Top U.S. Telecom Provider Secures Network with Check Point Next Generation Firewalls

Subscribers:
79,900
Published on ● Video Link: https://www.youtube.com/watch?v=d9X5Llwwi8w



Duration: 2:45
2,876 views
28


A Top U.S. Telecom company sleeps better at night with Check Point Next Generation Firewalls. For more information visit https://www.checkpoint.com/customer-stories/top-telecom-provider/

Check Point Next Generation Firewalls prevent DDoS attacks and providing real-time alerts for other bad actors trying to access their network.

We’re a large national telecommunications company one of the big four

Transcript

Basically if some things broken in our network it’s my team’s responsibility it fix it as well as well as to look into the future and see what improvements we can make to prevent an outage from happening.

Just a few years ago our role was primarily in the network space. In the last few years it’s been encroaching more and more on security and cybersecurity space. We were seeing an increase in hacking activity an increase of attempted excursions and increase of malware.

First and foremost we’re using Check Point firewalls which are critical to our infrastructure. Additionally we’re using Check Point’s IDS and IPS systems as a complement to those firewalls

We see communication on a level that is I believe a little bit higher than most companies are used to. And therefore coming from a variety of different directions. So we do need that wide array of firewalls to protect all that traffic from affecting us.

We’re using Check Point 21K, 23K, 41K, and 44K
The firewall itself will tell us what is being blocked and what’s being allowed. We have visibility into that with the ease of use of the Check Point firewalls as well as a level of comfort and confidence that making changed to the Check Point firewalls is not going to cause a problem down the line.

You could say that our entire 80 million customer base is affected in one way or another by Check point the fact is that the Check Point firewalls do a fantastic job in protecting the DDoS attacks.

The facts is that Check Point firewalls have notified us in directly or indirectly of intrusion from bad actors trying to access our network.

The most impressive thing about Check Point is the quality of the people that work at Check Point. Their dedication, their knowledge, their absolute commitment to helping their customer at least in my case, I know that without Check Point firm commitment to my company without their involvement without their expertise we
would be in a lot of trouble we wouldn’t be where we are today.

We use Check Point because the products are second to none because the people are outstanding and dedicated to helping their customers and because quite frankly there simply no better value for the money on the market




Other Videos By Check Point Software


2019-09-03Check Point CloudGuard IaaS - Install Management Server
2019-09-03Check Point CloudGuard Network Security - AWS Transit Gateway Introduction
2019-09-03Best Practices for Architecting Hybrid Cloud Security | VMworld 2019 US
2019-09-03Prevent Unknown Cyber Threats with Zero-Day Protection
2019-08-30MTN Nigeria Protects Critical Infrastructure With Check Point Security Solutions
2019-08-30Gimv Secures Critical Investment Data With Check Point CloudGuard SaaS
2019-08-29PGNiG TERMIKA Strengthens Security with Check Point to Protect Energy Supplies
2019-08-28The University of Bergamo Secures Network with Check Point Gateway Security Solutions
2019-08-28Pérez-Llorca Protects Corporate Reputation with Check Point Security Solutions
2019-08-22The 7 Principles of Absolute Zero Trust Security With Check Point Infinity
2019-08-16Top U.S. Telecom Provider Secures Network with Check Point Next Generation Firewalls
2019-08-13A Holistic Approach to Cyber Security Effectiveness | Check Point's CheckMates Nuggets
2019-08-12CPX 360 2020 - Premier Cyber Security Summit & Expo
2019-08-12CPX 360 2020 - Early Bird Savings Now Available for the Premier Cyber Security Summit & Expo
2019-08-11Ransomware on a DSLR Camera | Latest Research from Check Point
2019-08-10Using SQLite Vulnerabilities to Exploit a Password Stealer
2019-08-07Check Point’s Oded Vanunu Demonstrates Cyber Security Vulnerabilities in WhatsApp
2019-08-07Remote Desktop Protocol Vulnerability Demo – Paste-Only Attack On Hyper-V Windows RDP
2019-08-06Empowering Cloud Security for the Channel
2019-08-05EA Games Vulnerability Leads to Account Breach & Identity Theft
2019-07-26You Asked, Check Point CEO Gil Shwed Answers!



Tags:
Telecom company
Check Point Next Generation Firewalls
Check Point
DDoS attacks
DDoS
cybersecurity
IPS systems
Check Point firewall
firewall protection
cyber security
network protection
software security
secure network architecture
Next Generation Firewalls