August 28, 2018. Podcasts Security Author: David Fearne, Richard Holmes

Arrow Bandwidth Security Series with Check Point | The Evolution of Security

Welcome to Arrow Bandwidth, the podcast from Arrow ECS to help the channel better understand the trends, technologies, and concepts facing the IT industry today #ArrowBandwidth 

If you have any questions about what you hear in our podcasts or would just like to join the conversation, tweet us using #ArrowBandwidth and @ArrowECS_UK. Prefer to email? Get in touch here.

 

Arrow Bandwidth Security Series with Check Point | The Evolution of Security

We continue the Security Series with another one of our guests at Infosec. David Fearne and Richard Holmes sit down with Gad Naveh from the Advanced Threat Protection team at Check Point.

In this episode the team discuss 5th Generation cyber attacks and the evolution that Check Point has seen in the security landscape.

Thanks for listening.  

 

Hosts:

David Fearne, Arrow Global Practice Leader - Data Intelligence @davidfearne 

Richard Holmes, Arrow Business Development Director for IoT @_Rich_Holmes

Guest:

Gad Naveh, Advanced Threat Prevention Evangelist at Check Point @Gadi_Naveh

 

   

Listen to the podcast on iTunes or SoundCloud

 

What did you think about today's podcast? We'd love to hear from you in the comments.

If you have any questions or topics you’d like to hear David and Rich talk about, please let us know below or over on @ArrowECS_UK.

 

Related Posts

  • Arrow Bandwidth Security Series with F5 | How to Succeed in a Multi-Cloud World

    In this episode David MacLean and Paul Dignan from F5 are talking about how to succeed in a multi-cloud world.

    > More

  • Gain Some IQ on AI

    This week, Ruairi McBride discusses the exciting new partnership between NetApp and NVIDIA and the development of AI in the tech giant.

    > More

  • Arrow Bandwidth S4 Episode 12 | Deep Dive Into Deep Secure

    In this podcast David sits down with Nathan Gilks from Deep Secure and talks about how vulnerable we can be just receiving attachments and the solutions Deep Secure offer.

    > More

Blog Updates

Popular Posts

Challenges and Solutions for Managed Services Providers in IoT

> More

VMC NetApp Storage

> More

Dell Technologies World - "Make it Real"

> More

Dell Technologies World 2018 – Maria’s Diary

> More

Being a Disruptor in the Market

> More

Blog Archive