InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

AWS Cloud WAN security: onboarding and configuration

Presented by

Jeff Engel, Cloud Security Technical Marketing Engineer

About this talk

AWS Cloud WAN is a managed wide-area networking (WAN) service that you can use to build, manage, and monitor a unified global network that connects resources running across your cloud and on-premises environments. It provides a central dashboard from which you can connect on-premises branch offices, data centers, and Amazon Virtual Private Clouds (VPCs) across the AWS global network. In this under the hood webinar together with CheckMates, learn how to secure AWS Cloud WAN, including common design patterns , how to deploy the CloudGuard solution, and security best practices. We'll be going under the hood of each key integration feature to get you ready to secure AWS Cloud WAN with industry-leading cloud network security. Agenda: - Introduction - Reference Designs - How to deploy CGNS - Best Practices - Q&A
Check Point Software

Check Point Software

58723 subscribers422 talks
The Leading Cyber Security Platform
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.
Related topics