Поиск по тегу «network security» в разделе Видеокаталог

HD 00:02:14
Check Point: Automating vSEC in OpenStack | Tech Bytes
Demo video showcasing automation and orchestration of vSEC Security Gateway in OpenStack (without narration). For more information:
Cмотреть видео
HD 00:07:58
Check Point: 2017 Cyber Security Survey
Donald Meyer, Head of Marketing, Data Center and Cloud, discusses top security concerns that IT professionals have regarding Cloud and Mobility security. For more information:
Cмотреть видео
HD 00:07:15
Check Point: vSEC, The Future of Cloud Security
In this video, you’ll hear from Donald Meyer, Head of Marketing, Data Center and Cloud, where he discusses issues surrounding Cloud security and how organizations can better protect themselves from vulnerabilities in the Cloud. For more in...
Cмотреть видео
HD 00:04:49
Check Point: SandBlast Agent Forensics
This video shows SandBlast Agent’s automated forensics analysis in action. For more information: It demonstrates SandBlast Agent’s power to instantly provide security teams with a crystal-clear understanding of cyber attacks, empowering t...
Cмотреть видео
HD 00:02:12
Check Point: Anatomy of a Smishing Attack: Czech Posta App
A new smishing attack targeted users in the Czech Republic was discovered January 26, 2017. Smishing, or SMS phishing, is a vector attackers use to send SMS messages from supposedly legitimate organizations. These messages persuade users t...
Cмотреть видео
HD 00:01:50
Check Point: Hamas’ Cyber Tactics Exposed - Attacking IDF Soldier’s Mobile Phones
The Israeli Defense Forde uncovered a Hamas network that reached out to IDF soldiers online, sometimes in romantic ways, and ask them to download applications that would infect them with Trojan horse viruses. The applications used by Hamas ...
Cмотреть видео
HD 00:00:38
Check Point: vSEC for your AWS Workloads
Utilizing the same security management tool across your hybrid cloud architecture can help your organization be more secure and agile. Maximize the strength of your security posture and capacity for innovation in cloud environments with vSE...
Cмотреть видео
HD 00:00:32
Check Point: Secure Your AWS Apps and Data | Cloud Security
vSEC delivers comprehensive threat prevention security with consolidated management and enforcement for AWS hybrid clouds. For more information:
Cмотреть видео
HD 00:03:03
Check Point: Koch Media Crushes Advanced Attacks with SandBlast | Advanced Threat Prevention
Koch Media develops games globally, which is a process fraught with peril to the intellectual property in their games. Koch sought to replace Cisco and decided on SandBlast Zero DayProtection to crush advanced attacks. For more informat...
Cмотреть видео
HD 00:02:13
Check Point: Daymark Secures Cloud with CloudGuard (formerly vSEC) for Microsoft Azure | Cloud Secur
Daymark solutions, trusted advisor to businesses in the Northeast, implemented CloudGuard (formerly vSEC) for Microsoft Azure and now recommends it to all its customers for ease of use, comprehensive visibility and threat prevention. Hea...
Cмотреть видео
HD 00:02:13
Check Point: Daymark Secures Cloud with CloudGuard (formerly vSEC) for Microsoft Azure | Cloud Secur
Daymark solutions, trusted advisor to businesses in the Northeast, implemented CloudGuard (formerly vSEC) for Microsoft Azure and now recommends it to all its customers for ease of use, comprehensive visibility and threat prevention. Hea...
Cмотреть видео
HD 00:02:07
Check Point: R80 Enhances Efficiency at the University of Kansas
The University of Kansas tested R80 security management and liked what they saw. Today they enjoy increased operational efficiency through concurrent administration capabilities, APIs for automation and a single pane of glass.
Cмотреть видео
HD 00:02:11
Check Point: R80 Streamlines Security Management at Appvion | Data Center Security
Appvion, a manufacturer of specialty papers, tested R80 security management during development and now uses it every day to gain efficiency, high visibility and concurrent management capabilities.
Cмотреть видео
HD 00:01:41
Check Point: From HummingBad to Worse: Android Malware Campaign | SandBlast Mobile Security
For five months, mobile threat researchers had unprecedented access to the inner-workings of Yingmob, the Chinese cyber criminals behind HummingBad, a malware that establishes a persistent rootkit on Android devices, generates fraudulent a...
Cмотреть видео
HD 00:03:30
Check Point: Tutorial: Configuring IPS Settings with R80 Security Management Server | Advanced Threa
How to use R80 SmartConsole to configure the settings for the IPS Software Blade. For more information visit:
Cмотреть видео
HD 00:01:58
Check Point: Hunze en Aa Water Resource Board enhances Network Security, SCADA Systems with SandBlas
For more information: To help ensure safe operation of its pumping stations and other key systems, the Hunze en Aa Water Resource Board implemented NGTX appliances with SandBlast zero-day protection. Through the solutions centralized mana...
Cмотреть видео
HD 00:04:41
Check Point: 700 Appliance Setup | SMB Cyber Security
For more information: Watch our tutorial on how to setup our 700 Appliance, 's latest addition to the product family to protect small businesses against the latest cyber threats.
Cмотреть видео
HD 00:01:34
Check Point: DressCode Android Malware Discovered on Google Play | SandBlast Mobile Security | Andro
The mobile threat prevention research team discovered a new Android malware on Google Play, called DressCode, which was embedded into more than 40 apps, and found in more than 400 additional apps on third party app stores. notified Google...
Cмотреть видео
HD 00:01:15
Check Point: ‹â⋁ыââ‹Û‹â‹»‹Ù‹¨‹â_‹Ä_‹Ä݋ÎŠ_ы£ŒÐ‹âä‹â΋Ù‹âä
¾÷¬ŠÈ_‹¨‹âµ‹â_‹Ä‹Ä__ø_»‹¨¾ä܌£‹ø‹_‹ª‹_‹ªŒá¤Œ_ª‹Ç‹»‹â_‹Û‹â_‹Ä_‹Ä_‹Äö‹Ä¥‹â©‹Ä_‹âã‹âÀ‹ÄЋÄ‹ÄċÄö‹Ü‹â侩ٌø ¾ÄɌʱ‹âՋã‹¬‹â⍡ÁŒ÷‹ÇÝыÀŒà¼‹Ñ‹_‹ª‹Ûâ‹âµ‹â_‹Ä‹Ä__ø_»Ûɋø‹â»‹Ä_‹Ä‹Ä_‹Ä ‹â£‹Ä_‹â¡‹Äȋâá‹â_‹Ä ‹Äʋہ‹Ä‹ÄÄ...
Cмотреть видео
HD 00:02:09
Check Point: SmartConsole Integration with Cisco ACI | Private Cloud Networks
vSEC for Cisco ACI securely enables the rapid deployment of applications in private cloud networks. The integration with Cisco‰Ûªs APIC Controller lowers the time it takes to create and update security policies from minutes to seconds, allo...
Cмотреть видео
HD 00:02:22
Check Point: Customer Success: Community Newspaper Group (CNG)
Watch as Infrastructure Manager, Michael Brine discusses his experience with SandBlast Agent in this customer success video. Community Newspaper Group's seventeen newspapers provide readers with the latest in local news, sports, and ente...
Cмотреть видео
HD 00:02:07
Check Point: ゼロデイの脅威からエンドポイントを保護するSandBlast Agent
脅威の進化に伴い、組織には、あらゆるレベルで攻撃を防ぎ、迅速に対応して被害を抑えるソリューションの導入が推奨されます。SandBlast Agentは、幅広い高度なエンドポイント保護技術により、社内および社外で利用するエンドポイントを保護します。攻撃の全体像をすばやく把握できるフォレンジック分析機能も搭載しており、インシデント・レスポンス・チームの生産性を最大限に高めます。
Cмотреть видео
HD 00:01:32
Check Point: SandBlast Mobile Security: Man-in-the-Middle Mobile Attacks
Our mobile devices are more vulnerable then we think. A man-in-the middle attack is a potential threat every time you connect to a Wi-Fi network. For more information: Imagine you are at a coffee shop and you want to connect to Wi-Fi and...
Cмотреть видео
HD 00:02:11
Check Point: ‹Ä¢‹Ä‹â_‹ÄǏãɌ¬Œø__Ð
More information: Report: IDC Technology Spotlight: Why Comprehensive Security Requires Mobile Threat Prevention: Protecting Your Enterprise From Mobile Threats (Japanese Subtitles) Keeping your business safe from cyberattacks is no ea...
Cмотреть видео
HD 00:00:59
Check Point: RSA 2016: , One Step Ahead of the Industry
More information: When it comes to securing your organization, it's all about speed and volume: How fast can you find the threat and shut it down, and how successful can you be in catching the number of threats passing through your netwo...
Cмотреть видео
HD 00:01:10
Check Point: RSA 2016: Prevent Cyberattacks from Entering the Endpoint with SandBlast Agent
More information:
Cмотреть видео
HD 00:01:46
Check Point: RSA 2016: Day 1 - Software
For more information visit: An overview of RSA 2016, Day 1 with Software.
Cмотреть видео
HD 00:00:49
Check Point: RSA 2016: Receives "Recommended" Rating in NSS Next Generation Firewall Test
More Information: NSS Labs, Inc. released their results for the 2016 Generation Firewall Test. In their independent assessment of the security effectiveness and value, NSS once again recognized with the "Recommended" rating. This marks t...
Cмотреть видео
HD 00:01:28
Check Point: RSA 2016: R80 Security Management Launch | Security Management Software
For more information: Organizations that possess consolidated security simplify complex environments, improve efficiency and ensure security is consistently deployed across the organization. Change the way you manage security with integra...
Cмотреть видео
HD 00:05:44
Check Point: Security Demo for Industrial Control Systems
This video demonstrates how is deployed to protect and secure your operational network. For more information, please visit: In the centralized management center (called the SmartCenter), rules or security policies are created and pushed ...
Cмотреть видео
← Предыдущая Следующая → 1 2 3 4 5
Показаны 61-90 из 133