Hi [[ session.user.profile.firstName ]]

Best Practices for a Secure OCI Migration

Are you considering – or already in the process of – migrating to Oracle Cloud Infrastructure? Would you like to learn best practices for designing a secure cloud deployment? Do you need to provide scalable, secure remote access to your workforce?

Join this webinar co-hosted by Check Point and Oracle for best practices on how to build a secure cloud deployment.

Learn about:

• Oracle Cloud Infrastructure key features and benefits
• Scalable and secure remote access to corporate networks and resources
• Check Point's cloud security blueprint, which helps customers design secure cloud architectures with CloudGuard cloud security solutions

9am EST | 2pm UK | 4pm Moscow
Recorded Jun 9 2020 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Phil Griston, Sr. Principal Product Manager Oracle Cloud Infrastructure and Jeff Engel, Cloud Alliance Architect, Check Point
Presentation preview: Best Practices for a Secure OCI Migration
  • Channel
  • Channel profile
  • Preventing Cyber Attacks on Industrial OT Networks and IoT Devices Aug 12 2020 4:00 pm UTC 60 mins
    Mati Epstein, Head of ICS Sales, Check Point Software & Emanuel Salmona, VP of Global Partnerships, Claroty
    Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 92% of industrial organizations use IoT, many organizations are exposed.

    A range of IoT devices are connected to corporate networks, which extends the attack surface, providing more entry points for hackers.

    Join the webinar to learn how to prevent industrial-related cyber attacks by:

    •Exposing all IoT security risks across Industrial and OT networks
    •Easily creating zero trust policies to secure thousands of IoT devices
    •Enforcing multi-layered protections at the network and device levels
  • Preventing Cyber Attacks on Industrial OT Networks and IoT Devices Aug 12 2020 8:00 am UTC 60 mins
    Mati Epstein, Head of ICS Sales, Check Point Software & Emanuel Salmona, VP of Global Partnerships, Claroty
    Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 92% of industrial organizations use IoT, many organizations are exposed.

    A range of IoT devices are connected to corporate networks, which extends the attack surface, providing more entry points for hackers.

    Join the webinar to learn how to prevent industrial-related cyber attacks by:

    •Exposing all IoT security risks across Industrial and OT networks
    •Easily creating zero trust policies to secure thousands of IoT devices
    •Enforcing multi-layered protections at the network and device levels
  • Check Point Best Practices for a Secure Migration to AWS Aug 6 2020 5:00 am UTC 60 mins
    Brett Looney, Global Solutions Architect at AWS and Richard Cove, Cloud Sales Architect, APAC at Check Point
    To fully embrace the cloud, businesses need to understand where the balance of responsibilities lie between protecting the cloud infrastructure (which is the responsibility of AWS) and protecting the data that resides in the cloud (which is the responsibility of the customer). This is what AWS refers to as the shared responsibility model.

    Join this webinar co-hosted by Check Point and AWS for best practices on how to build a secure cloud deployment.

    Learn about:
    • AWS infrastructure capabilities for enterprise class architecture, building resiliency, scalability and security in your architecture using AWS services.
    • Check Point's cloud security blueprint, which helps customers design secure cloud architectures.
    • How CloudGuard cloud security solutions can help AWS customers meet their shared responsibility requirements.

    We will also have surprise announcements and offers during the webinar!
  • Preventing Cyber Attacks on Enterprise Networks and IoT Devices Jul 30 2020 4:00 pm UTC 60 mins
    Mor Ahurvia, Product Marketing Manager, Check Point Software & Vince Vermeulen, Solution Architect, Armis
    Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 63% of enterprises use IoT, many organizations are exposed.

    A range of IoT devices are connected to corporate networks, which extends the attack surface, providing more entry points for hackers.

    Join the webinar to learn how to prevent enterprise-related IoT cyber attacks by:

    •Exposing all IoT security risks across the network
    •Easily creating zero trust policies to secure thousands of IoT devices
    •Enforcing multi-layered protections at the network and device levels
  • Preventing Cyber Attacks on Enterprise Networks and IoT Devices Jul 30 2020 8:00 am UTC 60 mins
    Mor Ahurvia, Product Marketing Manager, Check Point Software & Marko Kirschner, Senior Director Solutions Architecture, Armis
    Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 63% of enterprises use IoT, many organizations are exposed.

    A range of IoT devices are connected to corporate networks, which extends the attack surface, providing more entry points for hackers.

    Join the webinar to learn how to prevent enterprise-related IoT cyber attacks by:

    •Exposing all IoT security risks across the network
    •Easily creating zero trust policies to secure thousands of IoT devices
    •Enforcing multi-layered protections at the network and device levels
  • Protecting Healthcare IoT Devices and Networks Jul 20 2020 4:00 pm UTC 60 mins
    Mor Ahurvia, Product Marketing Manager, Check Point and Stephan Goldberg, VP of Systems Engineering, Medigate
    Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 82% of healthcare organizations use IoT, many hospitals and healthcare organizations are exposed.

    A range of IoT devices are connected to IT and OT networks including IP camera’s, MRI and ultrasound machines and patient monitors. Unfortunately, connecting IoT devices to the network extends the attack surface providing more entry points for hackers.

    Join the webinar to learn how to prevent healthcare-related IoT cyber attacks by:
    •Exposing all IoT security risks across the network
    •Easily creating zero trust policies to secure thousands of IoT devices
    •Enforcing multi-layered protections at the network and device levels
  • Protecting Healthcare IoT Devices and Networks Jul 20 2020 8:00 am UTC 60 mins
    Mor Ahurvia, Product Marketing Manager, Check Point and Offir Levy, Director of Sales Engineering, Medigate
    Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 82% of healthcare organizations use IoT, many hospitals and healthcare organizations are exposed.

    A range of IoT devices are connected to IT and OT networks including IP camera’s, MRI and ultrasound machines, and patient monitors. Unfortunately, connecting IoT devices to the network extends the attack surface providing more entry points for hackers.

    Join the webinar to learn how to prevent healthcare-related IoT cyber attacks by:
    •Exposing all IoT security risks across the network
    •Easily creating zero trust policies to secure thousands of IoT devices
    •Enforcing multi-layered protections at the network and device levels
  • Preventing Attacks on IoT Networks and Devices Jul 16 2020 7:00 pm UTC 30 mins
    Russ Schafer, Head of Product Marketing, Security Platforms
    Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 63% of enterprises, 92% of industrial organizations and 82% of health care organizations use IoT, almost every company is exposed. Unfortunately, connecting IoT devices to the network extends the attack surface providing more entry points for hackers.

    Join the webinar to learn how to prevent IoT cyber attacks by:
    •Exposing all IoT security risks across IT and OT networks
    •Easily creating policies to secure thousands of IoT devices
    •Preventing both network-based and device-level attacks
  • Preventing Attacks on IoT Networks and Devices Jul 16 2020 8:00 am UTC 60 mins
    Mor Ahurvia, Product Marketing Manager
    Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 63% of enterprises, 92% of industrial organizations and 82% of health care organizations use IoT, almost every company is exposed. Unfortunately, connecting IoT devices to the network extends the attack surface providing more entry points for hackers.

    Join the webinar to learn how to prevent IoT cyber attacks by:
    •Exposing all IoT security risks across IT and OT networks
    •Easily creating policies to secure thousands of IoT devices
    •Preventing both network-based and device-level attacks
  • Office 365 & G Suite: Are you really protected? Jul 15 2020 5:00 pm UTC 45 mins
    Ran Schwartz | Product Manager, Danielle Guetta | Product Marketing Manager
    Did you know that over 90% of attacks on organizations start from a malicious email?

    **Register to the EMEA/APAC session here: https://www.brighttalk.com/webcast/16731/411159

    With email attacks usually involving the human factor, your Office 365 and G Suite environments are your organization’s weakest link. To stay protected you need to cover all threat vectors: phishing, malware, account takeover and data theft. This might put you in a battle between the security level you need to what your organization can actually afford and manage.

    Battle no more - join us for our live webinar where we will explore why platform-provided security is not enough, and how CloudGuard SaaS allows you to easily achieve the security you need with the operational simplicity you desire.
  • Office 365 & G Suite: Are you really protected? Jul 15 2020 8:00 am UTC 45 mins
    Ran Schwartz | Product Manager, Danielle Guetta | Product Marketing Manager
    Did you know that over 90% of attacks on organizations start from a malicious email?

    With email attacks usually involving the human factor, your Office 365 and G Suite environments are your organization’s weakest link. To stay protected you need to cover all threat vectors: phishing, malware, account takeover and data theft. This might put you in a battle between the security level you need to what your organization can actually afford and manage.

    Battle no more - join us for our live webinar where we will explore why platform-provided security is not enough, and how CloudGuard SaaS allows you to easily achieve the security you need with the operational simplicity you desire.
  • Check Point Best Practices for a Secure Migration to AWS Recorded: Jul 9 2020 78 mins
    Sameer Vasanthapuram, Partner Solutions Architect at AWS and Daniel Goldenstein-Bar, R&D group manager at Check Point
    To fully embrace the cloud, businesses need to understand where the balance of responsibilities lie between protecting the cloud infrastructure (which is the responsibility of AWS) and protecting the data that resides in the cloud (which is the responsibility of the customer). This is what AWS refers to as the shared responsibility model.

    Join this webinar co-hosted by Check Point and AWS for best practices on how to build a secure cloud deployment.

    Learn about:
    • AWS infrastructure capabilities for enterprise class architecture, building resiliency, scalability and security in your architecture using AWS services.
    • Check Point's cloud security blueprint, which helps customers design secure cloud architectures.
    • How CloudGuard cloud security solutions can help AWS customers meet their shared responsibility requirements.

    We will also have surprise announcements and offers during the webinar!
  • Industrial IoT Security Webinar – Solution approaches, trends and opportunities Recorded: Jul 9 2020 36 mins
    Ralf Mutzke, Accenture Security; Mike Wilhelm, Check Point; Dirk Berger, Check Point
    Register for Check Point and Accenture joint webinar on Industrial IoT Security to find out:
    •What are the necessary steps on the way to Industry X.0, with regard to critical security and connectivity requirements?
    •Added value for customers from a security perspective in the areas of users, data, devices and networks
    •Overview of different solution scenarios
    •Q&A session
  • Check Point Introduces Infinity SOC Recorded: Jul 7 2020 59 mins
    Maya Horowitz, Director of Threat Intelligence & Research, Ran Ish Shalom & Oren Koren, Product Manager
    For many SOC teams, finding malicious activity inside the network is like finding a needle in a haystack. They are often forced to translate information from across a multitude of monitoring solutions and navigate through tens of thousands of daily alerts. The results: critical attacks are missed until it’s too late.

    On July 7, we will introduce Infinity SOC to address these challenges. Check Point Infinity SOC, a cloud-based platform enables security teams to expose, investigate, and shut down attacks faster, and with 99.9% precision.

    Join our webinar to learn how Infinity SOC:

    • Exposes and shuts down only real attacks with 99.9 precision
    • Accelerates and deepens investigations with the industry’s most powerful threat intelligence
    • Eliminates deployment, integration and privacy issues.
  • Check Point, Aruba and HPE Pointnext: Delivering Best-of-Breed SD-WAN Security Recorded: Jul 6 2020 47 mins
    Ad Attias, Product Manager, Check Point | Haim Klos, Network & Security PS Manager, HPE | Ruby Cohen, Presales Lead, Aruba
    With enterprises shifting to remote working across the globe, users need secure, reliable access to cloud applications.

    Now more than ever, enterprises are turning to SD-WAN for optimized connectivity, performance, and reliability to enable their remote workforce with the tools they need to be productive.

    Check Point and Aruba have joined forces to provide an integrated SD-WAN solution that provides enterprises, their branch offices, and remote workers with:

    •Advanced threat prevention
    •Maximum performance
    •Simplified deployments
    •Reduced costs

    Join the webinar to learn how Check Point and Aruba secure your SD-WAN connections to the cloud with best-of-breed networking and security.
  • Cybersecurity in the Age of Cloud Recorded: Jul 2 2020 30 mins
    Sean Sweeney | Sr. Director & Chief Security Advisor, Microsoft
    Cloud is fundamentally changing how we need to be approaching cybersecurity. Digital transformation has pushed our organizations to adopt technologies that stretch beyond the traditional network boundaries and the attack techniques used against our organizations have transformed as well. Join Sean Sweeney, Microsoft Chief Security Advisor, in a review of the cybersecurity transformation that is occurring, the evolution of the threat landscape, and the new imperatives that allow organizations to operate in cloud securely.
  • SD-WAN Security: Best-of-Breed or Unified Approach? Recorded: Jul 2 2020 31 mins
    Ad Attias | Product Manager
    As enterprises move their branch applications to the cloud, they are adopting Software Defined Wide Area Networking (SD-WAN) for better application performance by intelligently and efficiently routing traffic directly to the internet without passing it through the data center.

    But this needs to happen without compromising security. This talk will address how using both application performance and security can be assured without one compromising the other.
  • It ain't done till it's automated. Security at the speed of DevOps Recorded: Jul 2 2020 32 mins
    Hillel Solow | Serverless Security Architect
    Amidst the growing buzz for shift-left developer centric security methods, this session will highlight the need for a common ground between security and DevOps and offer guidance on how to build in security without impeding agility.
  • Hybrid Cloud Blueprint: Best Practices for Designing Secure Cloud Deployments Recorded: Jul 2 2020 36 mins
    Arnfinn Strand, Cloud Security Architect
    Protecting you from you is the #1 challenge in the age of SDE - Software Defined Everything. Using public clouds for enterprise data centers is now mainstream; the advantages are significant and the gained agility indisputable.

    However, the number of services and options being offered is daunting. And with these choices come consequences; one misconfiguration can put your entire organization at risk…or worse.

    Join this session to learn the best practices to providing advanced threat prevention security for applications and data in private, public, and hybrid clouds.
  • Your Journey to the Cloud – The Secure Way Recorded: Jul 2 2020 29 mins
    Peter Sandkuijl | SE Director, EMEA, Check Point Evangelist
    In 2020 cloud-related attacks and breaches made even more headlines and companies realized they needed to get their act together.

    So they started to abandon homegrown open-source security tools and focused on consolidated cloud-based threat prevention frameworks offering complete coverage to cloud-related attacks. Going into 2020 & 2021, we're seeing this trend grow as more cloud-related technologies are gaining great security from the industry with specific answers to security challenges of containers, Kubernetes environments, and serverless workloads. In this session, we will cover recent trends and highlight some of the advancements made in fending off threats and turning security into an enabler force in enterprise digital transformation.
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for a Secure OCI Migration
  • Live at: Jun 9 2020 1:00 pm
  • Presented by: Phil Griston, Sr. Principal Product Manager Oracle Cloud Infrastructure and Jeff Engel, Cloud Alliance Architect, Check Point
  • From:
Your email has been sent.
or close