Hi [[ session.user.profile.firstName ]]

Architecture Best Practices for VMware NSX Security

CloudGuard Network Security for VMware NSX-T delivers industry-leading multi-layered defenses for multi-cloud architectures, allowing to protect North-South and East-West traffic with different use cases with their reference architectures.

Learn about:
• How the integration of CloudGuard with VMware NSX-T 2.5 and 3.0 provides advanced threat prevention and automated cloud network security.
• Use cases, architecture diagrams, and best practices for securing SDDCs, with real customer examples.
• Zero-Trust driven approach to build a comprehensive VMware NSX security strategy
Recorded Dec 3 2020 66 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Richard Cove, Cloud Security Architect at Check Point
Presentation preview: Architecture Best Practices for VMware NSX Security
  • Channel
  • Channel profile
  • Protecting Cloud Assets from DDoS Threats Dec 15 2020 5:00 pm UTC 60 mins
    Pascal Geenens, Eyal Arazi, Ezer Goshen
    While DDoS is frequently perceived to be a network problem that is not relevant for the public cloud, in practice DDoS attacks continue to be a problem in public cloud environments, and in particular in multi-cloud and hybrid-cloud settings. This session will discuss the challenges in DDoS protection in the public cloud, explain the limits of using the native controls of public cloud vendors, and highlight how Check Point's cloud DDoS security provides better protection and better management for cloud environments.
  • North Korea, Cyber, and the Role of International Law Dec 15 2020 4:00 pm UTC 30 mins
    Professor Sean Watts and Professor Rob Barnsby, United States Military Academy | Eddie Doyle, Check Point Software
    Remember when Sony was hacked by North Korea back in 2014? This event had tremendous implications regarding international law and cyber security.

    Professor Sean Watts & Professor Rob Barnsby, of the United States Military Academy, Judge Advocate General’s (JAG) School at West Point discuss how international law is needed as a foundation before governments can intercede on corporations' behalf. Government is working to protect private enterprise, but corporations must meet them in the middle. It's a trust issue.

    Sign up for the webinar today to get a perspective from two West Point Academy professors on how governments and corporations can best work together in improving cyber security.
  • Protecting Cloud Assets from DDoS Threats Dec 15 2020 9:00 am UTC 60 mins
    Pascal Geenens, Eyal Arazi, Ezer Goshen
    While DDoS is frequently perceived to be a network problem that is not relevant for the public cloud, in practice DDoS attacks continue to be a problem in public cloud environments, and in particular in multi-cloud and hybrid-cloud settings. This session will discuss the challenges in DDoS protection in the public cloud, explain the limits of using the native controls of public cloud vendors, and highlight how Check Point's cloud DDoS security provides better protection and better management for cloud environments.
  • Securely Connect Remote Users with Clientless Zero Trust Corporate Access Dec 10 2020 5:00 pm UTC 60 mins
    Etyan Segal, Noa Zilberman
    In the new normal, working environments are no longer defined by fixed network perimeters. As organizations shift employees to work remotely, they may overlook critical security aspects, significantly increasing their exposure to cyberattacks.

    Check Point Zero Trust Corporate Access is cloud-based, clientless SASE technology, that redefines remote access by delivering the easiest way to deploy zero trust corporate access, so the right user has least privileged access to the right resource, in the right role, at the right time, from any device to any internal enterprise application.

    Join the webinar on December 10th to learn how to:
    • Implement a zero trust architecture with least privileged access to internal apps
    • Secure access for diverse roles including users, admins, DevOps and 3rd parties
    • Deploy clientless ZTNA-as-a-service within minutes from the cloud

    Can't make this time? Join our EMEA/APAC session on Dec 10th at 9am GMT / 5pm Singapore Standard Time.
  • Securely Connect Remote Users with Clientless Zero Trust Corporate Access Dec 10 2020 9:00 am UTC 60 mins
    Etyan Segal, Noa Zilberman
    IIn the new normal, working environments are no longer defined by fixed network perimeters. As organizations shift employees to work remotely, they may overlook critical security aspects, significantly increasing their exposure to cyberattacks.

    Check Point Zero Trust Corporate Access is cloud-based, clientless SASE technology, that redefines remote access by delivering the easiest way to deploy zero trust corporate access, so the right user has least privileged access to the right resource, in the right role, at the right time, from any device to any internal enterprise application.

    Join the webinar on December 10th to learn how to:
    • Implement a zero trust architecture with least privileged access to internal apps
    • Secure access for diverse roles including users, admins, DevOps and 3rd parties
    • Deploy clientless ZTNA-as-a-service within minutes from the cloud

    Can't make this time? Join our Americas session on Dec 10th at 9am PT / 11am ET: https://www.brighttalk.com/webcast/16731/454996
  • End-to-End Autonomic Closed-Loop Security Management & Control for 5G Networks Dec 8 2020 5:00 pm UTC 90 mins
    Dr. Ranganai Chaparadza, Dr. Tayeb Ben Meriem, Dr. Muslim Elkotob, Chris Federico, Javier Padilla
    The Webinar presents a Generic Framework for End-to-End (E2E) Autonomic (Closed-Loop) Security Assurance across 5G Network Segments, Slices, and even across Network Operators that is targeted for Standardization in ETSI based on a 5G PoC Project carried out by Industry Players and Checkpoint. The Webinar also presents how to achieve E2E Automated and Self-Adaptive Security Policy Management and Control (powered by Artificial Intelligence Models), based on the Framework. Steps to standardize the Generic Framework in ETSI will also be discussed.
  • New Year, New Cloud Dec 7 2020 9:00 pm UTC 45 mins
    Maya Levine, Cloud Technical Engineer, Greg Pepper, Cloud Security Architect and Gustavo Coronel, Cloud Security Architect
    To say 2020 was unpredictable is an understatement. The proliferation of remote workers, rapid acceleration of cloud applications and deployments, and the resulting breaches from hackers trying to capitalize on security gaps were unprecedented. What will unfold in 2021 is still unknown, but we are better prepared on how to address and adapt to the changes. Learn how leading organizations are tackling this paradigm shift and developing strategies to improve their visibility, prevent threats, and quickly develop new cloud applications with precision and efficiency.
  • Architecture Best Practices for VMware NSX Security Recorded: Dec 3 2020 66 mins
    Richard Cove, Cloud Security Architect at Check Point
    CloudGuard Network Security for VMware NSX-T delivers industry-leading multi-layered defenses for multi-cloud architectures, allowing to protect North-South and East-West traffic with different use cases with their reference architectures.

    Learn about:
    • How the integration of CloudGuard with VMware NSX-T 2.5 and 3.0 provides advanced threat prevention and automated cloud network security.
    • Use cases, architecture diagrams, and best practices for securing SDDCs, with real customer examples.
    • Zero-Trust driven approach to build a comprehensive VMware NSX security strategy
  • Outsmarting the Hackers | Cyber Security Best Practices Recorded: Dec 1 2020 39 mins
    Vlad Brodsky, CISO, OTC Market Groups | Eddie Doyle, Global Security Strategist, Check Point Software
    In this episode, we'll be joined by Vlad Brodsky, the CISO at at OTC Markets Group. Vlad has over 20 years of experience in Information Technology, Security, Management and Implementation. He also serves as the board member of New York Metro Infragard and faculty member of Global Cyber Institute.

    Vlad will discuss:
    • exciting, new innovations in cyber security
    • best practices to outsmart hackers in 2021 and beyond
    • how to manage risk and navigate complex policies to stay compliant

    Click the "ATTEND" button above to reserve your seat.
  • Best Practices for Securing Your Azure Cloud Recorded: Nov 26 2020 73 mins
    Matteo Malagnino, Cloud Solution Architect at Microsoft and Arnfinn Strand, Cloud Security Architect at Check Point.
    Security is key to a successful migration to Azure.
    Join this webinar to learn cloud security best practices from Microsoft and Check Point, Microsoft’s #1 Security Partner.
    We will also present exciting offers to perform an instant assessment of your current cloud security.
  • Delivering Service Provider SOAR Services at Scale Recorded: Nov 19 2020 63 mins
    Dean Papa, Siemplify; Bill Diaz, Check Point; Gal Shafir, Siemplify; Marco Garcia, Check Point
    Enterprise Security operations suffer from an overload of alerts, while working with disjointed detection tools and manual and inconsistent processes. By combining Check Point’s Infinity Security Suite with Siemplify’s Security Orchestration, Automation and Response (SOAR) platform, Telcos and Managed Service Providers can deliver high value security operation services at scale to any size enterprise.

    Join this insightful webinar to learn how the Check Point and Siemplify solution enables Managed Service Providers to:
    • Manage investigations across diverse environments from a single multi-tenant platform.
    • Expand portfolio and extend managed Detection and Response capabilities.
    • Accelerate time to market with differentiated services like threat hunting, incident response and Extended Detection and Response (XDR).
    • Demonstrate value, address customer complexity, fix manual limitations and thrive in a hyper-competitive environment.
  • Branching Out: Integrated Security from Branch to Cloud Recorded: Nov 17 2020 63 mins
    Check Point, Aruba, Silver Peak and HPE Pointnext Services teams
    Join Check Point, Aruba, Silver Peak and HPE Pointnext Services to learn how to deploy and secure your SD-WAN environments.

    By 2023, 90% of enterprises will rely on the cloud for branch and remote connections1. While this improves efficiency in many ways, it also increases the security exposure and risk as these connections are no longer protected by centralized data center security.

    To address these challenges, Check Point has partnered with Aruba, and also with Silver Peak to provide integrated and secure SD-WAN solutions for organizations of all sizes. These integrated solutions provide:

    • Continuously updated security
    • Simplified deployment capability
    • Automation that enhances agility
    • Validated interoperability

    Webinar start: 9 am PST, noon EST
  • Top 3 Strategies To Protect Your Data from Ransomware Recorded: Nov 17 2020 40 mins
    Shiraz Saeed, National Practice Leader -- Cyber Risk, Starr Companies | Eddie Doyle, Global Security Strategist, Check Point
    Ransomware attacks are some of the most devastating cyber threats that can ruin your company's finances and reputation. Nothing is more devastating than having your customer data held hostage by ransomware. Additionally, threat actors often demand ransoms that many cannot afford to pay.

    In this episode, Eddie Doyle will interview Shiraz Saeed, National Practice Leader - Cyber Risk at Starr Companies, on the top 3 strategies to protect your data from ransomware.

    Key insights of this episode will include:
    · How employee training can help minimize your organization's risk
    · How back-up segregation can protect your data
    · The use of EDR tools to minimize the threat of ransomware
  • Branching Out: Integrated Security from Branch to Cloud Recorded: Nov 17 2020 62 mins
    Check Point, Aruba, Silver Peak & HPE Pointnext Services teams
    Join Check Point, Aruba, Silver Peak and HPE Pointnext Services to learn how to deploy and secure your SD-WAN environments.

    By 2023, 90% of enterprises will rely on the cloud for branch and remote connections1. While this improves efficiency in many ways, it also increases the security exposure and risk as these connections are no longer protected by centralized data center security.

    To address these challenges, Check Point has partnered with Aruba, and also with Silver Peak to provide integrated and secure SD-WAN solutions for organizations of all sizes. These integrated solutions provide:

    • Continuously updated security
    • Simplified deployment capability
    • Automation that enhances agility
    • Validated interoperability

    Webinar start: 8 am GMT
  • Architecture Best Practices for VMware NSX Security Recorded: Nov 12 2020 76 mins
    John-Patrick Edwards, Global Security Architect at Check Point
    CloudGuard Network Security for VMware NSX-T delivers industry-leading multi-layered defenses for multi-cloud architectures, allowing to protect North-South and East-West traffic with different use cases with their reference architectures.

    Learn about:
    • How the integration of CloudGuard with VMware NSX-T 2.5 and 3.0 provides advanced threat prevention and automated cloud network security.
    • Use cases, architecture diagrams, and best practices for securing SDDCs, with real customer examples.
    • Zero-Trust driven approach to build a comprehensive VMware NSX security strategy
  • Preventing cyber attacks; lost cause or is it possible? Recorded: Nov 10 2020 43 mins
    Kierk Sanderlin, Head of Engineering & Check Point Security Evangelist
    Breaches are on the rise and some leading cyber security voices are saying the best course of action is to focus on detection and response. The argument is attackers only need to be successful once with their attacks to gain a foothold and compromise the network or endpoint. Other cyber security voices are saying we need a prevention-first mindset that focuses on blocking threats before they can infect a network or host. Join us as we discuss the practice of actually preventing cyber attacks vs. just detecting them.

    In this session you will:
    • Understand why prevention-first is a solid security strategy
    • Hear about why there is a need to balance detection with prevention when it comes to budget
    • Find out how to reduce the noise and distractions that many cyber security incidents cause
    • Learn practical steps you can take to focus on prevention-first
  • [Panel] Cyber Attack Prevention Recorded: Nov 10 2020 63 mins
    Eric Adams, Kyriba; Jeffrey Gardner, Rapid7; Dan Sarel, Palo Alto; & Kierk Sanderlin, Check Point Software Technologies, Ltd.
    As organizations face several different challenges in 2020 and beyond, preparing for a cyber attack is as important as ever. Businesses face a myriad of cyber threats; from phishing to ransomware, it's imperative that your organization puts in place measures to protect your most important assets.

    Join top security leaders for an interactive discussion on how to better secure the enterprise in 2021 and learn more about:

    - Trends in cyber attacks and what's at risk
    - Prevention best practices
    - Solution recommendations for attack detection and response
    - Top threats on the horizon and what's at risk
    - How organisations can take the necessary steps to prepare for the unexpected and build business resilience
  • How to Discover Your Biggest Cyber Security Blind Spots Recorded: Nov 4 2020 45 mins
    Bryson Bort, CEO and Founder at SCYTHE | Eddie Doyle, Global Security Strategist at Check Point
    Are you confident your cyber defenses can withstand next-generation cyber threats? Have you checked to make sure you don't have any critical blind spots? Discovering and patching these blind spots is absolutely vital to the success of your cyber security.

    Eddie Doyle will interview Bryson Bort, CEO and Founder at SCYTHE, a cyber security platform which enables you to validate your organization's defenses without the need for costly training or technical expertise.

    It's not enough to just assume your security solution is working. You must proactively test your security solution. In this talk, Bryson will discuss how you can perform adversary emulations to test your defenses against the most advanced threat actor emulations.
  • Architecture Best Practices for VMware NSX Security Recorded: Oct 29 2020 65 mins
    Elier Cruz, Global Security Architect at Check Point
    CloudGuard Network Security for VMware NSX-T delivers industry-leading multi-layered defenses for multi-cloud architectures, allowing to protect North-South and East-West traffic with different use cases with their reference architectures.

    Learn about:
    • How the integration of CloudGuard with VMware NSX-T 2.5 and 3.0 provides advanced threat prevention and automated cloud network security.
    • Use cases, architecture diagrams, and best practices for securing SDDCs, with real customer examples.
    • Zero-Trust driven approach to build a comprehensive VMware NSX security strategy
  • Choosing Optimal Endpoint Security in the New Normal Recorded: Oct 29 2020 39 mins
    Dana Katz, Head of Product Marketing, Threat Prevention at Check Point; David Ulloa, CISO at IMC Companies
    With the immediate transition to a fully remote workforce organizations are vulnerable to endpoint attacks more than ever. As evidence, cybercriminals are scaling up their operations - ransomware attacks in the US doubled in Q3 of 2020.

    What can be done to protect employees’ workstations in the new normal?

    This session with the CISO of IMC Companies David Ulloa covers the following topics:
    •Top 5 must-have endpoint protections
    •How to secure remote workforce without no impact on business productivity
    •Ways to achieve lower TCO
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Architecture Best Practices for VMware NSX Security
  • Live at: Dec 3 2020 4:00 am
  • Presented by: Richard Cove, Cloud Security Architect at Check Point
  • From:
Your email has been sent.
or close