I was one of the lucky delegates from the UK to attend Check Point’s annual European Sales Kick Off (SKO) 2016 last week to get One Step Ahead!
This year’s SKO was held in the beautiful city of Barcelona, Spain; there were some exciting announcements made last week, but all 1,518 European delegates were sworn to secrecy, until the final APAC SKO, that is held in Macau, China in February 2016.
However, you won’t need to wait long until Check Point make those announcements. The Americas’ SKO team will find out this week and they will be sworn to the same secrecy pact that all the European delegates made last week. So…keep eyes peeled on social media, or my Twitter feed, around 3rd February 2016!
The key messages this year were:
That ‘You Must Be One Step Ahead’ and I have to agree, that is what Check Point Software Technologies does best, when it comes to network security.
Block attacks before they happen;
Defend with advanced tools that stop today’s and tomorrow’s threats;
Protect every frontier – from mobile to cloud;
Block attacks that others cannot.
My key takeaway this year is collaboration – share your ideas, work together, work smarter and trust your neighbour. I never thought I would be saying the latter, but I really do think it’s possible to work with a competing reseller if you have the right mind-set and the common goal to deliver world-class network security solutions.
So what else was good about the European SKO2016. The amazing Spanish tapas, and hooking up with Check Point UK and EMEA teams.
This week, it’s back the grindstone and making it another successful year working with Check Point Software Technologies.
If you would like to learn more about Check Point solutions and products, please contact a member of the Atomos Networks’ technical sales team on 0113 323 7722 or email sales@atomosnetworks.com
You can also follow Check Point via:
Check Point Blog: http://blog.checkpoint.com/
Twitter: http://www.twitter.com/checkpointsw
Facebook: http://www.facebook.com/checkpointsoftware
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies
YouTube: http://www.youtube.com/user/CPGlobal
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes. At Check Point, we secure the future.
IT Equipment Removal
Our office move team will dovetail all activity with your own plans - ensuring that your network is running right up to the last minute; providing interim network services wherever possible. We ensure that all works are carried out efficiently and painlessly - stripping all reusable network equipment before reinstalling it in your new space. We believe in equipment sustainability wherever possible. As such, we carefully consider what equipment is still fit for purpose within your new network environment - managing the heavy lifting element to this part of the office move process.
PSTN Connectivity
We can connect your telephony platform to a telephony provider using either traditional services or newer resilient SIP trunks. As with all Atomos work, we begin with a site visit and analysis of what’s available, making recommendations that suit your budget at the same time as highlighting the benefits and limitations of each recommendation.
Analysis
Protecting your network from cyberthreats may seem completely obvious in this day and age. However, it's all too easy to assume that you have the right level of network security, when in fact you do not. This is why we always begin with a thorough assessment, providing a full audit of your existing cyberthreat measures. We then deifne the network areas, servers - and of course individual users that need protection - and at what level.
Protection and Management
The scoping document includes a breakdown of circuits such as DSL, EFM and leased line. A full breakdown of costs is included as well as an SLA covering each area. Importantly, we also highlight any potential limitations caused by bandwidth and/or QoS.

