Hybrid Cloud Blueprint

Presented by

Richard Cove, Cloud Security Architect

About this talk

Cloud security architecture should, wherever possible, leverage cloud infrastructure design characteristics in order to achieve immutable security. Implementing the Cloud blueprint 2.0 gives you the following benefits: •Advanced security for networks as well as data, compute, messaging, and identity attack vectors. •Systematic separation of all traffic flows (to, from, and within cloud environments). •Segmentation by application or service and micro-segmentation of hosts running within the same segment or remotely. •Cultivating agility for DevOps and lines of business without compromising the corporate security posture. •Automation, efficiency, and elasticity in order to keep up with the velocity of business, while reducing risky human errors and misconfigurations by embedding security into code. •A platform-agnostic, borderless architecture in which security policies can be enforced consistently across all environments.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (102)
Subscribers (8703)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.