want to design security into your deployment, or improve the security of your current network?

    Join Elier Cruz, Global Security Architect, and Maya Levine, Cloud Technical Marketing Engineer, both at Check Point, and learn about:
    - Cisco ACI networking features and functionality, THEN and NOW (including Single, Multipod, and Multisite architectures)
    - Security architecture and Check Point integration design principles
    - Requirements and design considerations for a secure Cisco ACI deployment
  • The ROI of Cloud Security with Microsoft and Check Point (Spanish) Recorded: Jul 15 2021 57 mins
    Ronald Godinez, Cloud Security Sales Specialist at Check Point
    Cloud network security is a key foundational layer to protect customers’ cloud migration and cloud assets.
    Check Point commissioned Forrester Consulting to conduct a Total Economic Impact study on Check Point CloudGuard Network Security and found that in addition to CloudGuard securing hybrid-cloud assets, it also provided a 169% return on investment over 3 years.
    Join this webinar to:
    • Learn more about the study which was based on interviews with a CloudGuard and Azure customer – a large US-based healthcare company with over $10B annual revenue.
    • Understand the ROI of migrating workloads to Azure
    • Participate in a fireside chat and Q&A with Microsoft and Check Point execs in Latin America around Digital Transformation and how best to secure your cloud journey
  • Cisco ACI Security Improvements with CloudGuard Recorded: Jul 15 2021 66 mins
    Christoph Strebl, Cloud Security Architect at Check Point
    Are you using Cisco ACI or are you planning a Cisco ACI deployment?
    Do you want to design security into your deployment, or improve the security of your current network?

    Join Christoph Strebl, Cloud Security Architect at Check Point, and learn about:
    - Cisco ACI networking features and functionality, THEN and NOW (including Single, Multipod, and Multisite architectures)
    - Security architecture and Check Point integration design principles
    - Requirements and design considerations for a secure Cisco ACI deployment
  • How a Cyberattack Drove HVHS to Market-Leading IoT Security Recorded: Jul 14 2021 58 mins
    Itzik Feiglevitch (Check Point), Tom Finn (Medigate), Robert Swaskoski (Heritage Valley Health System)
    Having experienced a disruptive NotPetya cyberattack in 2017, Heritage Valley Health System (HVHS) took action to modernize its cybersecurity infrastructure. Leadership recognized the need for more comprehensive and detailed asset visibility. Whether preventing the spread of malware or blocking malicious traffic to and from devices hosted on clinical networks, HDOs require an intimate understanding of the devices hosted on our networks. Not just make and model information, but comprehensive intelligence. Not a static snapshot, but a moving, dynamic picture. When armed with the right information, workflows get smarter, installed systems perform better and investments in new capabilities can be intelligently rationalized. This webinar will detail how the latest advances in clinical network visibility are enabling connected care delivery by powering security enforcement strategies in a simplified, more manageable context. As detailed by Robert Swaskoski, CISO, Heritage Valley Health System, this webinar will take listeners through the promised benefits of the Check Point/Medigate integration, and will wrap-up with a discussion detailing the resulting business value.
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Threat Intelligence and Forensics in CloudGuard Dome9
  • Live at: May 19 2020 8:00 am
  • Presented by: Chris Beckett, Cloud Security at Check Point
  • From:
Your email has been sent.
or close