In this video we will be describing the Anti-Phishing capabilities of SandBlast Mobile 3.0, including an overview of the On-device Network Protection technology, SandBlast Mobile Dashboard configuration, and a demo of the Anti-Phishing protection in action on Android and iOS devices. ONP enhances SandBlast Mobile's advanced mobile threat… Show more
Hello folks there, i have tracked the forum hoping to find answer to my needs by i could not find any topic related to my concern. may be one can help. My project : I'm responsible of a project which purpose is to migrate the management of 21 security gateways managed locally to a centralized location within a an existing mds environment. … Show more
Quick video showing how to connect a SMB appliance to the Security Management Portal.
How to change the SSL-VPN port on a locally managed SMB Appliance
Nice example of one use case where changing an advanced setting may be more widely used. If our readers want to see a nice comprehensive overview of Advanced Settings in the Small Business appliances, Günther W. Albrecht has done a wonderful job in his community discussion: SMB GWs Advanced Settings .
A short video showing how to easily generate and add a 30 day evaluation license to a Small Business Security Appliance.
R80.20, our latest release, offer various improvement to both security management gateways. One of them is the ability to open several SmartConsole sessions in parallel and thus switch between tasks seamlessly.
In this episode, we elaborate on SandBlast Mobile architecture and the Protect app, Check Point’s light-weight app installed on your Android or iOS mobile device. Many thanks to Pamela S. Lee for letting me lightboard this great session. Enjoy Yair
This video elaborate on Check Point's R80.20 log exporter feature, introducing an easy and secure method for exporting Check Point logs to 3rd party SIEM applications, using various protocols (like TCP or UDP) and formats (like syslog, CEF, or LEEF)
Load more items
When we think about cloud deployments we have 2 relevant parties: the cloud platform and you the customer. While public cloud providers deliver strong security controls to protect the cloud fabric, they have no knowledge of “normal” customer traffic and thus are unable to determine malicious content from benign. This is the reason why they choose…