Trofi Security Identifies True Network Threats with Infinity SOC for the U.S. Holocaust Museum

Subscribers:
79,800
Published on ● Video Link: https://www.youtube.com/watch?v=EJx5hDt3ce4



Duration: 1:56
383 views
3


Trofi Security provides cyber security services to organizations. One of their main customers is the U.S. Holocaust Memorial Museum, which has the world’s largest collection of Holocaust artifacts. In this video the museum’s acting CISO explains how he uses Infinity SOC and what benefits it has brought him.

To keep the museum safe at all times, Trofi is always looking to be on the leading edge. Trofi adopted Infinity SOC for early detection of network threats using the products AI and machine learning capabilities.




Other Videos By Check Point Software


2022-06-13Episode 9: Block internet access to a client on Quantum Spark 1590 SMB Firewall + URL Filtering
2022-06-10Do more on Microsoft Azure with Check Point CloudGuard
2022-06-09Episode 8: Getting Started with Check Point Quantum Spark 1800; Unboxing + 1st time wizard
2022-06-06Demo of CloudGuard Network-Security as a Service on AWS, the Story of Eddie FitDevOps
2022-06-06Episode 7: Check Point Quantum Spark 1800 Firewall - Unboxing (SMB Firewall)
2022-06-02Episode 6: First look at the Check Point Quantum Spark 1600 Firewall
2022-06-02Protecting against 'Follina' zero-day vulnerability
2022-05-31Episode 5: Check Point Quantum Spark 1590 Site to Site VPN with Ubiquiti UDM Pro
2022-05-26Episode 4: Check Point Remote Access VPN Setup and Configuration for Quantum Spark 1590 SMB Firewall
2022-05-25Grupo Telvista Virtualizes Security Increasing Reliability, Protection, and Performance
2022-05-25Trofi Security Identifies True Network Threats with Infinity SOC for the U.S. Holocaust Museum
2022-05-24WannaCry Ransomversary
2022-05-23Ask Me Anything - CYBER SECURITY
2022-05-20Se2 Improves Security Posture with CloudGuard
2022-05-19How to Redeem Your Check Point Cyber-security Learning Credits
2022-05-19Check Point Harmony Mobile is integrated with Knox Agent
2022-05-19Episode 3: How to use Check Point Zero Touch with Quantum Spark SMB appliance
2022-05-18Episode 2: Setting up a Check Point 1590 Quantum Spark SMB Firewall
2022-05-18Harmony Mobile 4.0: On-Device File Protection
2022-05-18Check Point Harmony Mobile protects against ALHACK vulnerability
2022-05-18#ALHACK: Check Point Research: Largest Mobile Chipset Manufacturers Use Vulnerable Audio Decoders



Tags:
cyber security
customer success
check point software technologies
customer case study