Tuesday, June 8, 2010

Check Point Security Tour 2010 - Indonesia


Welcome

IT security demands ongoing investment in time and budget. Are you finding it difficult to future proof your security and keep up with the latest threat landscape and attack vectors, without breaking your budget or putting your business at risk? Constantly changing threats and new security challenges have made it harder to keep your business safe. How do you ensure the highest level of security and cut your costs at the same time?

The Check Point Security Tour 2010 is aimed to help you equip you with the necessary information to understand the nature of these threats and the latest security technologies that will help you protect your organization. Come and learn specific strategies to reduce your costs and increase protection for your organisation. At this seminar, you will:

• Understand the latest security threats and trends to lookout for in 2010
• Learn how to develop an intelligent and complete security strategy for your network that gives you the highest level of security protection.
• Learn how the Check Point Security Gateways to allow you to leverage the convenience of Web 2.0 technologies safely and securely with our application control and awareness technology
• Find out how to simplify deployment, eliminate the need to manage multiple security agents and incorporating the strongest, most comprehensive suite of endpoint security components, thus reducing your total cost of ownership.
• Prevent the loss of critical sensitive information and valuable access credentials from being stolen by cyber-criminals.

The Check Point Security Tour 2010 is a must attend event for all IT professionals who are concerned about securing their company’s most valuable asset: information.

Date:
17th June 2010,
Thursday

Time:
8.30am to 1.00pm

Venue:
Ballroom 3, Ground Level
Hotel Mulia Senayan
Jl. Asia Afrika
Jakarta 10270

Agenda:
8.30am to 9.00am

Registration

9.00am to 9.10am
Welcome Address

9.10am to 9.40am
Check Point Security Vision - More, Better and Simpler Security

9.40am to 10.00am
Current Security Threat Conditions

10.00am to 10.20am
Complete IPS Protections

10.20am to 10.40am
Tea Break

10.40am to 11.00am
Putting Your Secure Virtual Workspace Into Your Pocket

11.00am to 11.40am
Optimizing Your Security Performance

11.40am to 12.10pm
Essentials For Unified Endpoint Protection

12.10pm to 12.20pm
Lucky Draw and Prize Giving

For registration:
http://theeventmicrosite.com/checkpoint/register.html

Why Attend

At this event you will learn how to develop a complete security strategy for your network that gives you the highest level of security protection.

• Find out what the latest security threats are and security trends to expect for 2010.
• Find out how you can increase the security performance of your organisation and reduce costs for your organisation.
• Have the perfect combination of proven security technology with unprecedented ease-of-use deployment and centralized management from the console of your choice.
• Ensure that information on your company’s mobile devices like Notebooks, PDAs, smartphones and USBs are only readable by your authenticated users and not hackers.
• Find out how you can protect virtual applications with Best-Of-Class Security, simplify virtual security provisioning and enable unified management of the physical and virtual environment.
• Get the chance to hear from the Check Point’s Overseas Experts who will discuss security technologies that you can implement.
• Walk Away With Our Great Lucky Draw Prizes.
• Answer our Post-Presentation Quizzes and receive a Check Point Gift.
• Register and attend the event and you will receive our Early Bird Gift.

Who Should Attend

Check Point Security Tour 2010 is meant for security practitioners who are responsible for planning, managing or administering information security all the way from the network to the desktop:

• Infosecurity Managers
• CIOs, CTOs, CSOs
• Infosecurity Directors
• Infosecurity Managers
• Network & Systems Managers
• Technical Managers
• Network and Security Engineers
• Technical Engineers
• Desktop Engineers/Desktop Managers
• Security Sales Consultants and Business Development Managers

No comments: