<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CPX Experience - Brasil in Português</title>
    <link>https://community.checkpoint.com/t5/Portugu%C3%AAs/CPX-Experience-Brasil/m-p/116439#M34</link>
    <description>&lt;DIV class="lia-quilt-row lia-quilt-row-message-body"&gt;
&lt;DIV class="lia-quilt-column lia-quilt-column-24 lia-quilt-column-single lia-quilt-column-message-body-content"&gt;
&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-single"&gt;
&lt;DIV id="bodyDisplay_b3c61ab56213f5" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;DIV class="lia-align-center" style="color: #6d6e71; background: #e6e6e6; margin: 0px auto;"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H2 style="color: #e45785;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Local CPX.png" style="width: 1059px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11445i4DAAA5D489179616/image-dimensions/1059x270?v=v2" width="1059" height="270" role="button" title="Local CPX.png" alt="Local CPX.png" /&gt;&lt;/span&gt;&lt;/H2&gt;
&lt;H2 id="CyberTalkKeynotes" style="color: #e45785;"&gt;Apresentações Check Point&lt;/H2&gt;
&lt;TABLE border="1" width="916.0000000000001px"&gt;
&lt;THEAD&gt;
&lt;TR class="tablesorter-headerRow" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px;" role="row"&gt;
&lt;TD width="183px" height="23px" scope="col" class="confluenceTh tablesorter-header sortableHeader tablesorter-headerUnSorted" style="height: 23px; width: 20%;" data-column="0" aria-disabled="false" aria-controls="TBL1572508475011" aria-sort="none" aria-label="Topic: No sort applied, activate to apply an ascending sort"&gt;
&lt;DIV class="tablesorter-header-inner"&gt;Topico&amp;nbsp;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="183px" height="23px" style="width: 20%; height: 23px;"&gt;Apresentador&lt;/TD&gt;
&lt;TD width="183px" height="23px" style="width: 20%; height: 23px;"&gt;Conteúdo&lt;/TD&gt;
&lt;TD width="366px" height="23px" style="width: 40%;"&gt;Descrição&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="183px" height="535px" style="width: 10%;"&gt;2021 em Ciber: Novo Mundo, Novos Desafios, Novas Oportunidades&lt;/TD&gt;
&lt;TD width="183px" height="535px" style="width: 10%;"&gt;&lt;STRONG&gt;Gil Shwed&lt;/STRONG&gt;,&lt;BR /&gt;Fundador e CEO da&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;
&lt;TD width="183px" height="535px" style="width: 10%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" style="width: 20px;"&gt;&lt;SPAN class="lia-message-image-wrapper"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 200px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/461/1/Gil%20CPX%202021%20Keynote%20with%20Video%20V5.pdf" target="_self"&gt;Apresentação&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gborro_0-1619642635140.png" style="width: 22px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11558iE730D9188D2E8E81/image-dimensions/22x18?v=v2" width="22" height="18" role="button" title="Gborro_0-1619642635140.png" alt="Gborro_0-1619642635140.png" /&gt;&lt;/span&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit;" href="https://www.youtube.com/watch?v=5RIEH81nn9E" target="_self"&gt;Veja a gravação no YouTube&lt;/A&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="366px" height="535px" style="width: 30%;"&gt;
&lt;P data-unlink="true"&gt;Por mais de 25 anos somos pioneiros na área de ciber segurança e introduzimos inovações tecnológicas para permitir uma melhor experiência e um mundo mais seguro. 2021 não é nada diferente.&lt;/P&gt;
&lt;P data-unlink="true"&gt;Enquanto o novo mundo se torna cada vez mais conectado, isso também traz desafios conforme ciber ameaças se tornam mais sofisticadas e criminosos lançam ataques com impactos enormes.&lt;/P&gt;
&lt;P data-unlink="true"&gt;Nessa sessão, Gil apresentará porque neste novo mundo, nós temos a oportunidade de redefinir a função de ciber segurança, nos tornando "ciber heróis", adaptando segurança, consolidando, e previnindo ataques com Check Point Infinity.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="183px" height="470px" style="width: 15%;"&gt;Pilares de Inovação - Anúncio de novos produtos&lt;/TD&gt;
&lt;TD width="183px" height="470px" style="width: 15%;"&gt;&lt;STRONG&gt;Fernando de Falchi&lt;/STRONG&gt;, Security Engineering Manager - Brasil&lt;/TD&gt;
&lt;TD width="183px" height="470px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" style="width: 20px;"&gt;&lt;SPAN class="lia-message-image-wrapper"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 200px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/portuguese/34/8/CPXExperience_PilaresDeInovacao_ptbr.pdf" target="_self"&gt;Apresentação&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gborro_0-1619642635140.png" style="width: 22px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11558iE730D9188D2E8E81/image-dimensions/22x18?v=v2" width="22" height="18" role="button" title="Gborro_0-1619642635140.png" alt="Gborro_0-1619642635140.png" /&gt;&lt;/span&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit;" href="https://youtu.be/xAGJ45reIH8" target="_self"&gt;Veja a gravação no YouTube&lt;/A&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="366px" height="470px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;As superfícies de ataque das organizações estão abrangentes, mais do que nunca. Organizações modernas precisam recalibrar sua abordagem de ciber segurança sob 3 principais aspectos: proteger redes corporativas/datacenter, proteger ambientes em nuvem e proteger colaboradores.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt; Nesta sessão você pode conhecer o roadmap de produtos Check Point que pode tornar essa visão uma realidade. Serão apresentados nossos produtos e inovações para prover segurança em diferentes âmbitos, sempre baseando nos nossos principios: prevenção, gerenciamento e consolidação.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="183px" height="160px" style="width: 15%;"&gt;Cura da Pandemia Cibernética –Harrmonizando usuários e acessos seguros&lt;/TD&gt;
&lt;TD width="183px" height="160px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Gustavo Borro&lt;/STRONG&gt;, Security Engineer&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="183px" height="160px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gborro_0-1618929976920.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11440i65D0954B9B41FFDB/image-dimensions/20x16?v=v2" width="20" height="16" role="button" title="Gborro_0-1618929976920.png" alt="Gborro_0-1618929976920.png" /&gt;&lt;/span&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit;" href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/portuguese/34/7/CPXExperience_Harmony_InfinityVision_ptbr.pdf" target="_self"&gt;Apresentação&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gborro_0-1619642635140.png" style="width: 22px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11558iE730D9188D2E8E81/image-dimensions/22x18?v=v2" width="22" height="18" role="button" title="Gborro_0-1619642635140.png" alt="Gborro_0-1619642635140.png" /&gt;&lt;/span&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit;" href="https://youtu.be/BofIL6X5TUg" target="_self"&gt;Veja a gravação no YouTube&lt;/A&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="366px" height="160px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Essa sessão mostrará um plano de batalha para obter sucesso na proteção de usuários e colaboradores. Com a nova estratégia Harmony é possível proteger os usuários e seus diferentes acessos.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="183px" height="180px" style="width: 15%;"&gt;Segurança na Nuvem – Agora mais IMPORTANTE do que nunca&lt;/TD&gt;
&lt;TD width="183px" height="180px" style="width: 15%;"&gt;&lt;STRONG&gt;Henrique Moisés&lt;/STRONG&gt;, Security Engineer&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="183px" height="180px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gborro_3-1618930452006.png" style="width: 19px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11442i98B97F5275A0A4C4/image-dimensions/19x15?v=v2" width="19" height="15" role="button" title="Gborro_3-1618930452006.png" alt="Gborro_3-1618930452006.png" /&gt;&lt;/span&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit;" href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/portuguese/34/5/CPXExperience_CloudGuard_ptbr.pdf" target="_self"&gt;Apresentação&lt;/A&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gborro_0-1619642635140.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11558iE730D9188D2E8E81/image-dimensions/20x16?v=v2" width="20" height="16" role="button" title="Gborro_0-1619642635140.png" alt="Gborro_0-1619642635140.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A style="font-family: inherit;" href="https://youtu.be/e2YvG0vaxaE" target="_self"&gt;Veja a gravação no YouTube&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="366px" height="180px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;A nuvem esta mais dinâmica que nunca. Como acompanhar o desenvolvimento com as novas ameaças? Escute como CloudGuard pode proteger sua nuvem dessas ameaças e tornar segurança uma força conjunta com o desenvolvimento.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="183px" height="484px" style="width: 15%;"&gt;A necessidade de consolidação em segurança cibernética&lt;/TD&gt;
&lt;TD width="183px" height="484px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Robinson Oliveira,&lt;/STRONG&gt;&amp;nbsp;Security Engineer&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="183px" height="484px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gborro_5-1618930672383.png" style="width: 22px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11444i93F70E8A83200B13/image-dimensions/22x18?v=v2" width="22" height="18" role="button" title="Gborro_5-1618930672383.png" alt="Gborro_5-1618930672383.png" /&gt;&lt;/span&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit;" href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/portuguese/34/6/CPXExperience_Infinity_ptbr.pdf" target="_self"&gt;Apresentação&lt;/A&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gborro_0-1619642635140.png" style="width: 22px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11558iE730D9188D2E8E81/image-dimensions/22x18?v=v2" width="22" height="18" role="button" title="Gborro_0-1619642635140.png" alt="Gborro_0-1619642635140.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A style="font-family: inherit;" href="https://youtu.be/FpwX7zhvOJ4" target="_self"&gt;Veja a gravação no&amp;nbsp; YouTube&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="366px" height="484px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;2020 acabou com o inicio da distribuição de vacinas para o COVID, isso aponta um pouco como 2021 será. Acontecerá uma recuperação global que melhorará a qualidade de vida e economia de muitos países.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Ja em ciber segurança, haverá um grande esforço das empresas para acelerar o investimento em segurança mas tambem reduzir custos em outras areas. A necessidade de realizar mais com menos guiará os times de TI à olharem para soluções consolidadas e ao mesmo tempo resilientes. A arquitetura Infinity da Check Point é exatamente a solução para essa demanda. Ela traz as tecnologias mais avançadas focadas em prevenção de ameaças para redes, nuvem, endpoint e mobile em um só lugar.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Wed, 28 Apr 2021 20:49:25 GMT</pubDate>
    <dc:creator>Gborro</dc:creator>
    <dc:date>2021-04-28T20:49:25Z</dc:date>
    <item>
      <title>CPX Experience - Brasil</title>
      <link>https://community.checkpoint.com/t5/Portugu%C3%AAs/CPX-Experience-Brasil/m-p/116439#M34</link>
      <description>&lt;DIV class="lia-quilt-row lia-quilt-row-message-body"&gt;
&lt;DIV class="lia-quilt-column lia-quilt-column-24 lia-quilt-column-single lia-quilt-column-message-body-content"&gt;
&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-single"&gt;
&lt;DIV id="bodyDisplay_b3c61ab56213f5" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;DIV class="lia-align-center" style="color: #6d6e71; background: #e6e6e6; margin: 0px auto;"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H2 style="color: #e45785;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Local CPX.png" style="width: 1059px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11445i4DAAA5D489179616/image-dimensions/1059x270?v=v2" width="1059" height="270" role="button" title="Local CPX.png" alt="Local CPX.png" /&gt;&lt;/span&gt;&lt;/H2&gt;
&lt;H2 id="CyberTalkKeynotes" style="color: #e45785;"&gt;Apresentações Check Point&lt;/H2&gt;
&lt;TABLE border="1" width="916.0000000000001px"&gt;
&lt;THEAD&gt;
&lt;TR class="tablesorter-headerRow" style="color: #ffffff; background-color: #e45785; border: 1px solid #c1c7d0; padding: 5px 10px 4px;" role="row"&gt;
&lt;TD width="183px" height="23px" scope="col" class="confluenceTh tablesorter-header sortableHeader tablesorter-headerUnSorted" style="height: 23px; width: 20%;" data-column="0" aria-disabled="false" aria-controls="TBL1572508475011" aria-sort="none" aria-label="Topic: No sort applied, activate to apply an ascending sort"&gt;
&lt;DIV class="tablesorter-header-inner"&gt;Topico&amp;nbsp;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="183px" height="23px" style="width: 20%; height: 23px;"&gt;Apresentador&lt;/TD&gt;
&lt;TD width="183px" height="23px" style="width: 20%; height: 23px;"&gt;Conteúdo&lt;/TD&gt;
&lt;TD width="366px" height="23px" style="width: 40%;"&gt;Descrição&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="183px" height="535px" style="width: 10%;"&gt;2021 em Ciber: Novo Mundo, Novos Desafios, Novas Oportunidades&lt;/TD&gt;
&lt;TD width="183px" height="535px" style="width: 10%;"&gt;&lt;STRONG&gt;Gil Shwed&lt;/STRONG&gt;,&lt;BR /&gt;Fundador e CEO da&lt;BR /&gt;Check Point Software Technologies&lt;/TD&gt;
&lt;TD width="183px" height="535px" style="width: 10%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" style="width: 20px;"&gt;&lt;SPAN class="lia-message-image-wrapper"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 200px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/461/1/Gil%20CPX%202021%20Keynote%20with%20Video%20V5.pdf" target="_self"&gt;Apresentação&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gborro_0-1619642635140.png" style="width: 22px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11558iE730D9188D2E8E81/image-dimensions/22x18?v=v2" width="22" height="18" role="button" title="Gborro_0-1619642635140.png" alt="Gborro_0-1619642635140.png" /&gt;&lt;/span&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit;" href="https://www.youtube.com/watch?v=5RIEH81nn9E" target="_self"&gt;Veja a gravação no YouTube&lt;/A&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD width="366px" height="535px" style="width: 30%;"&gt;
&lt;P data-unlink="true"&gt;Por mais de 25 anos somos pioneiros na área de ciber segurança e introduzimos inovações tecnológicas para permitir uma melhor experiência e um mundo mais seguro. 2021 não é nada diferente.&lt;/P&gt;
&lt;P data-unlink="true"&gt;Enquanto o novo mundo se torna cada vez mais conectado, isso também traz desafios conforme ciber ameaças se tornam mais sofisticadas e criminosos lançam ataques com impactos enormes.&lt;/P&gt;
&lt;P data-unlink="true"&gt;Nessa sessão, Gil apresentará porque neste novo mundo, nós temos a oportunidade de redefinir a função de ciber segurança, nos tornando "ciber heróis", adaptando segurança, consolidando, e previnindo ataques com Check Point Infinity.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="183px" height="470px" style="width: 15%;"&gt;Pilares de Inovação - Anúncio de novos produtos&lt;/TD&gt;
&lt;TD width="183px" height="470px" style="width: 15%;"&gt;&lt;STRONG&gt;Fernando de Falchi&lt;/STRONG&gt;, Security Engineering Manager - Brasil&lt;/TD&gt;
&lt;TD width="183px" height="470px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" style="width: 20px;"&gt;&lt;SPAN class="lia-message-image-wrapper"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ppt.png" style="width: 200px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4376i974CE6C0EF994174/image-size/small?v=v2&amp;amp;px=200" role="button" title="ppt.png" alt="ppt.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/portuguese/34/8/CPXExperience_PilaresDeInovacao_ptbr.pdf" target="_self"&gt;Apresentação&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gborro_0-1619642635140.png" style="width: 22px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11558iE730D9188D2E8E81/image-dimensions/22x18?v=v2" width="22" height="18" role="button" title="Gborro_0-1619642635140.png" alt="Gborro_0-1619642635140.png" /&gt;&lt;/span&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit;" href="https://youtu.be/xAGJ45reIH8" target="_self"&gt;Veja a gravação no YouTube&lt;/A&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="366px" height="470px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;As superfícies de ataque das organizações estão abrangentes, mais do que nunca. Organizações modernas precisam recalibrar sua abordagem de ciber segurança sob 3 principais aspectos: proteger redes corporativas/datacenter, proteger ambientes em nuvem e proteger colaboradores.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt; Nesta sessão você pode conhecer o roadmap de produtos Check Point que pode tornar essa visão uma realidade. Serão apresentados nossos produtos e inovações para prover segurança em diferentes âmbitos, sempre baseando nos nossos principios: prevenção, gerenciamento e consolidação.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="183px" height="160px" style="width: 15%;"&gt;Cura da Pandemia Cibernética –Harrmonizando usuários e acessos seguros&lt;/TD&gt;
&lt;TD width="183px" height="160px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Gustavo Borro&lt;/STRONG&gt;, Security Engineer&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="183px" height="160px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gborro_0-1618929976920.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11440i65D0954B9B41FFDB/image-dimensions/20x16?v=v2" width="20" height="16" role="button" title="Gborro_0-1618929976920.png" alt="Gborro_0-1618929976920.png" /&gt;&lt;/span&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit;" href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/portuguese/34/7/CPXExperience_Harmony_InfinityVision_ptbr.pdf" target="_self"&gt;Apresentação&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gborro_0-1619642635140.png" style="width: 22px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11558iE730D9188D2E8E81/image-dimensions/22x18?v=v2" width="22" height="18" role="button" title="Gborro_0-1619642635140.png" alt="Gborro_0-1619642635140.png" /&gt;&lt;/span&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit;" href="https://youtu.be/BofIL6X5TUg" target="_self"&gt;Veja a gravação no YouTube&lt;/A&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="366px" height="160px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Essa sessão mostrará um plano de batalha para obter sucesso na proteção de usuários e colaboradores. Com a nova estratégia Harmony é possível proteger os usuários e seus diferentes acessos.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="183px" height="180px" style="width: 15%;"&gt;Segurança na Nuvem – Agora mais IMPORTANTE do que nunca&lt;/TD&gt;
&lt;TD width="183px" height="180px" style="width: 15%;"&gt;&lt;STRONG&gt;Henrique Moisés&lt;/STRONG&gt;, Security Engineer&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="183px" height="180px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gborro_3-1618930452006.png" style="width: 19px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11442i98B97F5275A0A4C4/image-dimensions/19x15?v=v2" width="19" height="15" role="button" title="Gborro_3-1618930452006.png" alt="Gborro_3-1618930452006.png" /&gt;&lt;/span&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit;" href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/portuguese/34/5/CPXExperience_CloudGuard_ptbr.pdf" target="_self"&gt;Apresentação&lt;/A&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gborro_0-1619642635140.png" style="width: 20px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11558iE730D9188D2E8E81/image-dimensions/20x16?v=v2" width="20" height="16" role="button" title="Gborro_0-1619642635140.png" alt="Gborro_0-1619642635140.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A style="font-family: inherit;" href="https://youtu.be/e2YvG0vaxaE" target="_self"&gt;Veja a gravação no YouTube&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="366px" height="180px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;A nuvem esta mais dinâmica que nunca. Como acompanhar o desenvolvimento com as novas ameaças? Escute como CloudGuard pode proteger sua nuvem dessas ameaças e tornar segurança uma força conjunta com o desenvolvimento.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="183px" height="484px" style="width: 15%;"&gt;A necessidade de consolidação em segurança cibernética&lt;/TD&gt;
&lt;TD width="183px" height="484px" style="width: 15%;"&gt;
&lt;P&gt;&lt;STRONG&gt;Robinson Oliveira,&lt;/STRONG&gt;&amp;nbsp;Security Engineer&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="183px" height="484px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gborro_5-1618930672383.png" style="width: 22px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11444i93F70E8A83200B13/image-dimensions/22x18?v=v2" width="22" height="18" role="button" title="Gborro_5-1618930672383.png" alt="Gborro_5-1618930672383.png" /&gt;&lt;/span&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit;" href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/portuguese/34/6/CPXExperience_Infinity_ptbr.pdf" target="_self"&gt;Apresentação&lt;/A&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit; background-color: transparent;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gborro_0-1619642635140.png" style="width: 22px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11558iE730D9188D2E8E81/image-dimensions/22x18?v=v2" width="22" height="18" role="button" title="Gborro_0-1619642635140.png" alt="Gborro_0-1619642635140.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;A style="font-family: inherit;" href="https://youtu.be/FpwX7zhvOJ4" target="_self"&gt;Veja a gravação no&amp;nbsp; YouTube&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="366px" height="484px" style="width: 15%;"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;2020 acabou com o inicio da distribuição de vacinas para o COVID, isso aponta um pouco como 2021 será. Acontecerá uma recuperação global que melhorará a qualidade de vida e economia de muitos países.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Ja em ciber segurança, haverá um grande esforço das empresas para acelerar o investimento em segurança mas tambem reduzir custos em outras areas. A necessidade de realizar mais com menos guiará os times de TI à olharem para soluções consolidadas e ao mesmo tempo resilientes. A arquitetura Infinity da Check Point é exatamente a solução para essa demanda. Ela traz as tecnologias mais avançadas focadas em prevenção de ameaças para redes, nuvem, endpoint e mobile em um só lugar.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 28 Apr 2021 20:49:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Portugu%C3%AAs/CPX-Experience-Brasil/m-p/116439#M34</guid>
      <dc:creator>Gborro</dc:creator>
      <dc:date>2021-04-28T20:49:25Z</dc:date>
    </item>
  </channel>
</rss>

