Check Point Firewall Solutions Integration with Microsoft Azure Information Protection

Subscribers:
79,900
Published on ● Video Link: https://www.youtube.com/watch?v=646f53wKsFY



Category:
Guide
Duration: 3:29
2,753 views
18


Integration of Microsoft Azure Information Protection with Check Point Next Generation Firewall and Check Point R80 SamartConsole protects employees from leaking sensitive business data. For more information visit

To protect organizations from data loss, Microsoft and Check Point has been working closely together to integrate Microsoft Azure Information Protection (AIP) with Check Point Next Generation Firewall Security Solutions.
The integrated solution keeps sensitive business data absolutely safe, regardless of where it travels or how it is shared, including via email, web browsing or file-sharing services that are not included within the Microsoft eco-system.
Customers of both Check Point and Microsoft can rest assure knowing their employees will be prevented from accidently sending sensitive and valuable business data outside of the corporate network, not just when using Outlook or Microsoft Exchange, but also when using popular applications and services such as Gmail, Dropbox, FTP & Box.
By leveraging the Check Point capabilities of policy enforcement across the network, Microsoft Azure Information Protection file classification and protection capabilities are extended and substantial security gaps are sealed.
Therefore, joint customers can enjoy a comprehensive Data Loss Prevention solution, their security teams can track and control the exposure of sensitive information and take corrective measures to prevent data leakage or misuse.

Transcript:
Hello everyone, I’m Michael from Check Point. In the following video I’m going to show you how organizations can protect their employees from leaking sensitive business data. To do that, we’ll use an integrated of solution Microsoft Azure Information Protection, Check Point Data Loss Prevention and Check Point R80 SamartConsole.
It is clear that confidential data leakage, whether malicious or unintentional, can cause serious damage to any organization. Let’s see how unintentional data loss usually happens…
Company ABC’s CFO has created a document containing confidential financial details.
E has labeled the document as “confidential- financial” using Azure AIP.A week later, while writing an email to a friend from his private email. He accidentally attached the company’s confidential document instead of his private document. Unfortunately, the mail was sent and the sensitive data left the corporate network…To protect organizations from data loss, Microsoft & Check Point have integrated Microsoft Azure Information Protection (AIP) with Check Point Next Generation Firewall security solutions.
The integrated solution keeps sensitive information protected regardless of where it travels or how it is shared.
Let’s see how the CFO’s unintentional data loss through email could have been prevented.
This time, when the CFO accidentally tries to send the company’s confidential budget document through email he is prevented from attaching and sending the confidential business data. Through automation, Microsoft and Check Point prevented a significant data loss by ABC Company. Sensitive data has been correctly classified and protected from unauthorized distribution.
Let’s see how the System Administrator sets up Azure Information Protection and Check Point Data Loss Prevention. In Azure, the admin creates an Information Protection label called “Confidential –Financial”. Now, from Check Point SmartConsole, the admin defines a policy rule that includes this AIP label. It is that simple and easy to set up. ABC organization is now automatically protected from data loss. Users are automatically prevented from leaking confidential data. For more information on Microsoft Azure Information Protection and Check Point Data Loss Prevention go to checkpoint.com OR Azure.Microsoft.com
Thank you for watching.




Other Videos By Check Point Software


2019-08-07Check Point’s Oded Vanunu Demonstrates Cyber Security Vulnerabilities in WhatsApp
2019-08-07Remote Desktop Protocol Vulnerability Demo – Paste-Only Attack On Hyper-V Windows RDP
2019-08-06Empowering Cloud Security for the Channel
2019-08-05EA Games Vulnerability Leads to Account Breach & Identity Theft
2019-07-26You Asked, Check Point CEO Gil Shwed Answers!
2019-06-12Partner Webinar | New Way to Engage with Customers
2019-06-05Understanding Malware DNA – The Classification of Malware Families
2019-06-05New Cyber Security Vulnerabilities found on a Major IPTV Platform
2019-05-28Check Point SandBlast Agent Protects Against BlueKeep Vulnerability
2019-05-20Check Point Threat Extraction for Web Technology
2019-05-13Check Point Firewall Solutions Integration with Microsoft Azure Information Protection
2019-05-09Cyber Security Vulnerabilities Found in ISPSystem Software
2019-05-09Lightbeam Health Solutions Gains Highly Visible, Agile Cloud Security with Check Point
2019-05-07Learn About Check Point's Channel Business Plans for 2019
2019-05-07Learn About Check Point's Channel Partner Strategy
2019-05-07Check Point Engage | Partner Sales Enablement App
2019-05-07How to Use the Check Point Engage App for Mobile Devices
2019-05-07Check Point Engage | Partner Sales Enablement Application for Mobile Devices
2019-05-05Check Point Presents: Latest Developments in the World of Cryptojacking
2019-05-03Check Point Cyber Security Collaborates with Splunk for Cyber Threat Protection
2019-04-26CloudGuard Dome9 compliance – Easily automate compliance requirements and security best practices



Tags:
Data loss prevention
data leakage prevention
Microsoft Azure
Azure Information protection
Microsoft AIP
Microsoft Information Protection
document security
document classification
network security
next generation firewall
firewall
microsoft
cyber security
2019 cyber security
check point software
firewall security 2019
R80
AIP
azure aip
Microsoft eco-system
Check Point Next Generation Firewall Security Solutions
R80 SamartConsole
cloud security