Telco Giant, ARSAT, Migrates to Advanced New Security Platform with Speed and Ease

Subscribers:
79,900
Published on ● Video Link: https://www.youtube.com/watch?v=zFLzpN8kCXk



Duration: 2:07
835 views
11


The leading telco in Argentina, ARSAT, chose Check Point as its new advanced security platform for its complex infrastructure. With 60 systems to upgrade, the migration seemed daunting, but Check Point R80 Smart Move API made it easy. Each system was migrated in just 30 minutes.

Transcript:
Tech system is one of the biggest Check point partners in Argentina.

Well this customer is ARSSAT which is one of the biggest ISP and data center companies in Argentina.

Thing is that they have these Cisco appliances that have really serious performance issues.

it feels old and it’s really hard to manage.
The challenge was to migrate those 60 virtual systems, which is a really big
Deployment, to Check Point without impacting production.

We wanted to have a proper threat prevention solution.

We wanted to have unified management.

They are using two data center appliances.

SandBlast network runs on the gateway.
The customer is using it’s, of course, access policy which is the firewall, IPS, antibot, antivirus.

The main value, main value of these blades is that they prevent even Gen 5 attacks.

Check Point API was critical for
these projects and we leverage the whole API and created custom tools together with Check Point made tools to migrate all the rule base.

We managed to migrate each system within 33 minutes which is a really amazing undertaking.

We do this by using Check Point SmartMove tool to migrate all the rules from Cisco to Check Point and then we created a custom solution for this customer to translate all the interfaces and routes to Check to VSX.

If we didn’t have the API this migration would take 27 hours per virtual system and we have 60 so that’s a lot of time.

I think that the star here is the Check Point API which is really strong in R 80.

So one of the main benefits that we achieved after migrating to R80 is we have a holistic view of all the Check Point deployments and we can
correlate logs more easily.

Holistic view of threat landscape




Other Videos By Check Point Software


2020-11-23Part #1: Cyber Threats to the Remote Workforce in 2020
2020-11-23Check Point's Itai Greenberg on the New Security Log Analytics Service Using Azure Data Explorer
2020-11-20HashiCorp Consul Integration Overview
2020-11-19HashiCorp Consul Integration – Setup and Demo
2020-11-17ShiftLeft – Cloud Native Security in CICD Pipelines
2020-11-16Visibility in the Cloud
2020-11-16A Quick Intro to Visibility in the Cloud
2020-11-09Protecting Against CVE-2020-17087 Security Vulnerability (Now Escalates to Critical Cyber Threat)
2020-11-06Threat Hunting in the Cloud
2020-11-06A Quick Intro to Threat Hunting in the Cloud
2020-11-05Telco Giant, ARSAT, Migrates to Advanced New Security Platform with Speed and Ease
2020-11-04How Secure is Your Organization with Mobile UEM Containers?
2020-11-04Office of the CTO – Global Activities
2020-11-04SandBlast Web Product Tour
2020-11-02NHS Scotland Ensures Security of Vital Health Data With Check Point
2020-11-02Introduction to Infinity Total Protection Customer Success
2020-11-02איומים ודרכי התגוננות מהסכנות האורבות לנו בטלפונים הניידים, איציק דביר, צ'ק פוינט
2020-11-02הסכנות בשימוש באפליקציות ואתרים ברשת ודרכי התגוננות, עודד ואנונו, ראש מחקר חולשות מוצרים, צ'ק פוינט
2020-11-02איך כדאי להגיב במקרה של התקפת סייבר ואירועי כופר בזמן אמת, יניב בלמס, ראש מחקר סייבר, צ'ק פוינט
2020-11-02איך ממשיכים לעבוד מהבית/מרחוק ונשארים בטוחים, ג'וני פיישביין, מנהל מערכות המידע, צ'ק פוינט
2020-10-29How to Integrate CloudGuard CSPM into AWS Security Hub