Architecture - The Flow

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
35 minutes
Difficulty
Beginner
CEU/CPE
1
Video Transcription
00:00
>> We live in a world in which
00:00
security threats are everywhere.
00:00
Traditionally, we have had
00:00
a security gateway to block
00:00
malicious traffic from the Internet.
00:00
But what happens if
00:00
the threat arrives through a flash drive?
00:00
Or what if the computers in
00:00
>> your organization are laptops,
00:00
>> which connect to networks at cafes,
00:00
>> airports, or the neighbor's Wi-Fi?
00:00
Yes, sure.
00:00
You have an agreement.
00:00
What protects those laptops then?
00:00
The solution is, of course, Harmony Endpoint.
00:00
We simply install
00:00
our endpoint security clients on company computers.
00:00
It protects remote employees, devices,
00:00
and Internet connectivity from
00:00
malicious attacks while ensuring
00:00
secure remote zero-trust access at
00:00
any scale to any corporate application.
00:00
Enabling capabilities such as compliance,
00:00
anti-malware, media encryption and port protection,
00:00
firewall and application control, full disk encryption,
00:00
anti-bot and URL filtering,
00:00
anti-ransomware and anti-exploit.
00:00
The client is connected to
00:00
the endpoint management server,
00:00
which can be on Cloud or on-premise.
00:00
The client and the server communicate securely.
00:00
The admin can manage it all through
00:00
the checkpoint infinity portal over
00:00
the web if using the cloud management server.
00:00
Smart Endpoint can be used with
00:00
an on-premise solution and
00:00
can connect to the Cloud management as well.
00:00
The client is protected,
00:00
thanks to Harmony Endpoint.
00:00
The policy is determined on the server
00:00
by the administrator using the Infinity Portal.
00:00
How cool is that?
Up Next