Hi [[ session.user.profile.firstName ]]

Delivering Security Consolidation Across the Enterprise

R81 is the industry’s most advanced Threat Prevention and security management software that delivers uncompromising simplicity and consolidation across the enterprise.

The newest R81: Cyber Security Platform aims to relieve the IT admins daily effort and make managing cyber security the simplest it’s ever been. Whether it is deploying the latest technologies and security to protect the organization or fine tuning security policies, R81 enables enterprises to be their best.

Join the webinar to learn all about the exciting new features of Check Point’s R81 Cyber Security Platform such as:

• Infinity Threat Prevention: The industry’s first autonomous Threat Prevention system
• Dynamic Balancing: Utilizes the best hardware performance from our security gateways
• Revolutionized Policy Installation Process, effortless deployments and one-click upgrades
• Best security for all encrypted traffic utilizing the latest standards including TLS 1.3 and HTTP/2
Recorded Oct 20 2020 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Benny Shlesinger, Head of Product Management | Guy Israeli, Product Manager | Michael Greenberg, Product Marketing Manager
Presentation preview: Delivering Security Consolidation Across the Enterprise
  • Channel
  • Channel profile
  • The ROI of Cloud Security with Microsoft and Check Point (Portuguese) Jun 10 2021 1:00 pm UTC 75 mins
    TBD
    Cloud network security is a key foundational layer to protect customers’ cloud migration and cloud assets.
    Check Point commissioned Forrester Consulting to conduct a Total Economic Impact study on Check Point CloudGuard Network Security and found that in addition to CloudGuard securing hybrid-cloud assets, it also provided a 169% return on investment over 3 years.
    Join this webinar to:
    • Learn more about the study which was based on interviews with a CloudGuard and Azure customer – a large US-based healthcare company with over $10B annual revenue.
    • Understand the ROI of migrating workloads to Azure
    • Participate in a fireside chat and Q&A with Microsoft and Check Point execs in Latin America around Digital Transformation and how best to secure your cloud journey
  • The ROI of Cloud Security with Microsoft and Check Point (Spanish) Jun 3 2021 3:00 pm UTC 75 mins
    TBD
    Cloud network security is a key foundational layer to protect customers’ cloud migration and cloud assets.
    Check Point commissioned Forrester Consulting to conduct a Total Economic Impact study on Check Point CloudGuard Network Security and found that in addition to CloudGuard securing hybrid-cloud assets, it also provided a 169% return on investment over 3 years.
    Join this webinar to:
    • Learn more about the study which was based on interviews with a CloudGuard and Azure customer – a large US-based healthcare company with over $10B annual revenue.
    • Understand the ROI of migrating workloads to Azure
    • Participate in a fireside chat and Q&A with Microsoft and Check Point execs in Latin America around Digital Transformation and how best to secure your cloud journey
  • Cybersecurity Readiness for the Post-Pandemic Enterprise May 27 2021 4:00 pm UTC 60 mins
    Itzik Feiglevitch (Check Point), Steve Poeppe (Armis)
    Our workplaces are filled with smart and connected IoT devices, but in our post-pandemic world these devices will play prominent new roles that deliver healthier, safer, and more convenient experiences.

    However, although these devices offer various benefits throughout the enterprise, they are inherently vulnerable to cyber-attacks for various reasons, such as:

    • Lacking appropriate native security controls
    • Inability to host agents for security necessities
    • Complex and costly to update
    • And much more…

    In fact, the proliferation of these devices throughout the workplace creates a new layer of complexity for IT and security teams. How do you know which devices exist across the workplace, as well as their inherent threats, so you can best protect your enterprise? Join Check Point and Armis to explore a blueprint for cybersecurity readiness in a post-pandemic workplace, including practical steps you can take now to prepare for the re-entry of your employees and the devices they'll bring with them.
  • Preventing Cyber Attacks on OT Networks and Industrial Control Systems May 26 2021 7:00 pm UTC 30 mins
    Mati Epstein, Head of Industrial Control Systems at Check Point Software Technologies
    During the past few months, cyberattacks have increased against Operational Technology (OT) networks and Industrial Control Systems (ICS). Recent targets include a natural gas facility, water facilities, and steel manufacturers. Given the fact that critical infrastructure such as utilities, energy suppliers, and manufacturing facilities are exposed and at risk, it is essential to implement effective security in order to reduce the attack surface of these ICS and OT networks. Join Mati Epstein, Head of Industrial Control Systems at Check Point Software Technologies for insight on the realities surrounding today's vulnerabilities and how companies can protect their critical infrastructure without impacting operations going forward.
  • Security Policy as Code: A Beginners Guide May 18 2021 7:00 pm UTC 60 mins
    Peter Elmer, Security Expert Europe, Check Point Evangelist / Geert De Ron, Cloud Security Architect, Benelux
    In this session, you will learn how to make your security policy immutable by managing the security policy as code. This provides immediate advantages to your day-to-day operations including the automation of the review and optimization process of the security policy. It also allows integrating the security policy in a CI/CD pipeline embracing a DevOps mindset. Using the example of codifying the access control to applications participants will understand the building blocks Check Point provides to achieve agile policy management. The examples explained in the session are available for customers and partners encouraging dialog-based collaboration after the event.

    Speakers:
    Peter Elmer, Security Expert Europe, Check Point Evangelist
    Geert De Ron, Cloud Security Architect, Benelux
  • Fully Managed SASE for Better TCO - Check Point & Aryaka May 12 2021 4:00 pm UTC 60 mins
    Gokul Nair (Aryaka), Ad Attias and Mor Ahuvia (Check Point)
    Network architects and security leaders are rethinking their networking and security strategies to better support hybrid environments of branch and remote users worldwide.

    Secure Access Service Edge, or SASE, solutions combine networking and security services into a single solution delivered from the cloud, to offer:

    • Better performance and speed for users
    • Consistent policy enforcement across use cases
    • Improved agility to scale up and down
    • Reduced administration overhead

    Join SASE experts from Check Point and Aryaka to hear about **real world SASE deployment case studies.**

    Discover how a fully managed SASE service can empower you to:

    • Gain fast access and a reliable application experience worldwide with SD-WAN-as-a-service
    • Slash deployment efforts and administration overhead
    • Protect branch office connections, with security delivered on-prem or in the cloud
    • Secure remote VPN access for employees working anywhere
    • Keep users everywhere safe from phishing and malware sites

    Can' make this time? Join our EMEA/APAC session on May 12th at 9am London | 10am Paris | 4pm SGT here: https://www.brighttalk.com/webcast/16731/476889
  • Fully Managed SASE for Better TCO - Check Point & Aryaka May 12 2021 8:00 am UTC 90 mins
    Gokul Nair (Aryaka), Ad Attias, Mor Ahuvia (Check Point)
    With the shift to remote work and cloud, network architects and security leaders are rethinking their networking and security strategies, which also requires supporting branch offices worldwide.

    Secure Access Service Edge, or SASE solutions, combine networking and security services into a single solution delivered from the cloud, to offer:
    • Better performance and speed for users
    • Consistent policy enforcement across use cases
    • Improved agility to scale up and down
    • Reduced administration overheads

    Join SASE experts from Check Point and Aryaka to learn how you can accelerate ROI on your networking and network security efforts with a fully managed SASE deployment to:

    • Ensure fast, reliable access worldwide with SD-WAN networking-as-a-service
    • Protect branch office connections, with security delivered on-prem or in the cloud
    • Secure remote VPN access for employees working anywhere
    • Keep employees safe from phishing and malware sites
    • Reduce administration and infrastructure overheads

    Can't make this time? Join our Americas session at 9am PDT / 12pm EDT here: https://www.brighttalk.com/webcast/16731/476890
  • Enhance your AWS VPC security, introducing Check Point CloudGuard NDR Recorded: May 11 2021 64 mins
    Boaz Horev (Solutions Architect at AWS), Gonzalo Rocamador (Cloud Security Architect at Check Point)
    Confidence in cloud security allows organizations to migrate more workloads, more quickly to AWS. But cloud security is shared between AWS and its customers, where AWS protects the cloud infrastructure and customers are responsible for the workloads and data that reside in the cloud. AWS calls this the “Shared Responsibility Model”.

    Join this webinar with Check Point and AWS to receive cloud security recommendations, see new security tech in action and hear the special offer!

    Learn about:
    - AWS and Check Point technologies enhancing your VPC security
    - Check Point CloudGuard NDR (Network Detection and Response), planned for launch later in Q2
    - An example of how CloudGuard NDR discovers threats before they become public

    Webinar participants will receive a special offer from Check Point and AWS!
  • Preventing Cyber Attacks on OT Networks and Industrial Control Systems Recorded: May 11 2021 26 mins
    Mati Epstein, Head of Industrial Control Systems at Check Point Software Technologies
    During the past few months, cyberattacks have increased against Operational Technology (OT) networks and Industrial Control Systems (ICS). Recent targets include a natural gas facility, water facilities, and steel manufacturers. Given the fact that critical infrastructure such as utilities, energy suppliers, and manufacturing facilities are exposed and at risk, it is essential to implement effective security in order to reduce the attack surface of these ICS and OT networks. Join Mati Epstein, Head of Industrial Control Systems at Check Point Software Technologies for insight on the realities surrounding today's vulnerabilities and how companies can protect their critical infrastructure without impacting operations going forward.
  • Key Insights into the 2021 MITRE Engenuity ATT&CK Evaluations Results Recorded: May 5 2021 40 mins
    Check Point Software - Harmony Endpoint Team
    APAC/EMEA webinar registration: https://www.brighttalk.com/webcast/16731/483420

    MITRE Engenuity ATT&CK® Evaluations play a crucial role in the war against cybercrime. The test provides unique insights for security professionals to make more informed decisions on choosing the vendor to protect them from imminent threats like ransomware, malware, phishing and more.
    The latest round of ATT&CK® Evaluations results underscored Check Point Software Leadership in Endpoint Security: threat detection, EDR, and full attack visibility capabilities.

    Join our webinar to learn more about the ATT&CK Evaluations results and Check Point Harmony Endpoint's performance.

    Webinar highlights:
    - Why ATT&CK Evaluations matter when choosing the optimal endpoint security solution
    - 2021 Evaluations methodology, results, and lessons learned
    - Deep-dive into Check Point Harmony Endpoint ATT&CK Evaluations performance, featuring a live in-action demo of Harmony Endpoint's EDR capabilities enhanced by MITRE ATT&CK dashboard
  • Key Insights into the 2021 MITRE Engenuity ATT&CK Evaluations Results Recorded: May 5 2021 46 mins
    Check Point Software - Harmony Endpoint Team
    AMERICAS webinar registration: https://www.brighttalk.com/webcast/16731/483422
    MITRE Engenuity ATT&CK® Evaluations play a crucial role in the war against cybercrime. The test provides unique insights for security professionals to make more informed decisions on choosing the vendor to protect them from imminent threats like ransomware, malware, phishing, and more.
    The latest round of ATT&CK® Evaluations results underscored Check Point Software Leadership in Endpoint Security: threat detection, EDR, and full attack visibility capabilities.

    Join our webinar to learn more about the ATT&CK Evaluations results and Check Point Harmony Endpoint's performance.
    Webinar highlights:
    - Why ATT&CK Evaluations matter when choosing the optimal endpoint security solution
    - 2021 Evaluations methodology, results, and lessons learned
    - Deep-dive into Check Point Harmony Endpoint ATT&CK Evaluations performance, featuring a live in-action demo of Harmony Endpoint's EDR capabilities enhanced by MITRE ATT&CK dashboard
  • Enhance your AWS VPC security, introducing Check Point CloudGuard NDR Recorded: May 4 2021 65 mins
    Sameer Vasanthapuram, Partner Solutions Architect at AWS and Jeff Kopko, Cloud Alliance Architect at Check Point
    Confidence in cloud security allows organizations to migrate more workloads, more quickly to AWS. But cloud security is shared between AWS and its customers, where AWS protects the cloud infrastructure and customers are responsible for the workloads and data that reside in the cloud. AWS calls this the “Shared Responsibility Model”.

    Join this webinar with Check Point and AWS to receive cloud security recommendations, see new security tech in action and hear the special offer!

    Learn about:
    - AWS and Check Point technologies enhancing your VPC security
    - Check Point CloudGuard NDR (Network Detection and Response), planned for launch later in Q2
    - An example of how CloudGuard NDR discovers threats before they become public

    Webinar participants will receive a special offer from Check Point and AWS!
  • Automated Security Strategies to Prevent Top Cloud Threats Recorded: Apr 29 2021 36 mins
    Maya Levine, Technical Engineer, Cloud Security
    Cloud is fundamentally changing how we need to be approaching cybersecurity. Digital transformation has pushed our organizations to adopt technologies that stretch beyond the traditional network boundaries. The attack techniques used against our organizations have transformed as well. Join Maya Levine in a review of the cybersecurity transformation that is occurring, the evolution of the threat landscape, and the new initiatives organizations must embrace to operate securely in the cloud.
  • As the Cyber World Turns: A Strategy for Improving Security Efficiency Recorded: Apr 28 2021 43 mins
    Grant Asplund, Chief Security Evangelist, Check Point
    IT organizations must implement new controls to increase their security posture and defend against new threats like the SolarWinds Orion supply chain attack. But slowed economic growth and the push to secure systems from sophisticated new threats challenges many companies.

    These global market conditions underscore the importance of employing a consolidation strategy with a unified security architecture at its center that protects cloud, networks, endpoints, and mobile devices.

    Join Grant Asplund, chief security evangelist for Check Point Software, as he shares the building blocks for a consolidation strategy that:
    • Increases security efficiency with a unified security architecture
    • Improves your organization’s overall threat prevention profile
    • Eliminates complexity caused by managing disparate systems
    • Reduces total cost of ownership

    Can't make this time? Join the EMEA/APAC webcast at 10 a.m. BST, 11:00 CEST, 12:00 EEST by following this link: https://www.brighttalk.com/webcast/16731/479884
  • As the Cyber World Turns: A Strategy to Increase Security Efficiency Recorded: Apr 28 2021 42 mins
    Grant Asplund, Chief Security Evangelist, Check Point
    Security practitioners understand the need to implement new controls that help their organizations' defend against the rising number of attacks and Fifth Generation threats like the SolarWinds Orion supply chain hack. But slowed economic growth and the push to secure systems from sophisticated new threats challenges many companies.

    These global market conditions underscore the importance of employing a consolidation strategy with a unified security architecture at its center that protects cloud, networks, endpoints, and mobile devices.

    Join Grant Asplund, chief security evangelist for Check Point Software Technologies, on Wednesday, April 28 as he shares the building blocks for putting in place a consolidation strategy that:
    • Increases security efficiency with a unified security architecture
    • Improves your organization’s overall threat prevention profile
    • Eliminates complexity caused by managing disparate systems
    • Reduces total cost of ownership

    Can't make this time? Join our North America webinar at 11 a.m. Pacific Time | 2 p.m. Eastern Time by following this link: https://www.brighttalk.com/webcast/16731/479895
  • Secure Engineer Access to Cloud Workloads with Zero Trust Recorded: Apr 27 2021 45 mins
    Noa Zilberman, former Co-Founder and Product Chief of Odo Security (acquired by Check Point), SASE Product Manager
    The effort of managing access to IT and production environments is growing exponentially with every new engineer, server and datacenter added to your infrastructure. As a result, developers are often given administrator privileges, which attackers can exploit to move laterally around your network.

    Learn how Zero Trust Network Access (ZTNA) can ensure smooth and secure access to production environments for DevOps and administrators using:

    • Built-in privileged Access Management
    • Instant cloud deployment, with no agents
    • Automated server onboarding (AWS)
    • Dynamic tag-based management
    • Full audit trail with optional session recordings

    Effortless security for your engineering environments is now at your fingertips.

    Join us for a firsthand look.

    Can't make this time? Join our EMEA and APAC session at 9am London | 11am Paris | 5pm Hong Kong by following this link: https://www.brighttalk.com/webcast/16731/476888
  • Secure Engineer Access to Cloud Workloads with Zero Trust Recorded: Apr 27 2021 42 mins
    Noa Zilberman, former Co-Founder and Product Chief of Odo Security (acquired by Check Point), SASE Product Manager
    The effort of managing access to IT and production environments is growing exponentially with every new engineer, server and datacenter added to your infrastructure. As a result, developers are often given administrator privileges, which attackers can exploit to move laterally around your network.

    Learn how Zero Trust Network Access (ZTNA) can ensure smooth and secure access to production environments for DevOps and administrators using:

    • Built-in privileged Access Management
    • Instant cloud deployment, with no agents
    • Automated server onboarding (AWS)
    • Dynamic tag-based management
    • Full audit trail with optional session recordings

    Effortless security for your engineering environments is now at your fingertips.

    Join us for a firsthand look.

    Can't make this time? Join our Americas webinar at 9am Pacific Time | 12pm noon Eastern Time by following this link: https://www.brighttalk.com/webcast/16731/476886
  • The New Era of Email Security: Biggest threats and best practices in 2021 Recorded: Apr 21 2021 30 mins
    Eli Schmidt, Danielle Guetta - Product Management
    **Register to the EMEA & APAC session here: https://www.brighttalk.com/webcast/16731/473132

    Part 6 and final presentation in the Harmony series. Email is the most fundamental tool for business collaboration these days, and as such it is also one of the most exploited attack vectors. With huge surges in phishing and ransomware attacks, it is essential that no malicious email reaches your employees. Find out the latest threats and best practices, and how Harmony Email & Office can help you ensure your users remain productive while securing their email and productivity apps environment from all imminent threats.
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Delivering Security Consolidation Across the Enterprise
  • Live at: Oct 20 2020 8:00 am
  • Presented by: Benny Shlesinger, Head of Product Management | Guy Israeli, Product Manager | Michael Greenberg, Product Marketing Manager
  • From:
Your email has been sent.
or close