Security Collaboration in Action

Logo
Presented by

Yael Cinamon, Product Manager

About this talk

Traditional approaches to security involve using products which work on a specific enforcement point - maybe on a gateway or on an endpoint. The assumption is that attacks and threats are are contained to a specific vector.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (346)
Subscribers (52337)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.