Security Policy as Code: A Beginners Guide

Logo
Presented by

Peter Elmer, Security Expert Europe, Check Point Evangelist / Geert De Ron, Cloud Security Architect, Benelux

About this talk

In this session, you will learn how to make your security policy immutable by managing the security policy as code. This provides immediate advantages to your day-to-day operations including the automation of the review and optimization process of the security policy. It also allows integrating the security policy in a CI/CD pipeline embracing a DevOps mindset. Using the example of codifying the access control to applications participants will understand the building blocks Check Point provides to achieve agile policy management. The examples explained in the session are available for customers and partners encouraging dialog-based collaboration after the event. Speakers: Peter Elmer, Security Expert Europe, Check Point Evangelist Geert De Ron, Cloud Security Architect, Benelux
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (346)
Subscribers (52387)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.