Hi [[ session.user.profile.firstName ]]

Leverage Threat Hunting and Transform Your Endpoint Security

In this session you will learn how customers can reduce the number of security incidents by up to 90% though proactive prevention, threat hunting and EDR automation. Hear first-hand from Telefonica on how they secured and scaled England’s pandemic response.
Recorded Jun 17 2021 50 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ady Ringrose, Check Point Software | Gethin Jones, Check Point Software | Alex Achucarro, Telefonica
Presentation preview: Leverage Threat Hunting and Transform Your Endpoint Security
  • Channel
  • Channel profile
  • Hyperscale Network Security for the Post-Pandemic Era: Dealing with the unknown Oct 14 2021 8:30 am UTC 30 mins
    Tom Kendrick, EMEA Security Evangelist @Check Point
    A massive network traffic growth and changing business requirements can be a network security nightmare.
    It is no secret that appliances can’t scale to meet unpredictable traffic peaks, while upgrades take time and resources to acquire, configure, tune, and operate. So, what are the next steps in order for you to deal with the unknown in the coming years?

    Join a coffee break talk to:
    - Prepare for changes and meet the needs of the most demanding environments
    - Fully utilize all hardware resources and manage multiple logical gateways based on a single system for maximum efficiency
    - Learn with use case examples how you can seamlessly provision and add more resources, to build a robust and scalable distributed system

    First 100 UK IT specialists guests to receive a Welcome Hyperscale IT gift box.
  • Blocking Sophisticated Attacks with the Power of AI Oct 5 2021 4:00 pm UTC 26 mins
    Yaniv Shechtman, Head of Product Management -Threat Prevention, Check Point Software Technologies
    The threat landscape in 2021 shows a significant increase in sophisticated attack vectors such as ransomware, phishing, supply-chain, SW vulnerabilities exploits, and others. In this session, we will cover some examples of these vectors, and explain how security solutions can stay ahead of the attackers and their ever-evolving tactics by using the power of AI.
  • How to get started with SASE – Top Three Use Cases Sep 29 2021 3:00 pm UTC 30 mins
    Jacob Lee, Humza Ismaiel
    Looking to secure your remote workforce *faster*? SASE security delivered from the cloud can help.

    Learn how to implement ZTNA-as-a-service and Secure Web Gateway as-a-service for these top use cases:

    • BYOD and Contractors – Deploy user-friendly clientless remote access, with no agent required
    • DevOps Access - Simplify cloud operations with tag-based management, PAM and SSO
    • Secure Internet Access – Ensure secure browsing for remote employees

    In this session, you’ll discover how to:

    • Offer users a breezy access experience
    • Synch users with your current identity provider
    • Enforce granular policies at the app, command and query level
    • Gain full visibility into user activity post-login

    Get your questions answered in this live demo and Q&A.

    Can't make this time?
    For APAC sessions, go here: https://www.brighttalk.com/webcast/16731/502287

    Explore other 30-minute SASE Expert Sessions below:

    Case Study - How Check Point secures internet access for its remote employees
    Watch replay of Weds. 8th Sept session
    https://www.brighttalk.com/webcast/16731/502225

    ZTNA in 15 Minutes for Employees & Contractors
    Watch replay of Weds. 18th August session
    https://www.brighttalk.com/webcast/16731/502279
  • How to get started with SASE – Top Three Use Cases Sep 29 2021 2:00 am UTC 30 mins
    Jacob Lee, Manish Upadhaya
    Looking to secure your remote workforce *faster*? SASE security delivered from the cloud can help.

    Learn how to implement ZTNA-as-a-service and Secure Web Gateway as-a-service for these top use cases:

    • BYOD and Contractors – Deploy user-friendly clientless remote access, with no agent required
    • DevOps Access - Simplify cloud operations with tag-based management, PAM and SSO
    • Secure Internet Access – Ensure secure browsing for remote employees

    In this session, you’ll discover how to:

    • Offer users a breezy access experience
    • Synch users with your current identity provider
    • Enforce granular policies at the app, command and query level
    • Gain full visibility into user activity post-login

    Get your questions answered in this live demo and Q&A.

    Can't make this time? For the AMER/EMEA session, go here: https://www.brighttalk.com/webcast/16731/502226

    Explore other 30-minute SASE Expert Sessions below:

    Case Study: How Check Point secures internet access for its remote employees
    Watch replay of Weds. 8th Sept session
    https://www.brighttalk.com/webcast/16731/502283

    ZTNA in 15 Minutes for Employees & Contractors
    Watch replay of Weds. 18th August session
    https://www.brighttalk.com/webcast/16731/502279
  • Segurança e economia na Jornada para Nuvem! Sep 28 2021 7:00 pm UTC 75 mins
    Sebastiao Miranda | Cloud Security Sales at Check Point
    A transformação digital e a adoção da cloud já são assuntos recorrentes entre as empresas, mas como fazer a jornada pra nuvem de forma segura, possibilitando maior retorno nos investimentos? A Solo Network e a Check Point podem lhe ajudar!

    Queremos convidar você para este bate-papo que terá a presença do Sebastiao Miranda, especialista da Check Point.

    Principais assuntos:
    • Estudo da Check Point em parceria com a Forrester Consulting sobre o Impacto Econômico Total sobre a Segurança de Rede.

    • Saber mais sobre o estudo baseado em entrevistas com um cliente Check Point CloudGuard e Azure - uma grande empresa de saúde com sede nos EUA com receita anual de mais de US$ 10 bilhões.

    • Entender sobre o ROI com a migração de workloads para o Microsoft Azure;

    • Chat ao vivo de perguntas e respostas com especialistas da Check Point e Solo Network sobre a transformação digital e a melhor forma de proteger sua jornada na nuvem.

    Participe deste grande encontro e aproveite para tirar todas as suas dúvidas! Faça já a sua inscrição!
  • Kubernetes, Containers and the Road to Cloud Native Sep 23 2021 7:00 pm UTC 45 mins
    Yuval Shchory, Head of Product Management, Cloud Security
    As cloud environments grow and evolve, security professionals are being challenged with decreased visibility, increased complexity and larger more sophisticated security threats.

    Join us as we explore how to fully automate cloud security in a fragmented, microservices environment, with centralized posture management, threat prevention and visibility from build through runtime. Learn how to ensure container and serverless function security through the application lifecycle, across any public cloud.
  • The State of Cybersecurity: Public Sector 2021 Sep 23 2021 8:30 am UTC 60 mins
    David Brown, High Speed Two | Ian Porteous, Check Point | Patrick Keane, Bracknell Forest Council | Vebz Panchal, Microsoft
    Did you know that organisations from the Government and Military Sector in UK&I faced an average of 352 weekly cyber-attacks in mid-2021, while those in Education and Research faced no less than 571 weekly attacks? This is a 34% and 43% increase respectively from the previous year. As those in Higher Education, Public Transportation, Government, and the NHS are in the midst of their digital transformation journeys, cybercriminals are eager to take advantage of digital growing pains.

    Public sectors are attractive targets to cybercriminals because they keep a wealth of information on citizen activity and government operations. As remote and hybrid working becomes the norm for many, public sectors are struggling with pre-existing vulnerabilities and outdated cyber security systems. But what can those in the public sector do to keep themselves safe while on their digital transformation journey?

    Join this panel discussion to hear insights from Public Sector security leaders and learn more about:

    - Public Sector cybersecurity threats and trends in 2021 and beyond
    - Digital transformation in the Public Sector, and the associated cyber risks
    - Key tools to secure your sensitive data and critical infrastructure
    - Lessons learned and best practices to strengthen the security of your endpoints, networks, and cloud environments

    Panel Speakers:
    - David Brown, Head of Information Management at High Speed Two
    - Ian Porteous, Regional Director, Security Engineering UK&I at Check Point
    - Patrick Keane, Former Head of IT at London Borough & CIO at Bracknell Forest Council
    - Vebz Panchal, Senior Architect, Azure Cloud & AI, CTO Office at Microsoft
  • Protecting Healthcare Organizations from DDoS Threats - Before, During and After Sep 23 2021 8:00 am UTC 30 mins
    Etienne Lopez, Debra Price (Radware)
    IT’S INEVITABLE! Somewhere, at some point, you will be the target of a DDoS attack. At just the beginning of this year we saw approximately 2.9M DDoS attacks, an increase of 31% since 2020. DDoS attacks are a nightmare for healthcare organizations as they flood the network with malicious traffic which can bring critical applications down, prevent patients from accessing services, or even expose private patient information. The good news, however, is that there is plenty to be done about it. While you can’t predict when an attack will happen, we will help by providing some security best practices you can implement to allow you to minimize the impact of the attack, recovery quickly, and ensure it doesn’t happen again.

    Join us in this discussion to learn how you can protect your healthcare organization against DDoS attacks.
  • Comment sécuriser vos applications modernes avec CloudGuard Workload ? Recorded: Sep 22 2021 61 mins
    Frederic Hérault, Security Engineer
    Participez au webinar " Comment sécuriser vos applications modernes avec CloudGuard Workload" le Mercredi 22 Septembre 2021 à 11h00.

    Avec le cloud, de nouveaux challenges émergent : notre façon de penser l'applicatif se modernise, et l'automatisation devient un indispensable pour maintenir les architectures.

    C'est dans ce cadre que Check Point présente une solution permettant de sécuriser ces architecture Serverless, sur base de containers ou comment s’intégrer dans le pipeline CI/CD en analysant les images utilisées et le code applicatif.

    Inscrivez-vous dès aujourd'hui pour en savoir plus sur les principaux challenges de sécurité auxquelles elle répond :

    - Protection des containers
    - Protection des fonctions Serverless
    - Scan des images des containers
    - Scan des Templates IAC (Infrastructure As Code – Ansible ou Terraform)
    - Scan du code source

    Ne manquez pas l'occasion de redéfinir votre vision de la sécurité des applications modernes.

    A bientôt,

    Check Point Software France
  • Transform your Data Center with Quantum Hyperscale Network Security Recorded: Sep 21 2021 43 mins
    Michael Greenberg, Product Marketing Manager, Quantum and Yaron Weiler and Guy Israeli, Product Management, Quantum
    It is no secret, our networks and data centers have changed as we know it: network traffic is growing, users are remote and applications are distributed everywhere. Now is the time to cloudify our networks and data centers where scalability on demand, cost-efficiency and simple operations are all that matters.

    Join us to hear from the experts and learn how to enable your data center to operate like the cloud with:

    • Enhanced and embedded security
    • Broader and elastic bandwidth
    • Modularity and simplification
    • Improved resiliency
    • Automation and orchestration
  • It's Zero Trust Time - Simplify and secure application remote access! Recorded: Sep 21 2021 29 mins
    Ady Ringrose | Humza Ismaiel
    Join the webinar to learn how to:

    • Implement zero trust security principles for third party remote access
    • Leverage a transparent software-defined perimeter to increase security
    • Lower setup and maintenance overheads using a clientless, cloud-based service
    • Maintain compliance by removing the need to install VPN clients
  • How to Prepare for Ransomware Attacks Recorded: Sep 14 2021 62 mins
    Jeff Schwartz, VP of Security Engineering; Rich Comber, Head of Threat Prevention Engineering; Aaron Rose, Security Architect
    In the last 12 months, ransomware attacks surged by 93% with a devastating impact on businesses and industries worldwide.

    In today’s hybrid IT environment, preventing ransomware attacks seems like an impossible feat. But is it?

    Join us, on September 14th for a live session, where we’ll cover the latest ransomware trends and how Check Point can help you protect your organization from falling victim to sophisticated ransomware attacks.

    Key Highlights:
    - Insights into the recent evolution of ransomware with tactics like “Triple Extortion”
    - How to protect your organization from ransomware attacks with Check Point Harmony Endpoint
    - In-action demo of our latest anti-ransomware capabilities
  • Prevent Cyber Attacks through AI-Driven Threat Prevention & Security Management Recorded: Sep 9 2021 30 mins
    Guy Israeli, Product Manager- Security Services, Check Point
    Ransomware, zero-day and supply chain security threats have become more sophisticated, so automated threat prevention and security policy orchestration will be the key to protecting your enterprise from the expanding threat landscape.

    Check Point's Quantum Cyber Security Platform is the industry's most advanced AI & ML-driven network security threat prevention and security management software. In 2020, R81 introduced the first Autonomous Threat Prevention system with 60+ AI & ML threat prevention engines for complete protection against zero-day threats.

    With support from the Check Point ThreatCloud global threat intelligence database, your enterprise network security is automatically updated to protect against the latest threats.

    Join the session to learn how Check Point's Cyber Security Platform with automated threat prevention and security management can protect your enterprise.
  • Case study -- How Check Point secures internet access for its remote employees Recorded: Sep 8 2021 35 mins
    Manish Upadhaya - SASE Lead for APAC, Humza Ismaiel - SASE Security Architect, EMEA
    Learn how Check Point secures its own employees as they work remotely with Harmony Connect Internet Access.

    • 100% SaaS delivered – 15 mins setup
    • Secure Web Gateway (SWG) and FWaaS
    • URL Filtering and Granular Application Control
    • Data loss prevention
    • Advanced threat prevention and sandboxing

    Get your questions answered in this live demo and Q&A.

    Can't make this time? For APAC sessions, go here: https://www.brighttalk.com/webcast/16731/502283

    Explore other 30-minute Expert Sessions below:

    How to get started with Zero Trust Network Access – Top Three Use Cases
    Weds. 29th Sept, 4pm London | 8am Pacific | 11am Eastern
    https://www.brighttalk.com/webcast/16731/502226

    ZTNA in 15 Minutes for Employees & Contractors
    Watch replay of Weds. 18th August session
    https://www.brighttalk.com/webcast/16731/501736
  • Case study -- How Check Point secures internet access for its remote employees Recorded: Sep 8 2021 35 mins
    Manish Upadhaya, Humza Ismaiel
    Learn how Check Point secures its own employees as they work remotely with Harmony Connect Internet Access.

    • 100% SaaS delivered – 15 mins setup
    • Secure Web Gateway (SWG) and FWaaS
    • URL Filtering and Granular Application Control
    • Data loss prevention
    • Advanced threat prevention and sandboxing

    Get your questions answered in this live demo and Q&A.

    Can't make this time?
    For AMER/EMEA sessions, go here: https://www.brighttalk.com/webcast/16731/502225

    Explore other 30-minute Zero Trust Expert Sessions below:

    How to get started with Zero Trust Network Access – Top Three Use Cases
    Weds. 29th Sept, 10am Singapore | 11am Tokyo | 12pm Sydney
    https://www.brighttalk.com/webcast/16731/502287

    ZTNA in 15 Minutes for Employees & Contractors
    Watch replay of Weds. 18th August session:
    https://www.brighttalk.com/webcast/16731/502279
  • SASE Customer Success Stories - Securely Connect Branches & Users *Faster* Recorded: Sep 2 2021 25 mins
    Dave Antlitz (W.R. Grace), Aashiq Abdul Jaleel (Alef Education), Peter Alexander, Noa Zilberman (Check Point)
    Learn how to secure your remote & hybrid workforce *faster*.

    When access requirements are defined by decentralized and remote work, global branch offices, cloud, mobile and the need for agility, how do you enable secure connectivity *everywhere*? And how do you do it without losing control?

    SASE and cloud-based network security may hold the key to securing today’s agile, hybrid workplace.

    In fact, a recent survey by Check Point uncovered that over 60% of respondents are scaling remote access using cloud-based security, and 30% have already implemented or are planning to implement SASE.

    Learn how cloud-based network security, namely Secure Web Gateway (SWG) and FWaaS, have helped W.R. Grace secure its numerous branch offices and remote workers. You’ll also hear how Alef Education’s high-volume multi-cloud production environment is being secured with Zero Trust Network Access as-a-service for engineers and DevOps.

    Innovations in cloud-delivered SASE are quickly replacing conventional security paradigms. This sessions explores how.

    This session was originally broadcast as part of Check Point's <Secure> Users & Access virtual event held in August 2021.
  • Nine Best Practices for Cloud Security: Is Cloud-Vendor Security Enough? Recorded: Aug 24 2021 58 mins
    Shawne Luyke, Cloud Security Architect, ANZ and Grant Asplund, Growth Technologies Evangelist. both at Check Point
    Cloud security has become business-critical as organizations expand and deepen their cloud presence.

    A key foundational layer is cloud network security, where organizations deploy virtual security gateways to provide advanced threat prevention, traffic inspection and micro-segmentation.

    But industry analysts and experts agree: Cloud-vendor security by itself, is not enough!

    Join this webinar to learn from the leading cloud security experts:
    - Top ten criteria you should be using to choose your cloud network security solution
    - Nine best practices for cloud security
    - Three cool new capabilities - fresh out of the Check Point technology brains-trust
  • How to deploy Zero Trust Network Access in 15 mins for employees & contractors Recorded: Aug 18 2021 30 mins
    Jacob Lee, Humza Ismaiel
    You may not know it, but Zero Trust Network Access (ZTNA) can take just 15 minutes to deploy.

    For employees, contractors and partners, you can now quickly ensure least privilege access—flawlessly.

    Join us for a live 30-minute Zero Trust Expert Session to see how you can:

    • Deploy *clientless* remote access, with no agent required
    • Offer single sign-on with your current identity provider
    • Define and enforce granular in-app policies
    • Prevent lateral movement with application layer access
    • Gain full visibility into all user activity post-login

    Get your questions answered in this live demo and Q&A.

    Can't make this time? For APAC sessions, go to: https://www.brighttalk.com/webcast/16731/502279


    Explore other 30-minute Zero Trust Expert Sessions below:

    How to secure internet access for remote employees - Harmony Connect case study
    Weds. 8th Sept, 4pm London | 8am Pacific Time | 11am Eastern Time
    https://www.brighttalk.com/webcast/16731/502225

    How to get started with Zero Trust Network Access – Top Three Use Cases
    Weds. 29th Sept, 4pm London | 8am Pacific Time | 11am Eastern Time
    https://www.brighttalk.com/webcast/16731/502226
  • How to deploy Zero Trust Network Access in 15 mins for employees and contractors Recorded: Aug 18 2021 31 mins
    Jacob Lee, Manish Upadhaya
    You may not know it, but Zero Trust Network Access (ZTNA) can take just 15 minutes to deploy.

    For employees, contractors and partners, you can now quickly ensure least privilege access—flawlessly.

    Join us for a live 30-minute Zero Trust Expert Session to see how you can:

    • Deploy *clientless* remote access, with no agent required
    • Offer single sign-on with your current identity provider
    • Define and enforce granular in-app policies
    • Prevent lateral movement with application layer access
    • Gain full visibility into all user activity post-login

    Get your questions answered in this live demo and Q&A.

    Can't make this time? For AMER/EMEA sessions, register here: https://www.brighttalk.com/webcast/16731/501736

    Explore upcoming 30-minute Zero Trust Expert Sessions below:

    How to secure internet access for remote employees - Harmony Connect case study
    Weds. 8th Sept, 10am Singapore | 11am Tokyo | 12pm Sydney
    https://www.brighttalk.com/webcast/16731/502283

    How to get started with Zero Trust Network Access – Top Three Use Cases
    Weds. 29th Sept, 10am Singapore | 11am Tokyo | 12pm Sydney
    https://www.brighttalk.com/webcast/16731/502287
  • Prevent Cyber Attacks with AI-Driven Threat Prevention and Security Management Recorded: Aug 17 2021 30 mins
    Guy Israeli, Product Manager
    Ransomware, zero day and supply chain security threats have become more sophisticated, so automated threat prevention and security policy orchestration will be the key to protecting your enterprise from the expanding threat landscape.

    Check Point's Quantum Cyber Security Platform is the industry's most advanced AI & ML driven network security threat prevention and security management software. In 2020, R81 introduced the first Autonomous Threat Prevention system with 60+ AI & ML threat prevention engines for complete protection against zero-day threats.

    With support from the Check Point ThreatCloud global threat intelligence database, your enterprise network security is automatically updated to protect against the latest threats.

    Join the session to learn how Check Point's Cyber Security Platform with automated threat prevention and security management can protect your enterprise
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Leverage Threat Hunting and Transform Your Endpoint Security
  • Live at: Jun 17 2021 10:00 am
  • Presented by: Ady Ringrose, Check Point Software | Gethin Jones, Check Point Software | Alex Achucarro, Telefonica
  • From:
Your email has been sent.
or close