Join our Cloud Security Architect, Richard Cove, as he demonstrate the use of the Check Point Blueprint to have a complete working transit gateway environment in AWS set-up in about 30 minutes from scratch.
You will also learn how the Check Point Security gateways get deployed and scaled on demand as the load grows. Github repositories will be supplied so you can try this yourself at home.
Richard will conduct a live demo of how to setup a complete secured hub and spoke environment in AWS in 30 minutes using Terraform and setting up a complete environment in AWS with CloudGuard IaaS.
RecordedMay 20 202047 mins
Your place is confirmed, we'll send you email reminders
Harwin Angeles | Regional Threat Prevention Security Expert, Singapore
The Healthcare industry is no longer just focusing on providing quality patientcare today. With digital transformation in Healthcare accelerated by COVID-19, it is observed that the Healthcare industry is now more exposed to cyber attacks. The recently published Check Point Security Report 2021 reported a 45% increase in cyber attacks on Healthcare sector worldwide in the last quarter of 2020.
In this session, we will look at the top attacks and challenges faced by Healthcare sector and what can be done to better secure themselves from these hackers.
Yaffa Finkelstein | AppSec Product Marketing Manager, Global
Modern cloud applications are agile and scale up and evolve extremely fast. They demand a modern approach to security which must be consolidated within a unified platform in order for security organizations to regain control over their environment. In this session, we will look at some use cases for web application and API protection and see practical examples of the use of CloudGuard’s automated application security powered by AI.
To stay ahead of threats, organizations must be proactive and leave no part of their attack surface unprotected or unmonitored, or they risk becoming the next victim of sophisticated, targeted attacks.
With a 50% increase in daily ransomware attacks across the globe, it’s a necessity to have complete endpoint protection against all imminent threats, including malicious files, phishing, data leakage and more.
Organizations are moving away from monolithic application towards microservices architectures and many organizations find themselves migrating their workloads to serverless compute platforms. These platforms are 100% managed by cloud service providers, but are they truly 100% secure?
In this webinar, Jayden Aung, Regional Cloud Security Architect (ASEAN), will discuss how we can effectively and continuously secure serverless applications in CICD pipelines and when they are at runtime, using shift-left mindset and zero trust security model. This is where we put “Sec” in DevOps.
90% of cyber attacks start with a phishing email, yet as more organisations move into cloud hosted email services such as Office 365 and G Suite, they continue to depend on the default security solution that came bundled with their subscription. This often leads to disastrous consequences.
Join us to understand how CloudGuard SaaS can help secure not only your email but also the other services offered with your productivity suite of choice.
As organizations embark on cloud transformation, outsourcing of cloud operations to managed service providers (MSPs) brings in several advantages of skills, scale and support. What role should organizations play in ensuring the security of their cloud environments, given they have most likely outsourced because of lack of in-house skills? What are the tools and resources available to organizations that can help them define the security standards for their cloud as well as mechanisms to enforce these standards?
Join us to learn how a Cloud Security Posture Management solution like Check Point CloudGuard can help achieve this goal.
With the rapid adoption of work from home stemming from the global pandemic, endpoints must be equipped to fend for themselves, beyond the layers of security usually afforded within a protected network. News pages are filled with various security breaches, from account takeover via phishing, data compromise via malware, and company-wide outages caused by ransomware.
Join us as we present SandBlast Agent - a comprehensive endpoint security management platform, designed with a “prevention first” approach which uniquely addresses the present endpoint security crisis.
Cloud security architecture should, wherever possible, leverage cloud infrastructure design characteristics in order to achieve immutable security. Implementing the Cloud blueprint 2.0 gives you the following benefits:
•Advanced security for networks as well as data, compute, messaging, and identity attack vectors.
•Systematic separation of all traffic flows (to, from, and within cloud environments).
•Segmentation by application or service and micro-segmentation of hosts running within the same segment or remotely.
•Cultivating agility for DevOps and lines of business without compromising the corporate security posture.
•Automation, efficiency, and elasticity in order to keep up with the velocity of business, while reducing risky human errors and misconfigurations by embedding security into code.
•A platform-agnostic, borderless architecture in which security policies can be enforced consistently across all environments.
We’ve witnessed changes in where and how employees go about their work due to the ongoing COVID-19 pandemic. Organisations are realising that this situation is not temporary and they don’t expect their entire workforce to return to the office any time soon. This means those on-premises corporate controls aren’t keeping their workforce protected when they’re working remotely.
Learn how enterprises can secure their most critical assets wherever they may be and be fully protected for tomorrow. We will share three real world case studies on how these organisations solve the endpoint security issues facing them.
Isaac Dvir, Director, Mobile Security & Prakash Bhaskaradass, Director, Threat Prevention (APAC)
A new Check Point Research reveals more than 400 vulnerable pieces of code in one of Qualcomm Technologies DSP chips, which are embedded into over 40% of the mobile phone market.
Is your mobile workforce protected? Is your corporate data secure? What is a DSP and how did we reveal these vulnerabilities?
Gary Gardiner, Head of Security Engineering (APJ) & Dean Vaughan, Vice President (APJ), Silver Peak
The rapid adoption of SaaS applications is prompting network administrators to re-evaluate their enterprise WAN infrastructure and services. As enterprises increasingly adopt a cloud-first architecture and directly connect branch office workers to SaaS services, new security risks and cyber threats are becoming a concern.
Enterprises now need a solution that can intelligently and securely optimize branch office SD-WAN internet connections to the cloud, addressing these new network security challenges.
We have invited our technology partner, Silver Peak, to join us in this webinar to share how their Unity EdgeConnect SD-WAN edge platform complements our cloud-hosted security service to deliver a secure SD-WAN experience.
A recent industry study reveals: 67% of enterprises have experienced an IoT security incident. From smart TV’s, IP cameras, and smart elevators, to hospital infusion pumps and industrial PLC controllers, IoT and OT (Operational Technology) devices are inherently vulnerable and easy to hack.
In this webinar, we will show you how to minimize your exposure to the IoT cyber-risk and prevent the next cyberattack.
Ashwin Ram, Cyber Security Evangelist, Office of the CTO, Check Point
Some called the COVID-19 pandemic the "global crisis of the century", leaving enterprises scrambling to ready their infrastructure for remote work in a short time. Cyber criminals have likewise calibrated their attack approaches to adapt to the new IT landscape.
Join EliteCISOs and Check Point at this EliteKnowledge session to learn how the Coronavirus pandemic have changed the cyber security landscape and learn how cyber criminals are changing the way they work.
You will get to hear from Ashwin Ram, Check Point's Cyber Security Evangelist, who will also share with you the best practices to secure your everything in this "new normal".
Ashwin Ram, Check Point | Sharon Shitrit and Yaron Azerual, Radware
Now that we are moving towards a ‘new normal’ of lock-downs lifting in parts of the world, organizations need to close off security gaps and secure networks with a holistic, end-to-end security architecture.
Join our Cyber Security Evangelist, Ashwin Ram, in this webinar to hear about the latest cyber threats that Check Point Research have uncovered in the recent days and the technologies that will help you mitigate threats on your network and endpoints.
You will also hear from our Technology Partner, Radware, on how Check Point and Radware are working together to help you mitigate DDOS attacks and combat threats using SSL inspection. You will be hearing from Sharon Shitrit, Director of Product Management and Yaron Azerual, Product Manager from Radware
Henry Pea, Director, Security Engineering (APAC) and Gary Gardiner, Head of Security Engineering (APJ)
Consolidating all aspects of your security environment to enable seamless security management is never easy task. Tufin compliments Check Point’s vision through comprehensive visibility and automation as the key drivers to enforcing a unified security policy across the organization and enabling agile delivery of innovations, allowing customers all over the world to remove impediments for digital innovation via consolidation.
Join us in this webinar to review common use cases of enhanced security and compliance, and learn how you can:
• Reduce attack surface for malicious attack through comprehensive visibility and reduction of misconfigurations on your network devices
• Expedite and expand your Check Point deployments by reducing misconfiguration errors as well as efficient change management
• Deliver continuous and pro-active compliance through interactive unified security policy matrix and effective ‘what-if’ analysis
• Ace your audits through detail records of business reasoning as well as identification of authorized and unauthorized changes
If you're unable to attend this live webinar, you may still register to receive a link after the webinar to watch the session on-demand any time.
Ashwin Ram, Cyber Security Evangelist, Office of the CTO, Check Point
Some called the COVID-19 pandemic the "global crisis of the century", leaving enterprises scrambling to ready their infrastructure for remote work in a short time. Cyber criminals have likewise calibrated their attack approaches to adapt to the new IT landscape.
Join EliteCISOs and Check Point at this EliteKnowledge session to learn how the Coronavirus pandemic have changed the cyber security landscape and learn how cyber criminals are changing the way they work.
You will get to hear from Ashwin Ram, Check Point's Cyber Security Evangelist, who will also share with you the best practices to secure your everything in this "new normal".
Today more than 90% of enterprises use some type of cloud service, with some enterprises using three to four cloud providers, on average. And although embracing digital transformation opens new business opportunities, the growing migration to public cloud environments has led to an increase in cyber-attacks.
In 2019 cloud-related attacks and breaches made even more headlines and it is expected this trend will continue to grow in 2020.
In this webinar, Ashwin Ram, Cyber Security Evangelist, will cover recent trends and highlight some of the advancements made in fending off threats and turning security into an enabler force in enterprise digital transformation.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.
IaC for your Check Point IaaSRichard Cove, Cloud Security Architect, Check Point Software Technologies[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]47 mins