Moti Sagey may be the Mind of Proper Marketing & Intelligence at Check Point Software. Moti accounts for strategically transforming intelligence and knowledge right into a compelling and resonating story, enabling Check Indicate provide its customers with disruptive technologies which are a measure in front of threats and competitors.
José María San José may be the CTO and CIO for X by Orange-a subsidiary of Orange The country. We swept up with him to listen to how X by Orange is facilitating use of digital services for clients across The country and also the role that Check Point CloudGuard IaaS plays in the new cloud security services.
The Orange Group is really a world leader in corporate telecommunications services, and among the largest operators of mobile and internet services in Europe and Africa. X by Orange may be the branded trademark of Orange Business to business Technology, a subsidiary of Orange The country. Created promote the development of medium and small companies, it uses the cloud to change and digitize communications.
What were your needs for cloud security?
I was developing two new items for SMB clients, X-Privacy and X-Security. We wanted a cloud security solution yet another easy meal to handle and may instantly safeguard clients’ corporate data from known and unknown cyber threats without requiring around-the- clock hands-on management. We needed excellent support in the vendor across The country.
Which Check Point solutions would you use?
We depend on Check Point CloudGuard for AWS within our X-Security service. It analyzes and filters all internet traffic across all sites and makes certain that all communications are encrypted, authenticated, and guarded through cloud firewalls. Real-time sandboxing and cloud-based threat intelligence prevent threats from reaching clients and affecting their operations.
We use Check Point ZoneAlarm for the X-Protection service, which protects clients’ devices. X-Protection provides anti-virus and anti-ransomware abilities as well as an advanced mobile protection module for android and ios cellular devices.
Why have you choose Check Point?
Check Point passed a very competitive buying process. We examined the marketplace to narrow lower the competitors after which assessed several vendors against strict criteria, including the amount of features as well as their degree of security sophistication. Check Point delivered everything we wanted-robust security defenses along with easy implementation and management-to construct into our services.
Our customers are now positive about their protection plus they don’t need to bother about the safety features, connectivity or threat activity. The answer provides real-time prevention and also the services will always be current with emerging threats. Dealing with Check Point continues to be answer to our success using the services. Check Point continues to be dedicated to the work in the start, and every one of us in the market understand how essential that is.






