<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Necessary components of modern infrastructure security in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Necessary-components-of-modern-infrastructure-security/m-p/16438#M2752</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Hello also this informatition is quite usefull&amp;nbsp;&lt;/SPAN&gt;&lt;P class=""&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.slideshare.net/MotiSagey/cpx-2016-moti-sagey-security-vendor-landscape"&gt;https://www.slideshare.net/MotiSagey/cpx-2016-moti-sagey-security-vendor-landscape&lt;/A&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 11 Dec 2017 23:51:21 GMT</pubDate>
    <dc:creator>Pablo_Barriga</dc:creator>
    <dc:date>2017-12-11T23:51:21Z</dc:date>
    <item>
      <title>Necessary components of modern infrastructure security</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Necessary-components-of-modern-infrastructure-security/m-p/16435#M2749</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'd like to have your input on what components supposed to comprise modern infrastructure security. Check Point undeniably has one of the broadest offerings, but in a real life environments it is frequently paired with and augmented by other products.&lt;/P&gt;&lt;P&gt;I'm not so much interested in particular vendor offerings, but in concepts and categories that could and should be used to maximize the effectiveness of Check Point stack.&lt;/P&gt;&lt;P&gt;Please chime in.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Dec 2017 15:54:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Necessary-components-of-modern-infrastructure-security/m-p/16435#M2749</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-12-07T15:54:17Z</dc:date>
    </item>
    <item>
      <title>Re: Necessary components of modern infrastructure security</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Necessary-components-of-modern-infrastructure-security/m-p/16436#M2750</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Vladimir its a great question , I'm currently taking to reference all the Infinity Architecture, this Architecture covers mobile security (endpoint and smartphones), cloud security, network security and a consolidated security management.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://www.checkpoint.com/architecture/infinity/" title="https://www.checkpoint.com/architecture/infinity/"&gt;Check Point INFINITY - Cloud, Mobile, Threat Prevention | Check Point Software&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the Software Defined Protection paper is a good start to review some implementations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://www.checkpoint.com/products-solutions/software-defined-protection-sdp/" title="https://www.checkpoint.com/products-solutions/software-defined-protection-sdp/"&gt;Software-Defined Protection (SDP) | Check Point Software&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Dec 2017 00:20:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Necessary-components-of-modern-infrastructure-security/m-p/16436#M2750</guid>
      <dc:creator>Pablo_Barriga</dc:creator>
      <dc:date>2017-12-08T00:20:17Z</dc:date>
    </item>
    <item>
      <title>Re: Necessary components of modern infrastructure security</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Necessary-components-of-modern-infrastructure-security/m-p/16437#M2751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pablo.&lt;/P&gt;&lt;P&gt;Thank you for participating.&lt;/P&gt;&lt;P&gt;Frankly, I have expected better turnout in this discussion:)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that recognizing when solution is Not applicable is as important as recognizing when it is. Else, as a security practitioner I am doing disservice to both, my clients and vendors who's solutions I am implementing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Therefore, I am trying to map-out the areas where Check Point's strength could and should be supplemented by other solutions and identify those by functionality. I am trying to stay vendor agnostic in order not to spark fan wars.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even if I will not interest anyone in this project, I will likely write an article on the subject and place it here. It likely will suffer from bias and will miss a bunch of data if no one else will be here to provide much needed criticism and alternative view-points.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2017 23:35:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Necessary-components-of-modern-infrastructure-security/m-p/16437#M2751</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-12-11T23:35:53Z</dc:date>
    </item>
    <item>
      <title>Re: Necessary components of modern infrastructure security</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Necessary-components-of-modern-infrastructure-security/m-p/16438#M2752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Hello also this informatition is quite usefull&amp;nbsp;&lt;/SPAN&gt;&lt;P class=""&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.slideshare.net/MotiSagey/cpx-2016-moti-sagey-security-vendor-landscape"&gt;https://www.slideshare.net/MotiSagey/cpx-2016-moti-sagey-security-vendor-landscape&lt;/A&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2017 23:51:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Necessary-components-of-modern-infrastructure-security/m-p/16438#M2752</guid>
      <dc:creator>Pablo_Barriga</dc:creator>
      <dc:date>2017-12-11T23:51:21Z</dc:date>
    </item>
    <item>
      <title>Re: Necessary components of modern infrastructure security</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Necessary-components-of-modern-infrastructure-security/m-p/16439#M2753</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Helo Vladimir could yo please post your article when you have finish it, its going to be a good insight to analize strengths and weakness of some its solutions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also this information is quite usefull&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="http://pages.checkpoint.com/nrt-multi-layer-defense-for-an-evolving-threat-landscape.html" title="http://pages.checkpoint.com/nrt-multi-layer-defense-for-an-evolving-threat-landscape.html"&gt;Check Point – Multi-layered defense for an evolving threat landscape with ESG Analyst Jon Oltsik&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="61436" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/61436_pastedImage_1.png" style="width: 620px; height: 401px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Dec 2017 14:25:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Necessary-components-of-modern-infrastructure-security/m-p/16439#M2753</guid>
      <dc:creator>Pablo_Barriga</dc:creator>
      <dc:date>2017-12-13T14:25:22Z</dc:date>
    </item>
  </channel>
</rss>

