Безопасность

218 роликов Предотвращение утечки данных, DLP Data Loss Prevention - DLP - ПО для предотвращения утечек конфиденциальной информации/данных.

Предотвращение утечки данных, DLP

319 роликов Антивирусное ПО

Антивирусное ПО

Обеспечение информационной безопасности, борьба с киберпреступностью. ИТ-безопасность.
HD 00:03:15
Check Point: Installing SandBlast Agent on the Enterprise Endpoint
This video provides an overview of recommended process for deployment of SandBlast Agent on the Enterprise Endpoints. SandBlast Agent defends endpoints with a complete set of real-time advanced endpoint protection technologies, including T...
Cмотреть видео
HD 00:19:49
Check Point: What To Do When It Happens to You - Incident Response
Based on real world experiences of helping customers, this candid discussion will focus on ensuring that your organization is prepared when a breach occurs in your network. The discussion will provide real world examples of what works and w...
Cмотреть видео
 00:01:16
Check Point: 3D Security.mov
For more information visit: 3D Security vision redefines security as a 3-dimensional business process that combines policies, people and enforcement for stronger protection across all layers of security—including network, data and endpoi...
Cмотреть видео
 00:01:43
Check Point: Guerra cibernÌ©tica, nuestro paÌ_s es vulnerable a ataques en la red
Juan Rivera, Gerente Regional de Cono Sur
Cмотреть видео
 00:18:31
Check Point: The Security Zone Ep. 5: Impact of Mobile Devices on Information Security
teamed up with Dimensional Analysis to survey over 700 IT and security professionals in 6 countries to learn the current attitudes and trends regarding the impact of mobile devices on information security.
Cмотреть видео
HD 00:00:32
Check Point: Secure Your AWS Apps and Data | Cloud Security
vSEC delivers comprehensive threat prevention security with consolidated management and enforcement for AWS hybrid clouds. For more information:
Cмотреть видео
HD 00:01:41
Check Point: From HummingBad to Worse: Android Malware Campaign | SandBlast Mobile Security
For five months, mobile threat researchers had unprecedented access to the inner-workings of Yingmob, the Chinese cyber criminals behind HummingBad, a malware that establishes a persistent rootkit on Android devices, generates fraudulent a...
Cмотреть видео
HD 00:01:56
Check Point: CPU-level Sandboxing with SandBlast | Advanced Threat Prevention
s cutting-edge CPU-level inspection engine eliminates cyber threats at the point of pre-infection before cyber attack. VLearn more: This unrivaled exploit prevention technology provides a higher catch rate of threats and gives organizati...
Cмотреть видео
 00:52:51
Check Point: The Security Zone Ep. 4: Bridge the Enterprise Mobile Security Gap
Mobile security continues to be a challenge for organizations providing business access on mobile platforms, whether it is on corporate owned or personal devices. While point products provide help with addressing some concerns, they do not ...
Cмотреть видео
HD 00:03:03
Check Point: Koch Media Crushes Advanced Attacks with SandBlast | Advanced Threat Prevention
Koch Media develops games globally, which is a process fraught with peril to the intellectual property in their games. Koch sought to replace Cisco and decided on SandBlast Zero DayProtection to crush advanced attacks. For more informat...
Cмотреть видео
HD 00:01:42
Check Point: 時代はゼロデイからゼロセカンド(秒)へ – サンドボックス機能比較
時代はゼロデイからゼロセカンド(秒)へ。セキュリティの脅威への対応が1分遅れただけでも取り返しのつかないことになる今日、いかに早く脅威を阻止するかが重要です。
Cмотреть видео
HD 00:19:44
Check Point: Cloud Security - VMware & CloudGuard - CPX 360 2018
Businesses that use the public cloud are vulnerable to cyber threats. Learn how to close the security gaps in the cloud. Public and hybrid cloud adoption is exploding among enterprises, but so are cloud hacks and breaches. Cloud asset...
Cмотреть видео
HD 00:28:43
Check Point: Sobrevivir a la plaga de ransomware | CyberDay Spain 2017
Eusebio Nieva, Director Técnico España y Portugal
Cмотреть видео
HD 00:02:14
Check Point: Automating vSEC in OpenStack | Tech Bytes
Demo video showcasing automation and orchestration of vSEC Security Gateway in OpenStack (without narration). For more information:
Cмотреть видео
HD 00:02:14
Check Point: Automating vSEC in OpenStack | Tech Bytes
Demo video showcasing automation and orchestration of vSEC Security Gateway in OpenStack (without narration). For more information:
Cмотреть видео
HD 00:23:46
Check Point: Choosing The Right Security Architecture | Cyber Security | Network Security
Moti Sagey - Head of Strategic Marketing & Intelligence, Software When it comes to choosing the right security architecture & security vendor, what does it take to win your trust? In this session Moti Sagey will cover three key pillars th...
Cмотреть видео
HD 00:26:45
Check Point: Step-By-Step Guide for Securing a Web Server on Azure using CloudGuard IaaS (prev. vSE
Learn to create and deploy a web server on top of Azure public cloud and to securely publish it through a vSEC standalone server. More information:
Cмотреть видео
 00:06:54
Check Point: CAN News, Colin Pennan talks on 'Advanced Persistent Threats'
For More Information Visit: Advanced Persistent Threats are not your average cyber-threat . Learn what makes "Advanced Persistent Attacks" unique and the intricate planning goes into these targeted attacks. In this interview Colin P...
Cмотреть видео
 00:36:06
Check Point: The Security Zone Ep. 3: How to Choose Your Next Generation Threat Emulation Solution
Organizations are facing unprecedented growth in the number of security threats from malware. New attack types combine known and unknown threats to exploit vulnerabilities. Join us to learn how can protect against unknown malware.
Cмотреть видео
HD 00:18:22
Check Point: CISO viewpoint on modern IT: Britney Hommertzheim, Director, Information Security, AMC
In this session, Britney Hommertzheim, Director, Information Security. AMC Theatres. will share his vision on modern IT, among others the importance of compliance and security and how they are very different. Additionally, he will review ...
Cмотреть видео
HD 00:03:09
Check Point: Happy International Women's Day 2018
The women of share the best advice they ever received in recognition of International Women's Day 2018. Learn more about at
Cмотреть видео
HD 00:24:38
Check Point: The Security Zone Ep. 2: Forget Zero Day, Hello Zero Second
Delayed response is no longer enough to protect your business from the speed of malware. We need a ZERO SECOND response. A recent benchmark test assessed how fast Threat Emulation and other competitive products stop malware from entering a...
Cмотреть видео
HD 00:16:07
Check Point: Moving to the Public Cloud, Securely - FireChat with AWS & Azure
More than 70% of the organizations are committed to a cloud strategy in 2017. Businesses are moving their applications to the Cloud to gain more agility and efficencies. At the same time, Cloud security remains their top concern. Customers...
Cмотреть видео
HD 00:03:58
Check Point: Compliance Software Blade | Network Security Best Practices
For more information: This is the second video in the Compliance Software Blade Demonstration Series. This video provides insight into aligning both security and compliance to security best practices.
Cмотреть видео
HD 00:02:27
Check Point: Upgrading from R77.3O to R80.10 Via CPUSE
This video demonstrates in-place upgrade of a real customer database from R77.30 to R80.10 via CPUSE interface in the Web UI.
Cмотреть видео
HD 00:10:27
Check Point: L’Oréal vSEC Case Study
As one of the world’s leading beauty brands, the L'Oréal group has spent the last century in the pursuit of perfection.
Cмотреть видео
HD 00:02:22
Check Point: Securing Data Exchange with SandBlast and Safe-T HDS
Organizations today face host of challenges in securing high risk data. SandBlast is most advanced protection against zero-day malware threats, while Safe-T HDS secures all data exchange scenarios including human data exchange such as secu...
Cмотреть видео
HD 00:23:24
Check Point: Orchestrating Gateway Operations
In this session, we will take you through some of the operations that are performed on gateways that are not the typical rule base changes.
Cмотреть видео
HD 00:27:06
Check Point: Un Viaje Seguro a la Nube | CyberDay Spain 2017
Javier Hijas, Cloud Security Team Leader Europe
Cмотреть видео
HD 00:02:19
Check Point: The Mississippi Secretary of State & CTO Prevents Ransomware
For more information visit Seeking to modernize its security infrastructure, the Mississippi Secretary of State upgraded to SandBlast and now prevents ransomware attacks and enjoys a peace of mind.
Cмотреть видео