Image Gallery: Check Point Software CPX 360 Featuring FireMon, Silver Peak, AT&T
The theme of the conference was “Secure Your Everything.”
![CPX 360 in New Orleans CPX 360 in New Orleans](https://eu-images.contentstack.com/v3/assets/blt10e444bce2d36aa8/blt04c6210009759a63/6524590df2a4c530df39aa41/CPXcover-1.jpg?width=700&auto=webp&quality=80&disable=upscale)
Peter Alexander, Check Point‘s chief marketing officer, said the theme of the conference, “Secure Your Everything,” means “we need to stop thinking about securing computers and mobile devices” because most organizations are thinking mostly about securing computers.
“We need to go beyond even mobile and think about anything that’s connected and the whole environment needs to be secured,” he said. “I actually think most partners get that because they’re in the business of providing complete security solutions. And in developing ‘Secure Your Everything,’ we took extensive partner input. So this is a culmination of both an internal process and a partner process to generate a message, and a look and feel in the way that the program is delivered.”
Ital Greenberg, Check Point’s vice president of product management, told attendees “we’re here to prevent, not detect.” Infinity Next includes more than 60 best security practices and protects more than 50 asset types, he said.
IoT devices are the the weakest link because nobody actually patches them, and hackers use IoT to get inside the network, he said. Check Point provides end to end IoT security, he said.
Check Point demonstrated its advanced threat protection capabilities in the Technology Expo. InfinitySOC provides a suite of tools for security teams to detect threats and respond to them, as well as reveal hidden attacks.
In the Technology Expo, Check Point Cyber Range training allowed attendees to shoot down hackers. Targeted ransomware attacks escalated in 2019 and are expected to get even worse in the coming years.
Clint Watts, senior fellow at the Foreign Policy Research Institute, and at the Center for Cyber and Homeland Security at George Washington University, spoke about the increasing dangers posed by social media and how organizations can protect themselves. Trolling as a service, disinformation for hire and social media influencers as a weapon are some of the methods used to attack and discredit, he said.
FireMon was among the cybersecurity vendors in the Technology Expo. FireMon and Check Point combine to bring configuration assurance, continuous compliance and reduced risk.
In the Technology Innovation Lab, partners and other attendees experienced the Infinity Next threat prevention and security architecture. Also demonstrated were Check Point’s SD-WAN security solutions.
Check Point is working with SD-WAN vendors like Silver Peak to bring secure SD-WAN to their customers. Silver Peak is among numerous SD-WAN vendors that are partnering with Check Point.
Terry Hect, AT&T‘s vice president of technology strategy, told attendees the cybersecurity industry is headed for an even bigger consolidation during the next five years as the focus on cloud and endpoint protection intensifies. AT&T has been a Check Point vendor partner for more than 20 years and AT&T Cybersecurity is the third-largest cybersecurity company in the world.
Attendees were treated to a rousing Mardi Gras performance with elaborate costumes and a brass band.
All 3,500-plus attendees were invited to join a parade leading to a big party at Mardi Gras World.
All 3,500-plus attendees were invited to join a parade leading to a big party at Mardi Gras World.
Check Point Software Technologies partners, customers and others this week headed to the Big Easy for the company’s CPX 360 2020 conference.
The theme of the conference was “Secure Your Everything.” And to emphasize the widespread threat of cybersecurity, Gil Shwed, Check Point’s CEO and founder, said the venue where the conference took place was hit by a cyberattack last week following an attack on the entire city.
Check Point assisted in mitigating the convention center attack, but there still were lingering threats during the conference, he said.
During the conference, Check Point unveiled Infinity Next, its latest Infinity cybersecurity architecture, and announced a new global partner program.
Five cybersecurity phenomenons that have taken place include: Cybercrime has become organized, cloud security risks are evolving, ransomware is on the rise, mobile malware is increasing, and new attack vectors include 5G and IoT, Shwed said.
Shwed stressed the importance of focusing on threat prevention rather than detection, saying “prevention protects your assets, detection produces alerts.”
“We are building the future of cybersecurity: one system to support all technologies … [that’s] easy to deploy and use, and really secures everything,” he said. “Our partners are especially important as we go to more places in the world.”
Scroll through our slideshow above for highlights from the conference.
About the Author(s)
You May Also Like