Presentation Script

You might also like

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 2

Script and Flow of Presentation

1. Introduction of myself
-Good morning sirs, sir AJ, sir James, sir John, co intern I would like to
introduce myself first, I am Rolando Baruga

(Optional) 1.1 Explaining the use case scenario


-There's this bank company where in they have experiance a
phishing attack,

2. These is Check Point infinity architecture also known as the 4 pillars of


security
Infinity architecture is THE DEFINITION OF “COMPREHENSIVE”, with BEST
SECURITY FOR:
-The in and out traffic of your networks
-For your Cloud foorprints and services
-and lastly for your users, applications and access

-In here you need to discuss all types of solution of check points infinity
structure such as
-CloudGuard
-Posture Management
-Intelligence
-Workload
-Network
-Quantum
-Security Gateway
-Maestro
-Lightspeed
-R81 secure OS
-SMB
-Rugged
-IoT protect
-Smart 1 cloud
-Harmony
-Connect (SASE)
-Email & Collaboration
-Endpoint and Mobile

3. Dig deeper about infinity archutecture


-Quantum for (Securing your network)
-
-CloudGuard for (Securing the cloud)
Platform when it comes to cloud we have:
-Dropbox
-Microsoft
-Google
-Amazon
-Apple
-Harmony for (Securing the users & access)
-Office 360
-Google
-Outlook
-Mail.com

2.

3.

4.

You might also like