<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PARTICULARITIES OF CHECKPOINT'S NGTX AND THE OTHER PROVIDERS    in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/PARTICULARITIES-OF-CHECKPOINT-S-NGTX-AND-THE-OTHER-PROVIDERS/m-p/32396#M13649</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Proxies are generally less efficient, though in some environments they are required.&lt;/P&gt;&lt;P&gt;This might be a better discussion to have with someone in your local Check Point office or reseller.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SandBlast can prevent in real-time the first time it sees something.&lt;/P&gt;&lt;P&gt;Does Fortinet do this? I would encourage you to read their product documentation carefully.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other Check Point gateways are immediately informed when one instance of SandBlast sees a malicious file so other gateways can block it.&lt;/P&gt;&lt;P&gt;For other non Check Point gateways, you could probably pull the necessary data out of the logs to have other gateways block on it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Why Check Point, I would offer the following&amp;nbsp;(slightly older but the basic points are still valid):&amp;nbsp;&lt;A class="link-titled" href="https://www.slideshare.net/mobile/MotiSagey/why-check-point-the-four-points-90039443" title="https://www.slideshare.net/mobile/MotiSagey/why-check-point-the-four-points-90039443"&gt;WHY CHECK POINT – THE FOUR POINTS&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 Feb 2019 05:42:30 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-02-13T05:42:30Z</dc:date>
    <item>
      <title>PARTICULARITIES OF CHECKPOINT'S NGTX AND THE OTHER PROVIDERS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/PARTICULARITIES-OF-CHECKPOINT-S-NGTX-AND-THE-OTHER-PROVIDERS/m-p/32394#M13647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Dear,&lt;/P&gt;&lt;P&gt;I am newcomer to Checkpoint solutions but I always knew they were the best in the field of Firewall.&lt;/P&gt;&lt;P&gt;My employer had a market in a bank which also its first market with the solution of Checkpoint and what made it possible to have this market is especially its "SandBlast" Blades Extraction &amp;amp; Emulation. But this has left grievances, discontent with the old provider of this bank that already provides FORTIGATE solutions.&lt;/P&gt;&lt;P&gt;We will have a big meeting with this client and the other suppliers&amp;nbsp;; providers like FORTIGATE. So let me ask you a few questions to be ready to convince, reassure the customer again to have chosen Checkpoint as Firewall solution:&lt;/P&gt;&lt;P&gt;1- You will see attached a type of topology for a transitional phase where the Appliance is in the local network to be like a proxy&lt;/P&gt;&lt;P&gt;a-What are the advantages and disadvantages of this architecture.&lt;/P&gt;&lt;P&gt;b-The good practices of this architecture to allow the solution to be efficient.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2- What are the main particularities and the differences between of Checkpoint's SandBlast and other SandBoxing like Forti Sandbox (Fortinet)&lt;/P&gt;&lt;P&gt;3- Is It possible for the Checkpoint NGTX to inform other security equipment of the signature of detected malware? If &lt;STRONG&gt;YES&lt;/STRONG&gt; how and if &lt;STRONG&gt;NO&lt;/STRONG&gt; how to solve this problem?&lt;/P&gt;&lt;P&gt;4- To finish according to you why choose CheckPoint?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am very grateful for the help you will give me and your answers will allow me to also reassure myself of the CheckPoint solutions because I am a pure product of Cisco.&lt;/P&gt;&lt;P&gt;Thanks to you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yanick DJINZOU&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Feb 2019 09:29:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/PARTICULARITIES-OF-CHECKPOINT-S-NGTX-AND-THE-OTHER-PROVIDERS/m-p/32394#M13647</guid>
      <dc:creator>Yanick_DJINZOU</dc:creator>
      <dc:date>2019-02-12T09:29:25Z</dc:date>
    </item>
    <item>
      <title>Re: PARTICULARITIES OF CHECKPOINT'S NGTX AND THE OTHER PROVIDERS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/PARTICULARITIES-OF-CHECKPOINT-S-NGTX-AND-THE-OTHER-PROVIDERS/m-p/32395#M13648</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Moderation note:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please avoid multiple posting into different section.&amp;nbsp;&lt;/P&gt;&lt;P&gt;You second post is now deleted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your understanding&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Feb 2019 10:33:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/PARTICULARITIES-OF-CHECKPOINT-S-NGTX-AND-THE-OTHER-PROVIDERS/m-p/32395#M13648</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-02-12T10:33:37Z</dc:date>
    </item>
    <item>
      <title>Re: PARTICULARITIES OF CHECKPOINT'S NGTX AND THE OTHER PROVIDERS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/PARTICULARITIES-OF-CHECKPOINT-S-NGTX-AND-THE-OTHER-PROVIDERS/m-p/32396#M13649</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Proxies are generally less efficient, though in some environments they are required.&lt;/P&gt;&lt;P&gt;This might be a better discussion to have with someone in your local Check Point office or reseller.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SandBlast can prevent in real-time the first time it sees something.&lt;/P&gt;&lt;P&gt;Does Fortinet do this? I would encourage you to read their product documentation carefully.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other Check Point gateways are immediately informed when one instance of SandBlast sees a malicious file so other gateways can block it.&lt;/P&gt;&lt;P&gt;For other non Check Point gateways, you could probably pull the necessary data out of the logs to have other gateways block on it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Why Check Point, I would offer the following&amp;nbsp;(slightly older but the basic points are still valid):&amp;nbsp;&lt;A class="link-titled" href="https://www.slideshare.net/mobile/MotiSagey/why-check-point-the-four-points-90039443" title="https://www.slideshare.net/mobile/MotiSagey/why-check-point-the-four-points-90039443"&gt;WHY CHECK POINT – THE FOUR POINTS&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2019 05:42:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/PARTICULARITIES-OF-CHECKPOINT-S-NGTX-AND-THE-OTHER-PROVIDERS/m-p/32396#M13649</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-02-13T05:42:30Z</dc:date>
    </item>
  </channel>
</rss>

