Hi [[ session.user.profile.firstName ]]

Check Point Introduces Infinity SOC

Many SOC teams struggle to find and shut down attacks before the damage spreads. Your customers are probably facing the same challenges. However, you can help them.

On July 7, we will be launching Check Point Infinity SOC, a cloud-based platform that enables security teams to expose, investigate, and shut down attacks faster, and with 99.9% precision.

Join the partner only webinar on July 6, to learn all about Infinity SOC, where we will take a look at the product features and cover topics like:

• SOC market opportunities and what’s in it for you
• How to identify relevant prospects
• How to pitch and differentiate Infinity SOC from the competition
• Key takeaways from customer success stories

Note: This is strictly a Check Point partner webinar only.

Register for the EMEA/APAC session: https://www.brighttalk.com/webcast/16731/417794
Recorded Jul 6 2020 53 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ran Ish Shalom & Oren Koren, Product Manager, Hadar Waldman, Security Evangelist
Presentation preview: Check Point Introduces Infinity SOC
  • Channel
  • Channel profile
  • Best Practices for Securing Your Azure Cloud Nov 26 2020 10:00 am UTC 75 mins
    Matteo Malagnino, Cloud Solution Architect at Microsoft and Arnfinn Strand, Cloud Security Architect at Check Point.
    Security is key to a successful migration to Azure.
    Join this webinar to learn cloud security best practices from Microsoft and Check Point, Microsoft’s #1 Security Partner.
    We will also present exciting offers to perform an instant assessment of your current cloud security.
  • Top 3 Strategies To Protect Your Data from Ransomware Nov 17 2020 4:00 pm UTC 30 mins
    Shiraz Saeed, National Practice Leader -- Cyber Risk, Starr Companies | Eddie Doyle, Global Security Strategist, Check Point
    Ransomware attacks are some of the most devastating cyber threats that can ruin your company's finances and reputation. Nothing is more devastating than having your customer data held hostage by ransomware. Additionally, threat actors often demand ransoms that many cannot afford to pay.

    In this episode, Eddie Doyle will interview Shiraz Saeed, National Practice Leader - Cyber Risk at Starr Companies, on the top 3 strategies to protect your data from ransomware.

    Key insights of this episode will include:
    · How employee training can help minimize your organization's risk
    · How back-up segregation can protect your data
    · The use of EDR tools to minimize the threat of ransomware
  • Architecture Best Practices for VMware NSX Security Nov 12 2020 10:00 am UTC 75 mins
    John-Patrick Edwards, Global Security Architect at Check Point
    CloudGuard Network Security for VMware NSX-T delivers industry-leading multi-layered defenses for multi-cloud architectures, allowing to protect North-South and East-West traffic with different use cases with their reference architectures.

    Learn about:
    • How the integration of CloudGuard with VMware NSX-T 2.5 and 3.0 provides advanced threat prevention and automated cloud network security.
    • Use cases, architecture diagrams, and best practices for securing SDDCs, with real customer examples.
    • Zero-Trust driven approach to build a comprehensive VMware NSX security strategy
  • How to Discover Your Biggest Cyber Security Blind Spots Nov 4 2020 5:00 pm UTC 60 mins
    Bryson Bort, CEO and Founder at SCYTHE | Eddie Doyle, Global Security Strategist at Check Point
    Are you confident your cyber defenses can withstand next-generation cyber threats? Have you checked to make sure you don't have any critical blind spots? Discovering and patching these blind spots is absolutely vital to the success of your cyber security.

    Eddie Doyle will interview Bryson Bort, CEO and Founder at SCYTHE, a cyber security platform which enables you to validate your organization's defenses without the need for costly training or technical expertise.

    It's not enough to just assume your security solution is working. You must proactively test your security solution. In this talk, Bryson will discuss how you can perform adversary emulations to test your defenses against the most advanced threat actor emulations.
  • Architecture Best Practices for VMware NSX Security Oct 29 2020 5:00 pm UTC 75 mins
    Elier Cruz, Global Security Architect at Check Point
    CloudGuard Network Security for VMware NSX-T delivers industry-leading multi-layered defenses for multi-cloud architectures, allowing to protect North-South and East-West traffic with different use cases with their reference architectures.

    Learn about:
    • How the integration of CloudGuard with VMware NSX-T 2.5 and 3.0 provides advanced threat prevention and automated cloud network security.
    • Use cases, architecture diagrams, and best practices for securing SDDCs, with real customer examples.
    • Zero-Trust driven approach to build a comprehensive VMware NSX security strategy
  • Preventing Attacks on IoT Networks and Devices Recorded: Oct 27 2020 40 mins
    Itzik Feiglevitch, Senior Product Manager – Cyber Security, Cloud, IoT and Networking
    Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 63% of enterprises, 92% of industrial organizations and 82% of health care organizations use IoT, almost every company is exposed. Unfortunately, connecting IoT devices to the network extends the attack surface providing more entry points for hackers.

    Join the webinar to learn how to prevent IoT cyber attacks by:
    • Exposing all IoT security risks across IT and OT networks
    • Easily creating policies to secure thousands of IoT devices
    • Preventing both network-based and device-level attacks
  • C-level Talk: Defining the Modern Cyber-Security Architecture Recorded: Oct 27 2020 38 mins
    Grant Asplund, Chief Cyber Security Evangelist at Check Point Software Technologies
    The stakes have never been higher for organisations to get cybersecurity right. There are many forces driving this sense of urgency: companies adding new private and public cloud platforms, new products, apps, and web capabilities, not to mention securing the increasing number of remote workers because of the Covid-19 pandemic. With the increase in sophisticated cyber-attacks, security teams are under pressure to protect organizations while under-staffed, under-equipped, and under budget. What would be the right modern approach?

    Join Grant Asplund while he explores the conclusions of a recent survey of more than 400 global security professionals, CISOs and CIOs about security consolidation. You will learn what your peers think about managing dozens of security solutions and its impact on overall security.
  • Smart Event Full Threat Visibility Recorded: Oct 26 2020 31 mins
    Roberto Quinones, Technical Territory Manager LAT GRC Sales, Check Point
    This webinar is dedicated to Smart Events, and Smart Event Products.

    You'll receive an introduction to Smart Event, real time threat detection with Smart Event, customizable views and reports, and a demo in which we investigate a security event.
  • Best Practices for Managing Cyber Risk Recorded: Oct 20 2020 33 mins
    Dominic Saebeler, Cyber and Risk Management Strategist, University of Illinois – Information Trust Institute
    Dodging every single cyber incident is impossible, but a well-governed cyber security strategy will enable you to manage technological risks within an acceptable margin. The more you know about risk management, reporting and analytics, the stronger the prevention strategies and defense mechanisms you'll put in place.

    In this talk, Dominic Saebeler, Policy & Risk Management expert at the University of Illinois, will share how he leads teams through collaborative efforts to identify and solve problems at the intersection of technology, research, data privacy, regulation, compliance and cybersecurity policies.

    Dominic will discuss:
    • The most dangerous risks to your cyber security
    • Top strategies to ultimately mitigate risk
    • Effective cyber security policies you should implement in your organization

    Click the "ATTEND" button above to reserve your seat.
  • Delivering Security Consolidation Across the Enterprise Recorded: Oct 20 2020 49 mins
    Benny Shlesinger, Head of Product Management | Guy Israeli, Product Manager | Michael Greenberg, Product Marketing Manager
    R81 is the industry’s most advanced Threat Prevention and security management software that delivers uncompromising simplicity and consolidation across the enterprise.

    The newest R81: Cyber Security Platform aims to relieve the IT admins daily effort and make managing cyber security the simplest it’s ever been. Whether it is deploying the latest technologies and security to protect the organization or fine tuning security policies, R81 enables enterprises to be their best.

    Join the webinar to learn all about the exciting new features of Check Point’s R81 Cyber Security Platform such as:

    • Infinity Threat Prevention: The industry’s first autonomous Threat Prevention system
    • Dynamic Balancing: Utilizes the best hardware performance from our security gateways
    • Revolutionized Policy Installation Process, effortless deployments and one-click upgrades
    • Best security for all encrypted traffic utilizing the latest standards including TLS 1.3 and HTTP/2
  • The next decade: opportunity in uncertain times Recorded: Oct 13 2020 57 mins
    Yahli Admati, a leading futurist and strategist
    Despite the cataclysmic events of 2020, Yahli Admati, a leading futurist and strategist is optimistic. Over the next decade, she envisions opportunities with technological innovations creating a brighter future.

    Join Yahli Admati in the next episode of Talking iTech with Eddie Doyle series as they discuss key technology capabilities fueled by artificial intelligence (AI). Topics to be discussed include:

    • Medical advancements, including the speed up of coronavirus gen editing
    • Rapid transformation of micro to megatrend predictions
    • Major advancements with industrial and service robots
    • A new quantum computing paradigm for the future

    Yahli Admati has worked with senior executives from such diverse companies as Cadbury’s, Citibank, Coca-Cola, Colgate-Palmolive, L’OREAL, Nestle, Orange, among others.

    This must-attend webinar event offers vital implications for everyone.
  • What Every CISO Must Know About Compliance in 2020 Recorded: Oct 6 2020 55 mins
    Jenny Boneva, Vice President of ISACA Sofia Chapter | Eddie Doyle, Global Security Strategist
    SC Magazine has named Jenny Boneva as one of Europe’s 50 most influential women in cyber security. On October 6th, 11 AM EST, host Eddie Doyle will interview Jenny on her meteoric success and provide insights on complying with the most important data privacy regulations across Europe.

    Jenny will discuss:
    • The current state of privacy law, including GDPR
    • The growing role of women in cyber security
    • Best practices for managing risk in 2020

    Click the "ATTEND" button above to reserve your seat.
  • Hacking the Brain Recorded: Sep 29 2020 79 mins
    Moran Cerf, Neuroscientist & Business Professor @Northwestern University I Eddie Doyle, Global Security Strategist
    The ability to implant thoughts and manipulate a person’s behavior may be closer than we believe.
    Professor Moran Cerf, Neuroscientist and Business Professor at the Kellogg School of Management, at Northwestern University (and a former hacker), will discuss how advances in artificial intelligence (AI) could be used to control human thoughts.

    This month, Talking iTech with Eddie Doyle will interview Prof. Cerf to discuss how:
    • Neuroscience can be used to change human behavior
    • AI is affecting our futures
    • We can program ourselves for success? Or program others for failure?

    Shocking as it may seem, hacking brains to “embed” thoughts and ideas into our mind may have already been here? Nation-states using cyber warfare to influence outcomes, such as impacting democratic elections, is just one example.
    Join us in September to see where Science Fiction meets a new reality.
  • Unveiling the Top Cloud Security Trends for 2021 Recorded: Sep 24 2020 59 mins
    Stuart Green, Cloud Security Architect at Check Point
    Did you know that 68% of enterprises today regard the misconfiguration of assets in the cloud as one of the biggest contributors to cloud security threats? In fact, 75% of enterprises are either very concerned or extremely concerned about how secure they are in the cloud.

    Join our talk around the findings of our most recent Cloud Security Report, to discover what over 650 cyber-security professionals had to say about the current state of cloud security, including:
    • Today's biggest cloud security threats
    • Cloud migration security concerns and barriers
    • Key features to consider when evaluating cloud security solutions
    • Strategies they are adopting to address their modern multi-cloud environments
  • Public Sector: Navigating the post-coronavirus world with a strong cyber-defence Recorded: Sep 17 2020 18 mins
    Eddie Doyle, Cyber Security Evangelist Check Point Software Technologies
    Public Sector Talk: Covid-19 not only caused a health pandemic but a cybercrime pandemic too. Its effects have dramatically changed the way Public Sector works, and these changes are here to stay.
    The accelerated pace of digital transformation, remote access infrastructure, the drastic move to the cloud have already gotten the attention of cybercriminals. The dramatic changes in your organisation’s infrastructure present a unique opportunity to assess your security investments. Are you really getting what you need? Are there areas you’ve overlooked?
  • Erratic Times, Solid Security. Navigating Cloud Native Security in 2020 Recorded: Sep 15 2020 42 mins
    Trisha Paine, Head of Cloud Product Marketing and Programs & Jonathan Maresky, Product Marketing Manager
    2020 has been a year of firsts for organizations as they had to expedite the expansion of their cloud infrastructure to meet the requirements of their overnight remote workforce. The proliferation of new cloud applications, the numbers of workers connecting remoting, and the security gaps from this overnight transformation, resulted in 91% of organizations stating they experienced an increase in cyber-attacks. But what were those biggest threats, and how are organizations shifting their approach to address them now, and in the future.

    In this webinar, we will uncover:
    o Findings from the 2020 Cloud Security Report,
    o The current threats plaguing organizations, and
    o Strategies they are adopting to address their modern multi-cloud environments.
  • What Every CISO Must Know About the Law and Cyber Security Recorded: Sep 15 2020 35 mins
    Daniel Garrie, Co-Founder at Law and Forensics | Eddie Doyle, Global Security Strategist at Check Point
    While preventing a breach should be a top concern for organizations, it's also important to prepare for the legal ramifications in case a breach does occur. Research shows that breach related legal costs can you tens or even hundreds of millions of dollars in consumer class action suits and settlements. So what can you do to mitigate the potential damage?

    In this talk, you will learn practical tips concerning how CISOs can keep their companies safe from litigation fallout in the wake of cyber crime. You'll also learn the latest on current cyber-related court cases.

    Our host Eddie Doyle will speak with Daniel Garrie, Co-Founder at Law and Forensics, who is an expert in the latest cyber security, legal, and forensic issues.

    Click the "ATTEND" button above to reserve your spot now!
  • Check Point Best Practices for a Secure Migration to AWS Recorded: Sep 10 2020 77 mins
    Matthieu Bouthors, Security Solutions Architect at AWS and Gonzalo Rocamador, Cloud Security Architect at Check Point
    To fully embrace the cloud, businesses need to understand where the balance of responsibilities lie between protecting the cloud infrastructure (which is the responsibility of AWS) and protecting the data that resides in the cloud (which is the responsibility of the customer). This is what AWS refers to as the shared responsibility model.

    Join this webinar co-hosted by Check Point and AWS for best practices on how to build a secure cloud deployment.

    Learn about:
    • AWS infrastructure and security capabilities.
    • Check Point's cloud security blueprint, which helps customers design secure cloud architectures.
    • How CloudGuard cloud security solutions can help AWS customers meet their shared responsibility requirements.

    We will also have surprise announcements and offers during the webinar!
  • Value preservation, lessons from the Florentine Banker attack Recorded: Sep 10 2020 55 mins
    Aseel Kayal (Malware Analyst @ Check Point Software) and Dr. Rois Ni Thuama (Head of Cyber Governance @ Red Sift)
    Join Dr. Rois Ni Thuama, Head of Cyber Governance at Red Sift
    and our threat expert Aseel Kayal as they unravel the story on The Florentine Banker attack and shed light on how sophisticated Business Email Compromise attacks take place.

    You will:

    - Enjoy a deep dive breakdown of how bad actors were able to steal over one million pounds in the Florentine Banker attack
    - Discover the legal implications for decision makers who fall victim to similar attacks including FCA censure, fines and the case for shareholder class actions
    - Discuss the importance of value preservation and how firms can easily avoid similar attacks in the future
  • Check Point Infinity Architektur Recorded: Sep 8 2020 27 mins
    Mirko Kürten, Strategic Sales Manager, Check Point
    In unserem Check Point Infinity Webinar am 8. September 2020 um 11:00 Uhr zeigt Ihnen Mirko Kürten, Strategic Sales Manager von Check Point, wie der Weg zur ganzheitlichen Absicherung Ihres Unternehmens aussieht. Mit Infinity haben Sie eine All-In-One Cyber Sicherheitsarchitektur für PCs, Netzwerke, Cloud und mobile Geräte kombiniert mit Echtzeitprävention und herausragenden Management.
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Check Point Introduces Infinity SOC
  • Live at: Jul 6 2020 5:00 pm
  • Presented by: Ran Ish Shalom & Oren Koren, Product Manager, Hadar Waldman, Security Evangelist
  • From:
Your email has been sent.
or close