How To Videos

Yair Herling
Maestro’s architecture is designed to secure networks both large and small, by orchestrating multiple security gateways into one unified security system. It allows our customers to seamlessly increase their security solutions, on the fly with security of Hyperscale – on demand expansion for gateways of all sizes. It brings operational supremacy…
Video preview image▶︎
in "How To..... " Videos
Yair Herling
This video elaborates on Check Point’s new Management as a Service capability of the Endpoint Management (still in EA)   Enjoy
Video preview image▶︎
in "How To..... " Videos
Yair Herling
This video elaborates on one the most important aspects of the Check Point Infinity architecture which is the dynamic, unified characteristics of a policy. legacy Static policy means ticketing, many install policy operations and inherent discrepancies within the policy will ruin our operational efficiency. However, by solving these challenges…
Video preview image▶︎
in "How To..... " Videos
Yair Herling
At Check Point, we believe that security needs to support these dynamic environments and bring DevOps and Security Together for Better and Safer Business Outcomes.   That is why we support many automation and ease of use capabilities.   For example, for Fast Deployments, You can do single-click deployments of CloudGuard from the AWS, Azure, and…
Video preview image▶︎
in "How To..... " Videos
Yair Herling
This video elaborates on Check Point’s new log analytics in SmartView. One of the challenges related to threats analyses is the ability to digest a large quantity of logs related to security incidents.   Our second challenge is a more common approach taken by leading vendors i.e. generating a security event only by the technology that…
Video preview image▶︎
in "How To..... " Videos
Yair Herling
Leverage artificial intelligence to stop sophisticated phishing attacks, spear-phishing, and email spoofing on Office365 and Gmail.
Video preview image▶︎
in "How To..... " Videos
Yair Herling
Eliminate the biggest SaaS threat: Prevent account takeovers with transparent, strong authentication.
Video preview image▶︎
in "How To..... " Videos
Yair Herling
Protect email attachments and file downloads on Office365, Gmail, Box, OneDrive, and more. CloudGuard SaaS provides market-leading breach prevention that stops zero-day attacks before they reach SaaS users. Our Zero-Day Threat Protection leverages Check Point’s renowned SandBlast technology that scored 100% block rate and highest in evasion…
Video preview image▶︎
in "How To..... " Videos
Yair Herling
Gain instant visibility into threats and discover unsanctioned use of SaaS applications with CloudGuard SaaS
Video preview image▶︎
in "How To..... " Videos
Dameon Welch-Abernathy
Deployment options of MSI Endpoint Packages using deployment software such as Microsoft Deployment Toolkit Build 8450. 
Yair Herling
This video elaborate on Check Point's R80.20 log exporter feature, introducing an easy and secure method for exporting Check Point logs to 3rd party SIEM applications, using various protocols (like TCP or UDP) and formats (like syslog, CEF, or LEEF)
Video preview image▶︎
in "How To..... " Videos
Bob Bent
In this video we will be describing the Anti-Phishing capabilities of SandBlast Mobile 3.0, including an overview of the On-device Network Protection technology, SandBlast Mobile Dashboard configuration, and a demo of the Anti-Phishing protection in action on Android and iOS devices. ONP enhances SandBlast Mobile's advanced mobile threat… (Show more)
4519b98b-1748-4a38-a30a-c526e3e78b1e
Hello folks there, i have tracked the forum hoping to find answer to my needs by i could not find any topic related to my concern. may be one can help. My project :   I'm responsible of a project which purpose is to migrate the management of 21 security gateways managed locally to a centralized location within a an existing mds environment. … (Show more)
in Management
Load more items