<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic *WEBINAR* - Protecting Endpoint Devices with Advanced Threat Prevention - *WEBINAR* in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/WEBINAR-Protecting-Endpoint-Devices-with-Advanced-Threat/m-p/36969#M3656</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG __jive_id="66927" alt="" class="image-1 jive-image" height="267" src="https://community.checkpoint.com/legacyfs/online/checkpoint/66927_Webinar.jpg" width="401" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="color: #555555; background-color: #ffffff; font-size: 1.2em; margin: 0px 0px 20px;"&gt;&lt;SPAN style="color: #e80cd2;"&gt;&lt;STRONG&gt;&lt;A class="link-titled" href="https://pages.checkpoint.com/webinar-protecting-endpoint-devices.html" style="color: #e80cd2;" title="https://pages.checkpoint.com/webinar-protecting-endpoint-devices.html"&gt;Protecting Endpoint Devices with Advanced Threat Prevention | Check Point Software&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #555555; background-color: #ffffff; font-size: 1.2em; margin: 0px 0px 20px;"&gt;It has become increasingly important to provide the highest level of security for endpoint devices, as organizations are faced with evasive malware and ransomware attacks. An endpoint security solution needs to be incorporated to prevent&amp;nbsp;5th generation of cyber attacks and exploits, and to contain and remediate infections by intercepting during runtime.&lt;/P&gt;&lt;P style="color: #555555; background-color: #ffffff; font-size: 1.2em; margin: 0px 0px 20px;"&gt;&lt;SPAN&gt;In the 2018 Forrester Report, Check Point earned the highest possible scores in the Malware Prevention, Data Security, Mobile Security, External Integrations, and Product Support criteria and &lt;A href="https://pages.checkpoint.com/forrester-wave-endpoint.html%20"&gt;&lt;SPAN style="font-size: 22px; color: #e80cd2;"&gt;&lt;STRONG&gt;named a LEADER&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;/A&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #555555; background-color: #ffffff; font-size: 1.2em; margin: 0px 0px 20px;"&gt;Join &lt;STRONG&gt;Check Point and guest speaker, senior analyst at Forrester Research,&lt;/STRONG&gt; Chris Sherman, to discuss:&lt;/P&gt;&lt;UL style="color: #333333; background-color: #ffffff; margin: 0px 0px 1em; padding: 0px 0px 0px 40px;"&gt;&lt;LI style="color: #555555; font-size: 1.2em; margin: 0px 0px 15px; padding: 0px 0px 0px 10px;"&gt;Endpoint security trends and threat prevention benefits&lt;/LI&gt;&lt;LI style="color: #555555; font-size: 1.2em; margin: 0px 0px 15px; padding: 0px 0px 0px 10px;"&gt;The Forrester Wave&lt;SPAN style="font-size: 12.6px;"&gt;&lt;SUP&gt;TM&lt;/SUP&gt;&lt;/SPAN&gt;: Endpoint Security Suites, Q2 2018 results&lt;/LI&gt;&lt;LI style="color: #555555; font-size: 1.2em; margin: 0px 0px 15px; padding: 0px 0px 0px 10px;"&gt;How organizations can best protect themselves from advanced attacks&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;&lt;A href="https://pages.checkpoint.com/webinar-protecting-endpoint-devices.html"&gt;WATCH the WEBINAR REPLAY HERE&lt;/A&gt;&lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/45534"&gt;Yossi Hasson&lt;/A&gt;‌ &lt;A href="https://community.checkpoint.com/migrated-users/43729"&gt;Boaz Barzel&lt;/A&gt;‌&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 05 Jul 2018 13:17:11 GMT</pubDate>
    <dc:creator>Tal_Eisner</dc:creator>
    <dc:date>2018-07-05T13:17:11Z</dc:date>
    <item>
      <title>*WEBINAR* - Protecting Endpoint Devices with Advanced Threat Prevention - *WEBINAR*</title>
      <link>https://community.checkpoint.com/t5/Endpoint/WEBINAR-Protecting-Endpoint-Devices-with-Advanced-Threat/m-p/36969#M3656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG __jive_id="66927" alt="" class="image-1 jive-image" height="267" src="https://community.checkpoint.com/legacyfs/online/checkpoint/66927_Webinar.jpg" width="401" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="color: #555555; background-color: #ffffff; font-size: 1.2em; margin: 0px 0px 20px;"&gt;&lt;SPAN style="color: #e80cd2;"&gt;&lt;STRONG&gt;&lt;A class="link-titled" href="https://pages.checkpoint.com/webinar-protecting-endpoint-devices.html" style="color: #e80cd2;" title="https://pages.checkpoint.com/webinar-protecting-endpoint-devices.html"&gt;Protecting Endpoint Devices with Advanced Threat Prevention | Check Point Software&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #555555; background-color: #ffffff; font-size: 1.2em; margin: 0px 0px 20px;"&gt;It has become increasingly important to provide the highest level of security for endpoint devices, as organizations are faced with evasive malware and ransomware attacks. An endpoint security solution needs to be incorporated to prevent&amp;nbsp;5th generation of cyber attacks and exploits, and to contain and remediate infections by intercepting during runtime.&lt;/P&gt;&lt;P style="color: #555555; background-color: #ffffff; font-size: 1.2em; margin: 0px 0px 20px;"&gt;&lt;SPAN&gt;In the 2018 Forrester Report, Check Point earned the highest possible scores in the Malware Prevention, Data Security, Mobile Security, External Integrations, and Product Support criteria and &lt;A href="https://pages.checkpoint.com/forrester-wave-endpoint.html%20"&gt;&lt;SPAN style="font-size: 22px; color: #e80cd2;"&gt;&lt;STRONG&gt;named a LEADER&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;/A&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #555555; background-color: #ffffff; font-size: 1.2em; margin: 0px 0px 20px;"&gt;Join &lt;STRONG&gt;Check Point and guest speaker, senior analyst at Forrester Research,&lt;/STRONG&gt; Chris Sherman, to discuss:&lt;/P&gt;&lt;UL style="color: #333333; background-color: #ffffff; margin: 0px 0px 1em; padding: 0px 0px 0px 40px;"&gt;&lt;LI style="color: #555555; font-size: 1.2em; margin: 0px 0px 15px; padding: 0px 0px 0px 10px;"&gt;Endpoint security trends and threat prevention benefits&lt;/LI&gt;&lt;LI style="color: #555555; font-size: 1.2em; margin: 0px 0px 15px; padding: 0px 0px 0px 10px;"&gt;The Forrester Wave&lt;SPAN style="font-size: 12.6px;"&gt;&lt;SUP&gt;TM&lt;/SUP&gt;&lt;/SPAN&gt;: Endpoint Security Suites, Q2 2018 results&lt;/LI&gt;&lt;LI style="color: #555555; font-size: 1.2em; margin: 0px 0px 15px; padding: 0px 0px 0px 10px;"&gt;How organizations can best protect themselves from advanced attacks&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;&lt;A href="https://pages.checkpoint.com/webinar-protecting-endpoint-devices.html"&gt;WATCH the WEBINAR REPLAY HERE&lt;/A&gt;&lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/45534"&gt;Yossi Hasson&lt;/A&gt;‌ &lt;A href="https://community.checkpoint.com/migrated-users/43729"&gt;Boaz Barzel&lt;/A&gt;‌&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jul 2018 13:17:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/WEBINAR-Protecting-Endpoint-Devices-with-Advanced-Threat/m-p/36969#M3656</guid>
      <dc:creator>Tal_Eisner</dc:creator>
      <dc:date>2018-07-05T13:17:11Z</dc:date>
    </item>
  </channel>
</rss>

