YOU DESERVE THE BEST SECURITY
  •  International +44 1253 335558

A DIGITALLY SECURE SINGAPORE

9 December 2020 | 4:00 to 5:30 PM (GMT+8)

As the world becomes more connected and networks continue to evolve, securing IT environments is becoming more complex than ever. We are now facing Gen V (5th Generation) cyberattacks, large scale attacks that quickly spread and move across attack vectors and whole industries. Gen V attacks are more sophisticated than their predecessors, crossing mobile, cloud and networks with ease, and bypassing conventional defenses that rely on detection technologies. Fragmented IT environments often drive businesses to apply different point solutions, many of which are focused on detection and mitigation rather than prevention, and which rarely inter-communicate. This reactive approach to cyber-attacks is costly and ineffective, complicates security operations, and creates inherent gaps in security posture, leaving organizations unprotected from sophisticated Gen-V attacks.  

During this session, we will be sharing with you on 2 key topics that is specific and highly relevant to our Singapore cybersecurity specialists. 

Geofenced-Cloud-Capabilities-600x200.jpg

Check Point invests in Geofenced Cloud Capabilities in Singapore by Evan Dumas, Regional Director, Southeast Asia, Check Point

The CloudGuard Cloud Security Posture Management solution is part of Check Point’s CloudGuard Cloud Native Security platform. It features a unique GSL builder to provide organizations the benefits of public cloud security while enabling them to meet data residency and compliance standards simply and efficiently. Even during cloud migration and in multi-cloud environments, customers can remain compliant by viewing and modifying their cloud environments based on recommendations generated from the solution.

odo.jpg

Check Point acquires Odo Security: Clientless SASE Technology by Eytan Segal, Head of SaaS, Check Point & Or Zilbeman, Head of SASE, Check Point (Co-Founder of Odo Security)

Check Point recently acquired Odo Security, which developed a cloud-based, clientless SASE technology that delivers secure remote access.
  1. Users to easily connect through a unified portal to wide range of applications with no client or software installation.
  2. Security Administrators to easily deploy the solution in less than five minutes from the cloud.
  3. Zero Trust Architecture – define granular access policy to give the right people in the right context, the least privileged access to applications and reduce the attack surface.
  4. Unmatched Security - based on Check Point’s NSS top-rated threat prevention security services.

amazon-e-gift.png
LEARN AND WIN!

PARTICIPATE IN OUR LIVE TRIVIA SEGMENT AND WALK AWAY WITH AMAZON SHOPPING VOUCHERS!
(WORTH USD 500!!!)

Register Now

*Notice: By clicking submit you agree that the information you provide will be processed in accordance with Check Point's privacy policy.
This website uses cookies to ensure you get the best experience. Got it, Thanks!MORE INFO