Nine Best Practices for Cloud Security: Is Cloud-Vendor Security Enough?

Presented by

Shawne Luyke, Cloud Security Architect, ANZ and Grant Asplund, Growth Technologies Evangelist. both at Check Point

About this talk

Cloud security has become business-critical as organizations expand and deepen their cloud presence. A key foundational layer is cloud network security, where organizations deploy virtual security gateways to provide advanced threat prevention, traffic inspection and micro-segmentation. But industry analysts and experts agree: Cloud-vendor security by itself, is not enough! Join this webinar to learn from the leading cloud security experts: - Top ten criteria you should be using to choose your cloud network security solution - Nine best practices for cloud security - Three cool new capabilities - fresh out of the Check Point technology brains-trust

Related topics:

More from this channel

Upcoming talks (7)
On-demand talks (331)
Subscribers (50360)
Check Point Software Technologies Ltd. ( is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.