Skip navigation
All Places >

Threat Prevention

Log in to follow, share, and participate in this community.

Recent Activity

Gad Naveh
Call for regulations. The mind blowing attraction of bitcoin having no government regulation, the inability of authorities to direct bitcoin by printing more is fascinating and attracting. The opportunity of freeing control of transactions from the current financial institutes, disruptively allowing global economy which is truly market based,…
in Threat Prevention
Esther Hentrich
Hi, we use the IPS Blade functionality at enterprise FW level. We see and inspect client to server traffic in various internal network segments. However we face a huge amount of false positives, especially within the SMB IPS filter category. I wonder how you cope with those false positives? If we block these filters (severity critical) our… (Show more)
in Threat Prevention
Octavian Dragulin
Hi Guys,   Do you know if Checkpoints are affected by Meltdown and Spectre and if so, what is the timeframe for a patch being released?   Regards, Octavian
in Threat Prevention
slobodan milidrag
Dear team,   I need your help to better understand IPS Core protections. I found in documentation: IPS Core protections - These protections are included in the product and are assigned per gateway. They are part of the Access Control policy.   Why is that ?  If IPS Core protections are assigned globally (per gateway), why in Signature I have… (Show more)
in Threat Prevention
Gaurav Pandya
Hi,   In one of the firewall, We are getting error "Error : Communication error - Could not connect to cloud" on Smart vie monitor for Threat Emulation blade. Did cpstop/cpstart and reboot the gateway but still the same issue. When checked details, it is showing as below. What could be the issue?
in Threat Prevention
Tal Eisner
Check Point Earns Highest Security Effectiveness Score | Check Point Software       We are pleased to announce that Check Point achieved NSS Recommended in the recent NSS Labs Breach Prevention System (BPS) test. Using a single consolidated 15600 gateway, Check Point achieved the highest security effectiveness score and the lowest total cost of… (Show more)
in Threat Prevention
Niels van Sluis
Secure Knowledge Solution ID sk107334 says:   "IPS Bypass Under Load mechanism looks at the indiviual core utilization rather than the average core utilization. As a result, spikes in individual core usage may pass the treshold and subsequently trigger the IPS Bypass Under Load mechanism, even if overall CPU utilization is still under the… (Show more)
in Threat Prevention
Dameon Welch Abernathy
This week's top stories: IoT Botnet Exploiting 0day Vulnerability in Huawei Routers Sensitive Customer Data Stolen from Nissan Canada Finance Arrested for Sending Ransomware through Cameras   Download: Threat Intelligence News 2017 12 25  
in Threat Prevention
Dameon Welch Abernathy
In this week's Threat Intelligence Report: Triton Malware Targeting ICS in Middle East, the Starbucks WiFi is serving a cryptominer in Buenos Aries, and the ROBOT attack enables HTTPS Decryption on Facebook and PayPal. All this plus the usual assortment of patches and bugs!   Download: Threat Intelligence News 2017 12 18
in Threat Prevention
Load more items