Upcoming Webinar

Change Drivers: Impacts to Healthcare Cloud Security and Compliance

Tues, June 2 @ 12 PM PT | 3 PM ET

Upcoming Webinar

Microsoft Azure Webinar

Automated compliance and cloud security

Thurs, June 4 @ 1 PM EST

Upcoming Webinar

Best Practices for Oracle Cloud Security

EMEA: June 9 @ 9 AM ET | 2 PM UK | 3 PM CEST

Americas: June 9 @ 2 PM ET | 11 AM PT

Upcoming Webinar

AWS & Check Point
Virtual DevDay

Learn how to secure applications & workloads in AWS

Wed, June 10 @ 8:30 AM PT | 11:30 AM ET



Best Practices for a Secure Google Cloud Migration
Are you in the process of migrating to Google Cloud? Would you like to learn best practices for designing a secure cloud deployment? Do you need to provide secure remote access to your workforce? Watch the replay of this webinar co-hosted by Check Point and Google Cloud for best practices on how to build a secure cloud deployment. Learn about: Google cloud infrastructure capabilities; Scalable and secure remote access to corporate networks and resources; Check Point’s cloud security blueprint, which helps customers design secure cloud architectures with CloudGuard cloud security solutions.


Threat Intelligence and Forensics in CloudGuard Dome9
Check Point CloudGuard Dome9 has provided you an efficient way to visualize and evaluate security posture, while enforcing golden standard policies and compliance measures in the cloud. As part of this webinar, we will highlight how incidence response and forensics can further enhance your security posture across your multi-cloud environments.


Secure your Azure and Hybrid Cloud using Cloud Security Blueprint
In this webinar hosted by Microsoft, Keith Vidal of Microsoft provides valuable information about the Azure Marketplace; Binal Shah of Microsoft talks about Azure cloud infrastructure capabilities for enterprise class architecture and Rodrique Boutros of Check Point introduces the cloud security blueprint and how it can be used to design secure cloud deployments.


Improve your VMware NSX Security with Check Point
Watch this webinar replay, co-hosted by Check Point and VMware to better understand how CloudGuard IaaS supports NSX-T 2.5, how to enable North-South and East-West advanced threat prevention, as well as slides about VMware Cloud, zero trust models and PKS deployments. (You will also receive the webinar slides and Q&A).


Check Point and Microsoft: Better Together for Secure Cloud Migrations
Shay Shahak, Senior Azure App Dev Specialist at Microsoft and Chris Beckett, Cloud Security Architect at Check Point will provide best practices on how to build a secure cloud deployment. Learn about Azure cloud infrastructure capabilities for enterprise class architecture, recommendations for a secure migration of Microsoft products reaching End of Support in 2020, and Check Point’s cloud security blueprint.


Best Practices for Implementing Security in Azure
To fully embrace the cloud, businesses need to understand where the balance of responsibilities lie between protecting the cloud infrastructure (which is the responsibility of the cloud provider) and protecting the data that resides in the cloud (which is the responsibility of the customer). This is what cloud providers refer to as the shared responsibility model.
Watch this webinar replay from Check Point and Microsoft, which will provide you with best practices for how to build a secure cloud deployment.


Advanced Security for VMware NSX with Check Point
Enterprises are increasingly adopting a hybrid-cloud deployment model. However cloud security remains a top concern, especially with multiple cloud vendors and their different security capabilities, and the need to secure traffic between the enterprise on-premise network, branch offices and public clouds. Watch this webinar replay to better understand how CloudGuard IaaS supports NSX-T 2.x and how to enable North-South and East-West advanced threat prevention.


Protecting Branch SD-WAN Internet Connections to the Cloud from Cyber-Attacks
Watch the webinar replay to learn how Check Point and VeloCloud, now part of VMware, protect branch office connections from advanced threats and cyber-attacks, while reducing costs and simplifying deployments. Check Point CloudGuard Connect and Edge can seamlessly integrate with VMware SD-WAN™ by VeloCloud® to ensure the performance and protection of enterprise and cloud applications over the Internet and hybrid-WAN.


Check Point Partners with VMware and Silver Peak to Secure Branch Office Connections to the Cloud
As enterprises increasingly move their on-premise branch office workloads and applications to SaaS applications, they are adopting Software Defined Wide Area Networking (SD-WAN) to intelligently route traffic to cloud services. However, connecting branch offices directly to the cloud significantly increases their security risk and security management costs. Watch this webinar reply to learn how Check Point CloudGuard Connect and CloudGuard Edge transform branch office security.


CloudGuard Log.ic: Cloud Security Will Never Look the Same
After securing the cloud network and configurations, Check Point proudly introduces CloudGuard Log.ic. CloudGuard Log.ic provides native threat protection and security analysis for the public cloud. Watch this webinar replay to learn how CloudGuard Log.ic provides context-rich visualization, integrates with your SIEM solutions, enables you to see every data flow and audit trail, and allows you to alert and quarantine public cloud threats.


Leading Cloud Security with Dome9
More workloads are moving to the cloud. For good reason—it’s the great equalizer, helping businesses scale and achieve efficiencies not possible otherwise. Yet, daily reports of data breaches due to misconfigured servers or third-party lax security practices have sketched it as one big threat zone. See what it takes to securely take advantage of all the cloud has to offer, without the risk. Join our webinar on November 1 and discover how you can benefit from the combined forces of Check Point and Dome9.


Migrating Your Datacenters to AWS with Automated Security
With the sophisticated nature of today’s Generation V attacks, having advanced security services protecting cloud networks is more important than ever. However the cloud is far more agile and automated than our legacy environments. Security needs to be as automated and dynamic as the cloud in order to be effective. Watch this webinar replay to learn how to migrate premises-based datacenters to AWS with automated and dynamic security.


Introducing CloudGuard SaaS
SaaS applications help increase business agility, but they also expose businesses to risks from advanced external threats. To protect enterprises from these developing risks, Check Point introduces CloudGuard SaaS. Watch this webinar replay to learn how SaaS applications are breached, why cyber criminals are targeting employee SaaS accounts to take them over, and how to prevent SaaS hacks and protect sensitive data.


Securing Your Cloud With Check Point vSEC (now CloudGuard)
As public and private cloud adoption skyrockets, the number of attacks against cloud infrastructure is also increasing dramatically. Now more than ever, it is crucial to secure your cloud assets and data against advanced threats. Check Point vSEC makes securing your cloud environment painless. It provides complete visibility to monitor network traffic across physical, virtual and cloud-based infrastructure while supporting a wide variety of SDDC infrastructures. Learn how you can easily leverage vSEC as a critical security component for your cloud environment.


Check Point vSEC (now CloudGuard) for Cisco ACI
The Check Point vSEC and Cisco ACI joint solution architecture delivers comprehensive threat prevention for ACI-powered data centers while offering complete visibility and consistent control of both physical and virtual environments in an agile and automated manner. Watch this webinar to learn how to infuse security into software-defined data centers with Check Point and Cisco.


Securing Workloads and Assets in Azure with Check Point vSEC (now CloudGuard)
Enterprises are increasingly migrating workloads to the public cloud like Microsoft Azure for speed, agility, scale, and cost benefits. However, cloud providers like Microsoft Azure maintain that enforcing security is a shared responsibility between itself and the customer. Learn about the security challenges of moving workloads to the public cloud and how Check Point vSEC for Azure helps customers protect their assets with agile and scalable security. Hear from a customer on how Check Point vSEC allowed them to leverage the full capabilities of the cloud without sacrificing security while maintaining compliance.


Check Point vSEC (now CloudGuard): Comprehensive Threat Prevention Security for AWS
Organizations transitioning to a cloud-based environment can face a new set of security risks and challenges that their legacy security approaches are unable to address. Listen to Check Point and AWS talk about ways to seamlessly extend the same advanced security that protects your on-premises infrastructure to your AWS workloads. Hear about real-world examples of how enterprises have secured their AWS assets with vSEC and best practices for identifying and preventing sophisticated cyber threats from reaching your cloud workloads.


Best Practices to Securing the Hybrid Clouds and SDDC
Organizations are rapidly embracing cloud technologies to lower costs, simplify operations, and accelerate application deployment. However, cloud technologies aren’t well understood and most organizations lack the right skills to effectively respond to security incidents or address the risks associated with moving data to the cloud. Watch this webinar to learn more about this strategy and its profound effect on cyber security.



Secure Your Everything for Healthcare
While cloud, mobile, and IoT technologies improve your hospital’s efficiency and quality of service, they create more entry points for hackers to target. Tune into the webinar replay, where you will learn best practices to optimize your hospital’s cyber security posture and prevent the next attack. Discover how you can protect the clinical network and block ransomware attacks, secure critical medical devices to ensure patient safety, safeguard medical records and maintain compliance with HIPPA, make medical staff more mobile without compromising on security.
A Quantum Leap for Network Security
Watch the replay to learn how Check Point addresses key IT concerns through the new Quantum Security Gateways™. They combine the Best Security and the Ultimate hardware to deliver ultra-scalable, power efficient protection against Gen V cyber threats. For the first time in Check Point’s history, all Quantum Security Gateways™ are bundled with Check Point’s award-winning SandBlast Zero Day Protection right out of the box.
Stop Zero-Days at the Speed of Business with SandBlast Network
SandBlast Network provides a solution to stopping zero-day attacks without compromising productivity. Equipped with powerful threat intelligence and AI technologies, unknown cyber threats are prevented. With advanced network threat prevention, create a secure environment with innovative technologies.
R80.40 Unified Security
R80 is the industry’s most advanced threat prevention and security management software for data centers, cloud, mobile, endpoint and IoT. The latest software release extends protection, streamlines operational processes and enhances productivity. Stream the webinar to learn about all of the exciting new features of R80.40 Unified Security such as: SmartTasks, enhanced SSL inspection speed, and over 50 New Management APIs.
Check Point and Silver Peak Optimize Enterprise Branch Office SD-WAN Security
Check Point and Silver Peak have partnered to create a joint solution that addresses the network security challenges of a cloud-first architecture. This solution enables enterprises to securely automate branch office Internet connections to the cloud, leveraging Silver Peak’s Unity EdgeConnect SD-WAN edge platform and Check Point CloudGuard Connect cloud-hosted security service. Watch the webinar to learn more.
Fast Track Your Network Security
New Fast Track Network Security suite of solutions delivers highest-caliber threat prevention, on-demand Hyperscale expansion and unified security for enterprises of all sizes. The principle behind Fast Track Network Security is simple. It enables enterprises to deploy the industry’s leading threat prevention capabilities at all points of their infrastructure, and to scale security almost infinitely according to their changing business needs. It also dramatically accelerates the efficiency of their security operations. This enables enterprises to prevent and block even the most advanced attacks, before they can disrupt business. Stream the webinar to learn more.
Check Point and VMware Secure SD-WAN: A Case Study
Check Point and VeloCloud, now part of VMware, have joined forces to enable organizations to enjoy the best performance of SaaS-based applications, without worrying about security over the Internet or hybrid WAN. Watch the replay to learn key benefits of this joint solution and gain new insights into how a leading specialties chemical provider achieved desired application performance and security at their branch offices while migrating from traditional WAN to secure SD-WAN.
Turbo Charge your Enterprise with up to 1 Terabit per second of Threat Prevention
The Check Point 16000 and 26000 are a new generation of high performance Security Gateways for the enterprise market segment. With the new appliances, enterprise customers can enable advanced threat prevention and inspect for threats within TLS encrypted traffic.
Innovation Done Right: Introducing Check Point Maestro
The industry’s first truly hyperscale network security solution. Check Point Maestro is a revolutionary new solution that enables businesses of any size to enjoy the power of flexible cloud-level security platforms, and to seamlessly expand their existing security gateways to hyperscale capacity. This enables organizations to start with their current security implementations, no matter how small, and scale their protection almost infinitely according to their changing business needs.
Unveiling 100+ Features in R80.20: Learn Their Benefits
R80.20 is here. Check Point prides itself in delivering the most innovative and effective security that keeps our customers protected against large scale, fifth generation cyber threats. There is only one way to manage this, find out by watching our webinar on demand to learn all about the innovations and features of R80.20: with groundbreaking performance against Gen V attacks, introducing new AI engines for the highest and most accurate catch rate in the industry, and exclusive for R80.20 – new Cyber Attack Dashboard that improves incident response efficiency by consolidating multiple security events into a single actionable view.
Smart Security for the era of Gen V
With increasing connectivity and a dramatic increase in security incidents we need to be smarter with the security technologies available to us. The top challenges in the industry are clear, there is a lack of resources, expertise and the use of multiple vendors stopping security teams everywhere from achieving the Gen V security needed to stay operational and efficient. Watch this webinar replay and learn how to leverage these technologies for real-time knowledge and regulatory compliance in the era of Gen V.
The Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware
As ransomware attacks continue to mature both in frequency and intensity, their impact on business has grown exponentially. Hackers have encrypted hundreds of thousands of files, including shared network storage, incapacitating users and often taking whole networks hostage. They demand payment of ransom in return for decryption keys to enable you to regain access to your files. To successfully prevent ransomware attacks against your organization, you need to understand their nature, how they work, and how you can detect and stop them. Watch the webinar to learn how ransomware targets your end users and infiltrates your network. Also see real-life examples of ransomware attacks and discover best practices to protect your organization.
WannaCry: Protect Yourself Now
The recent WannaCry outbreak clearly demonstrates just how damaging ransomware can be, and how quickly such attacks can disrupt vital services. Learn about WannaCry’s inner-workings, understand how to effectively protect from this threat and what you should do to be prepared for future attacks. Watch this webinar to learn how Check Point’s SandBlast solution can protect you from WannaCry and other ransomware attacks.
Absolute Zero Trust Security with Check Point Infinity
With cyber-threats existing both inside and outside the perimeter, security professionals across the industry are rebuilding their strategies around a Zero Trust approach. Watch this webinar to learn about the principles of the Zero Trust security model, and about the Check Point Infinity practical approach to their implementation.



Defending Enterprise Data from Mobile Threats, a webinar with Miercom
Rob Smithers, CEO of Miercom, the IT testing organization, joins Check Point’s security experts to discuss trends in the enterprise mobile ecosystem and how forward-thinking businesses secure their mobile workforce.


Protecting RCB Bank with SandBlast Mobile
Mobile devices are critical to every organization’s digital transformation, enabling employees to work when and from where they want, increasing productivity and efficiency. However, this has also created a new back door into organizations, leaving corporate data at risk. Watch this webinar replay with guest speaker Stacy Dunn from RCB Bank and Jeremy Kaye from Check Point to learn how RCB Bank successfully protects their mobile fleet with SandBlast Mobile.


Check Point + Microsoft | Secure Enterprise Mobile
Check Point SandBlast Mobile and Microsoft Enterprise Mobility + Security (EMS) are integrated to provide enhanced capabilities for securing corporate data and assets, including the ability to access company resources and data based on Check Point’s risk assessments. Watch this webinar replay to better understand how Check Point and Microsoft work together to provide a complete mobile security solution.


How to Prevent Mobile Network Attacks
Watch this webinar replay to learn the latest news about the rapidly evolving mobile threat landscape, why Unified Endpoint Management (UEM) solutions don’t provide protection against email hacking, credential theft, and zero-day attacks, and how SandBlast Mobile achieved the market’s highest security efficacy score in Miercom’s 2019 Mobile Threat Defense Industry Assessment.


Phishing, Bots and Malicious Sites Threaten Mobile Workers
Phishing attacks are among the hackers’ favorite tools. Now phishing attacks have hit mobile with increasing frequency. Sending malicious links over email, messaging apps, and even social media apps is an amazingly effective way to target the sensitive data on employees’ devices. However, phishing is just one mode of attack used by cybercriminals to exploit mobile networks. Watch this webinar replay to learn how SandBlast Mobile 3.0 employs a revolutionary security architecture to combat network attacks.


GDPR Hacks for Mobile Businesses: A Pragmatist’s Approach
On May 25 the European Union will begin enforcing the General Data Protection Regulation, or GDPR, impacting enterprise mobile security. GDPR enforces practices to prevent unauthorized use or accidental loss of data through the deployment of appropriate security measures. Watch this webinar replay to learn what key principles of GDPR impact mobile businesses and how Check Point SandBlast Mobile handles data processes, making it GDPR compliant.


Diagnosing the Evolving Mobile Threat Landscape
Mobile devices are critical to every organization’s digital transformation initiative. According to a recent survey conducted by Dimensional Research, 20% of all businesses were breached in 2017, while 94% of security professionals expect the frequency of mobile attacks to increase. Watch this webinar replay to learn why IDC named SandBlast Mobile the leading mobile threat management solution.


Mobile Cyberattacks Impact Every Business
Check Point’s mobile threat research team analyzed mobile threat data for 850 businesses worldwide over the course of 12 months. Watch this webinar replay to learn the findings of this landmark study, what industries and regions are most impacted by mobile malware, and what organizations can do to prevent attacks.


Gooligan: Uncovering the Attack that Breached Over 1 Million Google Accounts
It’s enough of a risk when the security of any account is compromised, but what happens when Andorid malware like Gooligan breaches over a million Google accounts? Our smartphones and tablets are gateways to the sensitive personal and business data we keep stored on cloud services. That opportunity keeps cybercriminals hard at work and ahead of the curve. Without the right protection, these attacks can expose you and your business to significant risk right under your nose. Watch this webinar to learn about today’s cybersecurity challenges and how to secure your organization from the device to the data center.


Avoid Mobile Security Breaches in Healthcare
Delivering quality care is top of mind for every medical professional. Instant, mobile access to systems and data enables practitioners, clinicians and support staff to work faster and with more accuracy, but not without risk. Just one security breach could trigger investigations, cause costly HIPAA violations, or even jeopardize patient care. Learn how an ounce of mobile prevention is worth a pound of cyberthreat cure.


HummingBad, QuadRooter, Trident: What’s the next mobile threat?
We spend more time than ever our smartphones and tablets, but can we trust them to keep our sensitive corporate information safe? These devices hold treasure troves of valuable data, which keeps cybercriminals hard at work and sometimes ahead of the curve. Sophisticated attacks that exploit vulnerabilities in Android and iOS like QuadRooter and Trident are pervasive and persistent. Mobile malware such as HummingBad have infected millions of phones worldwide. These unique and unknown threats are the ones you should worry about most. Without the right protection, these can expose you and your business to significant risk right under your nose.


Pegasus & Trident: Government-grade Espionage on iOS in the Wild
iOS devices are increasingly targeted by cybercriminals with new, sophisticated ways of stealing sensitive information. Pegasus, a lawful government cyberespionage tool being misused by entities beyond the law enforcement community, and Trident, a series of three iOS exploits cybercriminals use to install Pegasus are the latest examples. Users of iPhone and iPad devices assume their data is secure, but these new threats clearly prove how you and your business can be exposed to significant risk. Watch our webinar to learn how threats like Pegasus and Trident work, what information on iPhones and iPads could be exposed, and how Check Point Mobile Threat Prevention detects and remediates attacks like these.




Redefining Endpoint Security with SandBlast Agent
SandBlast Agent is a complete endpoint security solution offering a fleet of advanced endpoint threat prevention capabilities creating the industry’s most comprehensive endpoint solution. Watch this webinar replay to learn why Check Point SandBlast Agent is a radically different endpoint security solution.


SandBlast for Education: Protecting Learners, Shielding Schools
Schools are increasingly providing students with digital devices to transform their education experience. This trend further exposes students and schools to the dangers of the digital world: Offensive and inappropriate content, cyberbullying, personal information leakage, cyberattacks, unauthorized access to school resources, and more. Check Point now offers a simple, innovative, and robust content control and cybersecurity solution for school provided Chromebooks: SandBlast for Education.


Best Practices for Defending the Endpoint
Understanding today’s rapidly evolving endpoint technology landscape positions businesses like yours to implement solutions best suited to defend endpoints, detect and block constantly evolving threats, and quickly understand and mitigate business impact.

Mike Rothman, Analyst & President of Securosis, shares his view of the current state of endpoint protection technology and how it has evolved. Mike provides valuable insight into advanced endpoint defense strategies and solutions designed to reduce attack surface, detect and prevent attacks, and enable rapid response to cyber threats.

Orli Gan, Check Point Head of Threat Prevention Products, joins Rothman to discuss how Check Point SandBlast Agent can protect your endpoints, stop the spread of malware post-infection, and get your organization back to business quickly after an attack. Watch this video to see how your business can stay one step ahead of today’s most advanced threats.


SandBlast Agent for Browsers
Web browsing introduces an array of security risks to all organizations. Malware hidden in web-downloaded content, phishing and social engineering attacks and even the reuse of corporate passwords by your employees for non-business web services puts your organization at risk. To further complicate matters, hackers constantly evolve these attacks to evade detection by traditional signature-based solutions. Watch the on-demand webinar where we discuss how Check Point SandBlast™ Agent has expanded to help protect your employees at the browser and maintain business productivity and security.


Advanced Threat Prevention for Office 365™ Cloud Email
Join us as we discuss how Check Point is expanding the award-winning SandBlast™ Zero-Day Protection solution suite to protect the users in your Office 365 environment. Discover how SandBlast Threat Emulation delivers the highest catch rate for known and unknown malware, proactively preventing attacks. In addition, learn how SandBlast Threat Extraction provides safe content to end-users without compromising delivery speed. Be sure to attend our presentation for information about how the SandBlast suite provides advanced threat prevention as a pure cloud solution that is transparent to end-users and is easy to deploy and manage.


Closing the Loop – Advanced Endpoint Protection and Forensics with SandBlast Agent
As threats evolve to capitalize upon alternative threat vectors and security gaps, such as laptops roaming outside the network perimeter and malware originating on a USB device, organizations must find means to continuously detect and prevent attacks and respond quickly to limit damages. You need access to the insights required to understand and triage attacks to quickly identify source and scope, and to determine the best path of resolution.


Understanding SandBlast – A Technical Overview of Check Point Zero-Day Protection
Check Point SandBlast protects organizations against unknown malware, zero-day threats and targeted attacks, and prevents infections from undiscovered exploits. By combining CPU-level detection with our industry leading OS-level sandboxing, Check Point has made a significant leap in enterprise security. Threat Extraction, a part of SandBlast, preserves business agility and continuity.


Introducing Check Point Anti-Ransomware: Defeat Cyber Extortion
Did you know ransomware hit 1 in 3 businesses during 2016? Today more than ever you need a new way to effectively prevent ransomware from impacting your organization. Watch our webinar replay to learn how you can automatically detect, block and remove the most sophisticated infections, protecting both your online and offline endpoints.


Security Management


A New Model for Security Management
Faced with the barrage of connected devices, new technologies like cloud computing and continuous waves of sophisticated threats, is it a challenge for your security team to keep pace? Join us for this webcast to understand the trends that are disrupting the way security is managed today. Learn new approaches to managing security that can help you be more organized, efficient and effective in protecting your users and your business.


Security Report 2019 Webinar
Watch our special 2019 Security Report webinar replay to learn how cyber crime is now more accessible than ever and has lead to more attacks, learn how malware is even more stealth like, and understand why Cloud, Mobile and IoT platforms are most at risk.


Securing Your Business in the Era of Multi-Vector Attacks
2017 was a global wake-up call to get serious about addressing the cyber threat landscape. Unprecedented levels of cyber attacks played out as large-scale, multi-vector mega-attacks that inflicted major damage on business and reputation. As a result, we find ourselves in the midst of the fifth generation of cyber attacks. Watch the webinar replay to gain insights into the fifth generation of cyber threats and how you can protect your business from multi-vector mega-attacks.


Preparing Effectively for GDPR
The paradigm of data privacy is changing and data protection procedures must vastly adapt. The European Union’s General Data Protection Regulation (‘GDPR’) that will take effect in May 2018, will directly impact the way international organizations handle EU citizens’ private information. GDPR imposes an extensive list of protections, limitations and requirements for compliance while mandating severe penalties for non-compliance. Proactively take steps towards compliance now.