Recorded Webinar
Best Practices to Build a Secure Cloud Deployment
Is your cloud migration strategy secure? There are many important security principles to consider and understand when migrating to Azure, including Cloud Network Security, Cloud Compliance, and Data Security.
Check Point CloudGuard IaaS for Azure enables customers to confidently extend security to their Azure cloud infrastructure with the full range of protections of the Check Point threat prevention architecture. CloudGuard IaaS for Azure prevents network attacks and data breaches while enabling secure connectivity to Azure public cloud environments including those built on software-defined data center technology.
Key Takeaways
- How to move and secure a cloud environment
- Checkpoints cloud security blueprint
- Common use cases
Meet the Speakers

Greg Pepper
CHECK POINT
Greg Pepper has been an IT professional for 20+ years with expertise in Security, Networking & Cloud Computing. Initially working for Sony Online Entertainment, Price Waterhouse Coopers & Organic. Greg has spent the last 15 years working for Cisco & Check Point helping customers to design, plan and implement secure networks throughout the Internet Edge, Campus Backbone, Data Center and Cloud Environments.

Steve Combs
NETRIX
Steve Combs has over twenty years of network integration and professional field service support before joining Netrix in 2018. His experience in data center design and implementation crosses over inter-networking, storage solutions, and high-density compute solutions, including HP, DellEMC, Cisco, VMWare, and Microsoft Hyper-V. Over the last five years, Steve has worked extensively with mid-size and large legal practices. He has a deep understanding of the software landscape and its unique data and computes needs. Overall, Steve has worked with large data centers of multi-national companies to smaller regional data centers, including architecture, design, and maintenance. He has been involved in data center migrations (moves), interconnectivity, and disaster recovery setups.

Jakob Maciolek
MICROSOFT