Zero Trust: Practical Implementation with Check Point

Watch Full Webinar

Before filling out the registration form, please read the Privacy notice pursuant to Article 13 of EU Regulation 2016/679

Invalid Input
Invalid Input
Invalid Input
Invalid Input
Invalid Input
Invalid Input
Invalid Input

Privacy


I declare that I have read and fully understood the Privacy Notice and I hereby express my consent to the processing of my personal data by Reply SpA for marketing purposes, in particular to receive promotional and commercial communications or information regarding company events or webinars, using automated contact means (e.g. SMS, MMS, fax, email and web applications) or traditional methods (e.g. phone calls and paper mail).

Webinar Overview

The concept of Zero Trust has been present in cybersecurity since before the term “Zero Trust” was coined and has been around for decades, but recently it has gained a lot of attention. In this session, Reply Cybersecurity and Checkpoint introduces you to Zero Trust Architecture to understand the concept and building blocks behind it. The experts show some practical approaches (CheckPoint Infinity) and solutions for creating a Zero Trust Architecture. The session also aims to debunk some of the myths that have arisen in recent discussions on the subject.

Key Takeaways

  • Understand the concept of Zero Trust in comparison to traditional perimeter based security and the benefits for your security posture.
  • Have a basic idea how to approach Zero Trust, and how to start the migration from traditional security to a Zero Trust Architecture.
  • Know how to separate the marketing buzzword from the real issues.
  • Understand the business benefit of adapting Zero Trust Architecture.
  • strip-0

    SPIKE REPLY

    Spike Reply is the specialist for IT security within the Reply Group. Spike Reply secures the values and privacy of people, companies and processes to support the growth of a global sustainable digital world through innovation. The offering includes Proof of Concept (PoC), partial or complete solution implementations for network, cloud, endpoint or data protection systems and a complete Managed Security Service (5x8 or 24x7). Together with security partners, Spike Reply accompanies enterprises on the way to a company-wide, security-driven data culture.