|
|
|
|
Our
DemoPoint Academy is designed to provide you with a
guided hands-on experience of our Check Point latest technologies. Let’s sign up
now to join our FREE, 3-hours DemoPoint
Academy Workshop. We look forward to see you soon!! |
|
|
|
|
|
Topic: |
|
|
Advanced Network and Endpoint Threat Prevention |
|
|
|
|
|
|
|
|
|
|
|
Date |
: |
10 July 2020 (Friday) |
|
|
|
|
|
|
|
Time |
: |
14:30 – 18:00 |
|
|
|
|
|
|
|
Venue |
: |
Room 2108, 21/F, Island Place Tower,
510 King's Road, North Point, Hong Kong [MAP] |
|
|
|
|
|
|
|
Language |
: |
Cantonese supplemented with English |
|
|
|
|
|
|
|
|
|
|
|
|
Target Audience: |
|
|
IT Manager / IT
Professional |
|
|
|
|
|
Introduction: |
|
|
SandBlast Network |
|
|
Protect your organization from zero-day cyber attacks with
SandBlast Network, the market’s leading advanced network threat prevention
solution. Increase productivity while creating a secure environment with innovative technologies
like threat emulation, threat extraction and
artificial intelligence. |
|
|
|
|
|
SandBlast Agent - Endpoint Protection |
|
|
Today’s borderless networks are redefining endpoint protection. With a variety
of endpoints freely accessing networks, they’re storing sensitive corporate data. Because 70 percent of
successful data breaches start on endpoints, a preventative approach to endpoint security can help stop
cyber attacks. SandBlast Agent is the advanced endpoint protection and threat prevention solution to protect
your organization. |
|
|
|
|
|
Highlights of the Hands-on Lab (*Bringing a laptop is required): |
|
|
|
> |
Traditional signature based solutions are no longer effective with a
demonstration of the Check Point SandBlast Threat Emulation solution |
|
|
> |
Practical and proactive prevention with SandBlast Threat Extraction |
|
|
> |
TE scanning files from links inside |
|
|
> |
GW Inline Web Extraction providing proactive and practical web prevention with
seamless user interaction |
|
|
> |
Anti-Phishing scenario using SandBlast Browser extension zero-phishing technology |
|
|
> |
Web download protection scenario using SandBlast Browser extension |
|
|
> |
Forensics analysis scenario using Anti-Bot triggered by lateral movement |
|
|
> |
Behavioral Guard scenarios Preventing Crypto mining attack and Fileless Ransomware
based PowerShell attack |
|
|
|
|
|
|
|
|
Seats are limited. First-come first-served. |
|
|
|
|
|
|
|
|
|
|
|
Remarks: |
- |
Seat confirmation will be sent to successful registration. |
- |
All images are for reference only. |
- |
ACW Distribution reserves the right to amend the above information and arrangement. |
|
|
|