All resources sponsored by:

Check Point Software Technologies Ltd.

23 Matches
Comprehensive Protections for Cloud Networks
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:Uncover advanced threat prevention security for internal traffic inside a virtual infrastructure. Access now and explore scalability of security that adjusts to dynamic network changes, context-aware security policies that leverage security groups, and more.
Posted: 16 Nov 2016 | Published: 16 Nov 2016
Get This Now


Giving IT a Secure, Common Platform for Extending the Data Center to the Cloud
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:IT must tailor security tools to protect public and hybrid cloud environments, allowing the enterprise to confidently extend their data center applications and workflows to the cloud and connect them securely. Access this white paper and uncover secure, dedicated cloud computing services.
Posted: 15 Nov 2016 | Published: 15 Nov 2016
Get This Now


RoundTower Technologies Protects its Customer's SDN: Video Case Study
sponsored by Check Point Software Technologies Ltd.
VIDEO:Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.
Posted: 14 Nov 2016 | Premiered: 13 Jun 2016
Get This Now


Dynamic Orchestration of Advanced Threat Prevention for all Data Center Traffic
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:Learn how automated, advanced security for the software-defined data center (SDDC) offers comprehensive threat prevention.
Posted: 11 Nov 2016 | Published: 11 Nov 2016
Get This Now


Overview: Modern Data Center Security
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:Learn how to address these challenges with comprehensive and dynamic security for data centers. Uncover key capabilities of comprehensive threat prevention.
Posted: 11 Nov 2016 | Published: 11 Nov 2016
Get This Now


Advanced Security for vCloud Air
sponsored by Check Point Software Technologies Ltd.
PRODUCT OVERVIEW:This white paper details a solution that provides comprehensive security tailored to protect hybrid cloud environments, so you can feel confident about extending your data center applications and workflows to the cloud.
Posted: 11 Nov 2016 | Published: 29 Feb 2016
Get This Now


Comprehensive Security for Amazon Web Services
sponsored by Check Point Software Technologies Ltd.
PRODUCT OVERVIEW:This white paper discusses a solution that delivers comprehensive security tailored to protect cloud environments, allowing you to confidently extend your data center applications and workloads to the cloud. Learn how to protect your cloud now.
Posted: 11 Nov 2016 | Published: 30 Sep 2016
Get This Now


vSEC for VMware NSX Case Study
sponsored by Check Point Software Technologies Ltd.
WEBCAST:Learn the importance of IT security to a successful international insurance group with a wide range of services, Helvetia. See how software-defined data center strategy with VMware NSX.
Posted: 09 Nov 2016 | Premiered: Apr 21, 2016
Get This Now


Best Practices for Securing Microsoft Azure Hybrid Clouds
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:This white paper discusses the best practices for securing your Microsoft Azure Cloud environment. Learn how to provide uncompromising protection against even the most sophisticated cyberattacks now.
Posted: 09 Nov 2016 | Published: 31 May 2016
Get This Now


Deploying vSec for Microsoft Azure in the Hybrid Cloud
sponsored by Check Point Software Technologies Ltd.
WEBCAST:Software-defined networking (SDN) can be leveraged to implement security services into your Azure infrastructure. Uncover a series of use cases that demonstrate how many organizations protect their Azure network.
Posted: 08 Nov 2016 | Premiered: May 22, 2016
Get This Now


Best Practices to Securing the Cloud and SDDC
sponsored by Check Point Software Technologies Ltd.
WEBCAST:Join Jon Olstik, senior principal analyst at ESG, as he explores where the threat landscape has been, where it's going, and -- more importantly -- the tools and management strategies you need to address security gaps in your cloud infrastructure or SDDC.
Posted: 08 Nov 2016 | Premiered: Sep 30, 2016
Get This Now


2016 Security Report: Staying One Step Ahead
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:This in-depth security report looks at what enterprises are encountering in known and unknown malware, attack trends, and the impact of mobile devices on the enterprise. Learn recommendations for staying a step ahead of cybercriminals.
Posted: 07 Nov 2016 | Published: 07 Nov 2016
Get This Now


Mobile Security: The Battle Beyond Malware, BYOD Security, and Conflicting Endpoint Management
sponsored by Check Point Software Technologies Ltd.
EGUIDE:Combating the wrong enemy? Evolving threats and new attack surfaces demand your mobile security strategy keep pace. Discover three articles that break down mobile security into easily understandable fields including, mobile malware, BYOD security and endpoint management.
Posted: 27 Jul 2016 | Published: 21 Jul 2016
Get This Now


Understand the Hype around Mobile Data Security Threats
sponsored by Check Point Software Technologies Ltd.
EGUIDE:In this expert e-guide, we explore some of the most effective security practices for assessing and managing mobile data security threats. Learn about the root cause for many big data breaches and gain access to 6 tips for radically improving endpoint device security.
Posted: 12 Jul 2016 | Published: 29 Jun 2016
Get This Now


Stop Future Threats though Careful Examination of the Malware Lifecycle
sponsored by Check Point Software Technologies Ltd.
EGUIDE:This e-guide takes a look at the malware lifecycle and explores how advanced attacks have evolved. Learn how specific advanced attacks work and how you can benefit from studying malware lifecycles to detect and defend against future attacks.
Posted: 11 Jul 2016 | Published: 08 Jul 2016
Get This Now


Enterprise Email and Office 365 Security
sponsored by Check Point Software Technologies Ltd.
EGUIDE:One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.
Posted: 17 Jun 2016 | Published: 07 Jun 2016
Get This Now


Removing Malware and Undetectable Windows AppLocker
sponsored by Check Point Software Technologies Ltd.
EGUIDE:A Windows command-line utility dating back to XP reportedly enables a simple and virtually undetectable Windows AppLocker whitelist bypass. How can you ensure your organization is protected against this vulnerability, and other types of malware? Access this e-guide for best practices from security experts.
Posted: 14 Jun 2016 | Published: 08 Jun 2016
Get This Now


Make Ransomware Attacks Less Dangerous
sponsored by Check Point Software Technologies Ltd.
EGUIDE:It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.
Posted: 14 Jun 2016 | Published: 08 Jun 2016
Get This Now


Check Point Abra: A Virtual Secure Workspace
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:Read this paper to learn how Abra provides a convenient secure access to the corporate workspace, while pre­venting data loss and malicious activity from remote systems — at a significantly reduced cost over traditional endpoints.
Posted: 28 Jun 2010 | Published: 28 Jun 2010
Get This Now


The New Face of Intrusion Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:Check Point IPS Software Blade gives breakthrough performance and protection at a breakthrough price. For more details, check out this paper, which highlights the numerous benefits of Check Point intrusion prevention protection solutions.
Posted: 29 Sep 2009 | Published: 12 Jun 2009
Get This Now


Deliver Application-level Security at Data Center Performance Levels
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:The shift from network-layer attacks to dynamically changing application-layer threats has dramatically increased security needs. This paper examines appliances that can quickly evolve to guarantee performance yet maintain a high level of security.
Posted: 08 Sep 2008 | Published: 08 Sep 2008
Get This Now


Unified Threat Management: The security you need, the simplicity you want
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:This paper explores the security issues driving the emergence of UTM products. It then examines a new solution from Check Point, UTM-1 Total Security appliances, and shows how it tackles many of the security challenges other UTM products cannot.
Posted: 08 Sep 2008 | Published: 08 Sep 2008
Get This Now


Encompass Writes New Prescription for Security with Check Point
sponsored by Check Point Software Technologies Ltd.
CASE STUDY:Encompass Medical Group found a turnkey HIPAA comliant Internet security solution by installing VPN-1 SmallOffice from Check Point Software.
Posted: 23 Apr 2003 | Published: 01 Apr 2003
Get This Now


23 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement