How to Manage Permissions with Cloud Infrastructure and Entitlement Management

Logo
Presented by

Alfred Trevino, Cloud Technical Marketing Manager

About this talk

In this webinar we will see how using CIEM helps customers move closer to zero trust for permissions which in turn makes a much more secure environment. Here’s what we will discuss during this webinar: • Explanation of the core components of CIEM. • Using the IAM analyzer to identify overly permissive roles and users. • See how CloudGuard uses contextual logging to determine when cloud identities are at risk. • Identifying configuration checks and real-time exposure of incidents as they happen through audit logs.
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (364)
Subscribers (55555)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.