Zero Trust Access to AWS DevOps Environments

Logo
Presented by

Noa Zilberman, Co-Founder and Product Chief of Odo Security (acquired by Check Point), SASE Product Manager

About this talk

The effort of managing access to IT and production environments is growing exponentially with every new engineer, server and datacenter added to your infrastructure. As a result, developers are often given administrator privileges, which attackers can exploit to move laterally around your network. Learn how Zero Trust Network Access can ensure smooth and secure access to production environments for DevOps and administrators using: • Built-in privileged Access Management • Role-based access control and real-time session termination • In-depth auditing and visibility at the app, command and query level • Automated resource discovery and server onboarding • Clientless, cloud-based scalable architecture Effortless security for your engineering environments is now at your fingertips. Join us for a firsthand look.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (331)
Subscribers (50135)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.