Поиск по тегу «check point»

Check Point: CheckMates TechTalk: Analysis of SiliVaccine
Смотреть видео
00:18:35
HD
Check Point: CheckMates TechTalk: Analysis of SiliVaccine
SiliVaccine is an Anti-Virus tool used in North Korea. Security Researchers at got a copy of it to see if it had any abnormal behavior or undocumented features. Sure enough, it did!
Check Point: You Asked, CEO Gil Shwed Answers!
Смотреть видео
00:02:44
HD
Check Point: You Asked, CEO Gil Shwed Answers!
Is Gil Shwed a morning person or a night owl? CEO Gil Shwed talks about his favorite apps, drones, future roadmap, and recognizes the winners in our CheckMates Birthday Awards!
Check Point: CheckMates TechTalk: Remote Code Execution Vulnerability on LG Smartphones
Смотреть видео
00:14:41
HD
Check Point: CheckMates TechTalk: Remote Code Execution Vulnerability on LG Smartphones
Neatsun Ziv and Jonathan Shimonovich discuss our recent publication of vulnerabilities that reside in the default keyboard of all mainstream LG smartphone models. More details:
Check Point: You Asked, VP of Products Dorit Dor Answers!
Смотреть видео
00:02:47
HD
Check Point: You Asked, VP of Products Dorit Dor Answers!
Is Dr. Dorit Dor a morning person or a night owl? Our VP of Products talks about her favorite apps, drones, future roadmap, and recognizes the winners in our CheckMates Birthday Awards!
Check Point: CheckMates First Birthday Award Winners
Смотреть видео
00:01:46
HD
Check Point: CheckMates First Birthday Award Winners
CheckMates, the user community for customers and partners, is celebrating it's first birthday by recognizing excellent contributors and content!
Check Point: Lightboard Series: Dynamic Revisions
Смотреть видео
00:08:24
HD
Check Point: Lightboard Series: Dynamic Revisions
This video elaborates on the logic behind the R80.10 Security Management architecture focusing on the dynamic revisions feature. This feature automatically stores the full history of database changes, with very little footprint, consuming ...
Check Point: R80.10 Policy Management – IPS Protections in Detect (Staging) State
Смотреть видео
00:02:38
HD
Check Point: R80.10 Policy Management – IPS Protections in Detect (Staging) State
This video elaborates on the logic behind new IPS protections status after IPS update operation and introduces best practice on changing the status of detect-staging on prevent when enough information was gathered regarding the new IPS prot...
Check Point: CloudGuard SaaS Demo Series: Identity Protection for Office 365
Смотреть видео
00:01:38
HD
Check Point: CloudGuard SaaS Demo Series: Identity Protection for Office 365
Watch this short demonstration video to learn how CloudGuard SaaS, an industry-first software-as-a-service (SaaS) security solution, provides advanced security and identity protection including account takeover protection for SaaS applicat...
Check Point: Founder & CEO Gil Shwed on CNBC Squawk Box
Смотреть видео
00:04:43
Check Point: Founder & CEO Gil Shwed on CNBC Squawk Box
CNBC Squawk Box featured CEO & Founder Gil Shwed. Gil Shwed discusses 5th generation cyber attacks. For more Talking about level three attacks, level four attacks; what are fifth and sixth level attacks?* [Shwed]: [The] current generati...
Check Point: EU GDPR Webinar Replay
Смотреть видео
01:01:35
HD
Check Point: EU GDPR Webinar Replay
The European Union’s General Data Protection Regulation (‘GDPR’) poses the biggest change to the regulatory landscape of data privacy. To learn more visit: GDPR places significant policy and technical responsibilities on ANY organization ...
Check Point: Who's Responsible for your Cloud Security?
Смотреть видео
00:30:26
HD
Check Point: Who's Responsible for your Cloud Security?
A full breakdown of what is shared responsibility and the layers of security needed to protect you from security breaches in the cloud. For more information:
Check Point: The Mobile Threat Landscape
Смотреть видео
00:29:43
HD
Check Point: The Mobile Threat Landscape
From Judy to Blueborne, the proliferation of mobile threats has grown rapidly in the past year. In this session, we review the various types of mobile threats, how they spread and the damage they cause. We will also be providing practical ...
Check Point: SMB Security Unique Challenges
Смотреть видео
00:30:06
HD
Check Point: SMB Security Unique Challenges
The Small and Medium Business market has the same security challenges as larger enterprises. What they don't have a lot of is time or money.
Check Point: Security Blueprint for the Cloud Era
Смотреть видео
00:31:09
HD
Check Point: Security Blueprint for the Cloud Era
Discover the recommended blueprint for multi-cloud security. Take a deep dive on perimeter security, east-west security, connected clouds, auto-scale, and auto provisioning.
Check Point: Orchestrating Gateway Operations
Смотреть видео
00:23:24
HD
Check Point: Orchestrating Gateway Operations
In this session, we will take you through some of the operations that are performed on gateways that are not the typical rule base changes.
Check Point: Mobile Security: Configuration and Policy Management Best Practices
Смотреть видео
00:25:14
HD
Check Point: Mobile Security: Configuration and Policy Management Best Practices
What is your mobility policy? Have you ever considered the impact of your mobility policy on your organization? On your employees? Whether it is BYOD, CYOD or corporate owned, traditional mobile management will not cover the security aspe...
Check Point: L’Oréal vSEC Case Study
Смотреть видео
00:10:27
HD
Check Point: L’Oréal vSEC Case Study
As one of the world’s leading beauty brands, the L'Oréal group has spent the last century in the pursuit of perfection.
Check Point: Infinity - A Day in the Life of a Security Administrator
Смотреть видео
00:17:15
HD
Check Point: Infinity - A Day in the Life of a Security Administrator
Having worked with access control as a basic security level for over 20 years, the speakers reminisce about how much better it was in the past.
Check Point: R80 X Workflow, API, and Automation Use Cases
Смотреть видео
00:29:17
HD
Check Point: R80 X Workflow, API, and Automation Use Cases
Software Technologies Ltd. — крупнейший в мире поставщик в области безопасности. Компания предлагает покупателям ведущие в индустрии решения и защищает покупателей от кибератак с непревзойденным уровнем успешного обнаружения вре...
Check Point: Adaptive Security Framework for Internet of Drones
Смотреть видео
00:23:38
HD
Check Point: Adaptive Security Framework for Internet of Drones
Internet of Drones is an architecture designed for providing coordinated access to controlled airspace for Unmanned aerial vehicles (UAVs).
Check Point: IoT & Industrial Cyber Attacks - Myth or Reality?
Смотреть видео
00:30:03
HD
Check Point: IoT & Industrial Cyber Attacks - Myth or Reality?
There is a lot of hype around how IoT will be able to change our lives, make us smarter, more efficient and more connected than ever. On the other end some site the potential danger this revolution will bring assuming IoT will not be arch...
← Предыдущая Следующая → 1 2 3 4 Последняя
Показаны 1-21 из 238