Submit Search
Upload
2018 06 Presentation Cloudguard IaaS de Checkpoint
•
2 likes
•
1,627 views
e-Xpert Solutions SA
Follow
Présentation Cloudguard IaaS de Checkpoint
Read less
Read more
Technology
Report
Share
Report
Share
1 of 25
Download now
Download to read offline
Recommended
Traditional symmetric-key cipher
Traditional symmetric-key cipher
Vasuki Ramasamy
Symmetric and asymmetric key
Symmetric and asymmetric key
Triad Square InfoSec
The Cyber Attack Lifecycle
The Cyber Attack Lifecycle
Cybereason
2. Stream Ciphers
2. Stream Ciphers
Sam Bowne
Encryption ppt
Encryption ppt
Anil Neupane
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE - ATT&CKcon
Apache HttpD Web Server - Hardening and other Security Considerations
Apache HttpD Web Server - Hardening and other Security Considerations
Andrew Carr
Key Management and Distribution
Key Management and Distribution
Syed Bahadur Shah
Recommended
Traditional symmetric-key cipher
Traditional symmetric-key cipher
Vasuki Ramasamy
Symmetric and asymmetric key
Symmetric and asymmetric key
Triad Square InfoSec
The Cyber Attack Lifecycle
The Cyber Attack Lifecycle
Cybereason
2. Stream Ciphers
2. Stream Ciphers
Sam Bowne
Encryption ppt
Encryption ppt
Anil Neupane
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE - ATT&CKcon
Apache HttpD Web Server - Hardening and other Security Considerations
Apache HttpD Web Server - Hardening and other Security Considerations
Andrew Carr
Key Management and Distribution
Key Management and Distribution
Syed Bahadur Shah
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
Forcepoint LLC
Shellshock - A Software Bug
Shellshock - A Software Bug
vwchu
Application Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
DevTalks 2021 Cloud Engineering @Crowdstrike
DevTalks 2021 Cloud Engineering @Crowdstrike
Cosmin Bratu
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Mark Arena
zero day exploits
zero day exploits
Adv. Prashant Mali ♛ [Bsc(Phy),MSc(Comp Sci), CCFP,CISSA,LLM]
Paxos and Raft Distributed Consensus Algorithm
Paxos and Raft Distributed Consensus Algorithm
宇 傅
Security+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdf
infosecTrain
Symmetric encryption
Symmetric encryption
DR RICHMOND ADEBIAYE
Secure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of Us
Eoin Woods
Smart contracts
Smart contracts
Philippe Camacho, Ph.D.
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
JustinBrown267905
How to build a cyber threat intelligence program
How to build a cyber threat intelligence program
Mark Arena
RSA ALGORITHM
RSA ALGORITHM
Sathish Kumar
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
Security Testing for IoT Systems
Security Testing for IoT Systems
Security Innovation
Idea alogorithim
Idea alogorithim
SachinMaithani1
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
Zscaler
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
MITRE ATT&CK
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
PECB
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINT
Technofutur TIC
End to End Security - Check Point
End to End Security - Check Point
Harry Gunns
More Related Content
What's hot
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
Forcepoint LLC
Shellshock - A Software Bug
Shellshock - A Software Bug
vwchu
Application Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
DevTalks 2021 Cloud Engineering @Crowdstrike
DevTalks 2021 Cloud Engineering @Crowdstrike
Cosmin Bratu
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Mark Arena
zero day exploits
zero day exploits
Adv. Prashant Mali ♛ [Bsc(Phy),MSc(Comp Sci), CCFP,CISSA,LLM]
Paxos and Raft Distributed Consensus Algorithm
Paxos and Raft Distributed Consensus Algorithm
宇 傅
Security+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdf
infosecTrain
Symmetric encryption
Symmetric encryption
DR RICHMOND ADEBIAYE
Secure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of Us
Eoin Woods
Smart contracts
Smart contracts
Philippe Camacho, Ph.D.
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
JustinBrown267905
How to build a cyber threat intelligence program
How to build a cyber threat intelligence program
Mark Arena
RSA ALGORITHM
RSA ALGORITHM
Sathish Kumar
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
Security Testing for IoT Systems
Security Testing for IoT Systems
Security Innovation
Idea alogorithim
Idea alogorithim
SachinMaithani1
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
Zscaler
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
MITRE ATT&CK
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
PECB
What's hot
(20)
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
Shellshock - A Software Bug
Shellshock - A Software Bug
Application Security - Your Success Depends on it
Application Security - Your Success Depends on it
DevTalks 2021 Cloud Engineering @Crowdstrike
DevTalks 2021 Cloud Engineering @Crowdstrike
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...
zero day exploits
zero day exploits
Paxos and Raft Distributed Consensus Algorithm
Paxos and Raft Distributed Consensus Algorithm
Security+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdf
Symmetric encryption
Symmetric encryption
Secure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of Us
Smart contracts
Smart contracts
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
How to build a cyber threat intelligence program
How to build a cyber threat intelligence program
RSA ALGORITHM
RSA ALGORITHM
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Security Testing for IoT Systems
Security Testing for IoT Systems
Idea alogorithim
Idea alogorithim
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
Similar to 2018 06 Presentation Cloudguard IaaS de Checkpoint
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINT
Technofutur TIC
End to End Security - Check Point
End to End Security - Check Point
Harry Gunns
CheckPoint Software
CheckPoint Software
Janis Gloystein
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
CSA Argentina
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
ssuser365526
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
MarketingArrowECS_CZ
Check Point Infinity
Check Point Infinity
Alexander Kravchenko
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
Cristian Garcia G.
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
Moti Sagey מוטי שגיא
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Clouditalia Telecomunicazioni
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
INFINITY Presentation
INFINITY Presentation
Cristian Garcia G.
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way
Jimmy Mesta
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Software Integrity Group
Kba talk track 2018
Kba talk track 2018
Greg Wartes, MCP
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Digital Transformation EXPO Event Series
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
MarketingArrowECS_CZ
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
Moti Sagey מוטי שגיא
Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2
Greg Wartes, MCP
CASB: Securing your cloud applications
CASB: Securing your cloud applications
Forcepoint LLC
Similar to 2018 06 Presentation Cloudguard IaaS de Checkpoint
(20)
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINT
End to End Security - Check Point
End to End Security - Check Point
CheckPoint Software
CheckPoint Software
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
Check Point Infinity
Check Point Infinity
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
INFINITY Presentation
INFINITY Presentation
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way
OWASP Bay Area Meetup - DevSecOps the Kubernetes Way
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Kba talk track 2018
Kba talk track 2018
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2
CASB: Securing your cloud applications
CASB: Securing your cloud applications
More from e-Xpert Solutions SA
Event e-Xpert Solutions et Tufin - 28 mars 2019
Event e-Xpert Solutions et Tufin - 28 mars 2019
e-Xpert Solutions SA
Présentation d'e-Xpert Solutions et F5 Networks - Event Oct 2018
Présentation d'e-Xpert Solutions et F5 Networks - Event Oct 2018
e-Xpert Solutions SA
Mise en place d'un Use Case d'Adaptive Authentication avec F5 APM et Insight ...
Mise en place d'un Use Case d'Adaptive Authentication avec F5 APM et Insight ...
e-Xpert Solutions SA
Présentation de nos MVP - F5 devCentral - Event 09-10-18
Présentation de nos MVP - F5 devCentral - Event 09-10-18
e-Xpert Solutions SA
2018-08_Présentation Corporate
2018-08_Présentation Corporate
e-Xpert Solutions SA
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint
e-Xpert Solutions SA
2018 06 nouvelles APIs checkpoint e-Xpert solutions
2018 06 nouvelles APIs checkpoint e-Xpert solutions
e-Xpert Solutions SA
2018 06 Demo Checkpoint et Splunk e-Xpert solutions
2018 06 Demo Checkpoint et Splunk e-Xpert solutions
e-Xpert Solutions SA
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
e-Xpert Solutions SA
Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014
e-Xpert Solutions SA
Séminaire Evolution de la Mobilité - Subir ou gérer ?
Séminaire Evolution de la Mobilité - Subir ou gérer ?
e-Xpert Solutions SA
Le DLP vu sous un angle pragmatique
Le DLP vu sous un angle pragmatique
e-Xpert Solutions SA
Plus de mobilité ! Moins de sécurité ?
Plus de mobilité ! Moins de sécurité ?
e-Xpert Solutions SA
DDoS, la nouvelle arme des hackers
DDoS, la nouvelle arme des hackers
e-Xpert Solutions SA
Sandboxing, une nouvelle défense contre les menaces intelligentes
Sandboxing, une nouvelle défense contre les menaces intelligentes
e-Xpert Solutions SA
Evolution du paysage sécurité
Evolution du paysage sécurité
e-Xpert Solutions SA
Partie III – APM Application Policy Manager
Partie III – APM Application Policy Manager
e-Xpert Solutions SA
Partie II – ASM Application Security Manager
Partie II – ASM Application Security Manager
e-Xpert Solutions SA
Partie I – Décodage technologie ADN
Partie I – Décodage technologie ADN
e-Xpert Solutions SA
Séminaire Web Services
Séminaire Web Services
e-Xpert Solutions SA
More from e-Xpert Solutions SA
(20)
Event e-Xpert Solutions et Tufin - 28 mars 2019
Event e-Xpert Solutions et Tufin - 28 mars 2019
Présentation d'e-Xpert Solutions et F5 Networks - Event Oct 2018
Présentation d'e-Xpert Solutions et F5 Networks - Event Oct 2018
Mise en place d'un Use Case d'Adaptive Authentication avec F5 APM et Insight ...
Mise en place d'un Use Case d'Adaptive Authentication avec F5 APM et Insight ...
Présentation de nos MVP - F5 devCentral - Event 09-10-18
Présentation de nos MVP - F5 devCentral - Event 09-10-18
2018-08_Présentation Corporate
2018-08_Présentation Corporate
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 nouvelles APIs checkpoint e-Xpert solutions
2018 06 nouvelles APIs checkpoint e-Xpert solutions
2018 06 Demo Checkpoint et Splunk e-Xpert solutions
2018 06 Demo Checkpoint et Splunk e-Xpert solutions
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014
Séminaire Evolution de la Mobilité - Subir ou gérer ?
Séminaire Evolution de la Mobilité - Subir ou gérer ?
Le DLP vu sous un angle pragmatique
Le DLP vu sous un angle pragmatique
Plus de mobilité ! Moins de sécurité ?
Plus de mobilité ! Moins de sécurité ?
DDoS, la nouvelle arme des hackers
DDoS, la nouvelle arme des hackers
Sandboxing, une nouvelle défense contre les menaces intelligentes
Sandboxing, une nouvelle défense contre les menaces intelligentes
Evolution du paysage sécurité
Evolution du paysage sécurité
Partie III – APM Application Policy Manager
Partie III – APM Application Policy Manager
Partie II – ASM Application Security Manager
Partie II – ASM Application Security Manager
Partie I – Décodage technologie ADN
Partie I – Décodage technologie ADN
Séminaire Web Services
Séminaire Web Services
Recently uploaded
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Hiroshi SHIBATA
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Ingrid Airi González
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
LoriGlavin3
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Pim van der Noll
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Scott Andery
A Framework for Development in the AI Age
A Framework for Development in the AI Age
Cprime
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
Knoldus Inc.
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Mark Goldstein
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
panagenda
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Rick Flair
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
Farhan Tariq
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
Skynet Technologies
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
panagenda
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
IES VE
Recently uploaded
(20)
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
A Framework for Development in the AI Age
A Framework for Development in the AI Age
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
2018 06 Presentation Cloudguard IaaS de Checkpoint
1.
1©2018 Check Point
Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. Thierry Silly – Check Point SE CLOUDGUARD IAAS
2.
2©2018 Check Point
Software Technologies Ltd. IT leaders worry about cloud security (dimensional Research survey) 62% : on-premises security is better than in the cloud 63% : existing security don’t integrate with Devops 48% : Security haven’t changed and remain the bottleneck We must be able to do better than that…
3.
3©2018 Check Point
Software Technologies Ltd. Traditional Security is Not Designed for Cloud Static workloads Manually intensive DevOps don't know Security IT Security doesn't know Cloud
4.
4©2018 Check Point
Software Technologies Ltd. IT’S TIME FOR A NEW SECURITY MODEL
5.
5©2018 Check Point
Software Technologies Ltd. Private Cloud Public Cloud Hybrid Cloud Cloud: One word, one idea, but different realities
6.
6©2018 Check Point
Software Technologies Ltd. ADVANCED THREAT PREVENTION FOR CLOUD ENVIRONMENT Check Point CloudGuard
7.
7©2018 Check Point
Software Technologies Ltd. Access Rule Next Generation Firewall Application and Data Security Advanced Threat Prevention Forensic Analysis Cloud Vendor Would you Secure your Datacenter with Simple access lists ? CLOUDGUARD PROTECTS YOUR CLOUD WITH THE INDUSTRY’S BEST THREATS CATCH-RATE
8.
8©2018 Check Point
Software Technologies Ltd. CloudGuard brings Advanced Protection for your clouds Basic Firewall / Access Rule Firewall IPS App Control DLP Zero-Day Anti-bot Forensics FilteringAntivirus Threat Emulation Threat Extraction Multi-cloudVPN Identity Awareness Anti-Spam
9.
9©2018 Check Point
Software Technologies Ltd. ACI SDN Public Cloud Private Cloud Hybrid Cloud CloudGuard Family
10.
10©2018 Check Point
Software Technologies Ltd. R80.10 & Cloudguard controler : THE REAL DIFFERENCE API CLI Connectors Delegation Automation Orchestrati on Front End Scripts AUTOMATION, ORCHESTRATIONS, INTEGRATION ACROSS ALL CLOUDS
11.
©2018 Check Point
Software Technologies Ltd. PRIVATE CLOUD
12.
12©2018 Check Point
Software Technologies Ltd. Micro segmentation With threat protection Automation & orchestration Dynamic updates Visibility CISCO ACI Automating security inside the Datacenter Private Cloud : Automated UNIFIED security
13.
13©2018 Check Point
Software Technologies Ltd. Use Case : Shared Operations Private Cloud A p p A p p A p p A p p A p p A p p A p p A p p A p p A p p A p p A p p Managed by Security For control Managed by Devops Automated Ordered layers for secure delegation Automation for Agility Full visibility for control Business Oriented, Fast and Secure
14.
14©2018 Check Point
Software Technologies Ltd. SECURITY THAT ENABLES INNOVATION Easy to secure and connect Multi-clouds application Applications are protected with the best security DevOps and IT Security speaks the same language Policy is updated when application is deleted Application owner never waits Reduce security tickets by 60%
15.
©2018 Check Point
Software Technologies Ltd. PUBLIC CLOUD
16.
16©2018 Check Point
Software Technologies Ltd. Would you expose your safe in the street ?
17.
17©2018 Check Point
Software Technologies Ltd. Public Cloud : UNIFIED security extended Firewall Anti-Virus Anti-Bot Application Control IPS Threat Emulation URLF Secure extension Segmentation Protection Secure Access Security Visibility Scalability Orchestration
18.
18©2018 Check Point
Software Technologies Ltd. CLOUD SECURITY BLUEPRINT - ARCHITECTURE Northbound Hub Southbound Hub Spoke 1 Spoke 2 Spoke 3 Spoke N… VPN
19.
19©2018 Check Point
Software Technologies Ltd. THE HUB & SPOKE ARCHITECTURE (TRANSIT) Cloud Northbound HUB Southbound HUB SPOKE 1 SPOKE 2 SPOKE N…. WWW VPN • Advanced threat protection on perimeter • North-South & East-West security is controlled by security admin • Inside spoke security controlled by DevOps
20.
20©2018 Check Point
Software Technologies Ltd. Cloud Northbound-HUB SPOKE-1 SPOKE-2 CloudGuard IaaS Auto-Scale CloudGuard IaaS-N CloudGuard IaaS-1 ….. SPOKE-N… Southbound-HUB CloudGuard IaaS Cluster WWWLoad Balancer Load Balancer THE HUB & SPOKE ARCHITECTURE (TRANSIT) Load Balancer SPOKE-3 VPN Corporate • Northbound security auto-scales • Southbound security deployed in high-availability • Supported Clouds • Azure Transit- vNET • AWS Transit - VPC CloudGuard IaaS - 2 CloudGuard IaaS - 1
21.
21©2018 Check Point
Software Technologies Ltd. MULTI & HYBRID CLOUD ENVIRONMENTS Southbound-HUB Southbound-HUB Northbound-HUB Northbound-HUB ….. VPN WEB APP SPOKE-3 VPN ….. DB AAD SPOKE-3 VPN ….. Northbound-HUB WEB APP SPOKE-3 Southbound-HUB Azure AWS Google VPN WWW
22.
22©2018 Check Point
Software Technologies Ltd. • Agile - security architecture that enables DevOps innovation • Automatic - security architecture provisioning • Efficient – automatically deploy, provision & scale security in the Cloud • Control - Security admins gain full visibility of east-west and north-south traffic • Multi-Clouds – unified security architecture for all environments CHECK POINT’S CLOUD SECURITY BLUEPRINT
23.
23©2018 Check Point
Software Technologies Ltd. Headquarters Remote Employees Branch Private Cloud & SDN SAASPublic IAAS UNIFIED SECURITY FOR ALL CLOUDS PROTECTION AT THE SPEED OF DEVOPS
24.
24©2018 Check Point
Software Technologies Ltd.
25.
25©2018 Check Point
Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. THANK YOU
Download now