<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Host IPS in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Host-IPS/m-p/98169#M2659</link>
    <description>&lt;P&gt;Not exactly sure how that would work since code would have to execute code on the host itself to process packets from the network.&lt;BR /&gt;A properly configured desktop firewall (which we do offer) can help limit what is processed by the host.&lt;BR /&gt;Also, if the traffic is encrypted, there's not much to process until the packets are decrypted, where our existing SandBlast Agent protections will help.&lt;/P&gt;</description>
    <pubDate>Mon, 05 Oct 2020 05:48:04 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2020-10-05T05:48:04Z</dc:date>
    <item>
      <title>Host IPS</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Host-IPS/m-p/96958#M2618</link>
      <description>&lt;P&gt;Is adding Host IPS on the roadmap for endpoints? This would be beneficial as another layer to prevent an exploit of the system.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2020 15:06:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Host-IPS/m-p/96958#M2618</guid>
      <dc:creator>JoSec</dc:creator>
      <dc:date>2020-09-17T15:06:59Z</dc:date>
    </item>
    <item>
      <title>Re: Host IPS</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Host-IPS/m-p/97112#M2626</link>
      <description>&lt;P&gt;I would say the entire SandBlast Agent suite functions as a host IPS.&lt;BR /&gt;What precise functionality do you perceive as missing?&lt;/P&gt;</description>
      <pubDate>Sun, 20 Sep 2020 21:41:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Host-IPS/m-p/97112#M2626</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-09-20T21:41:27Z</dc:date>
    </item>
    <item>
      <title>Re: Host IPS</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Host-IPS/m-p/97950#M2653</link>
      <description>&lt;P&gt;The ability to provide prevention at the network layer prior to any code execution on the host itself.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 17:43:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Host-IPS/m-p/97950#M2653</guid>
      <dc:creator>JoSec</dc:creator>
      <dc:date>2020-09-30T17:43:52Z</dc:date>
    </item>
    <item>
      <title>Re: Host IPS</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Host-IPS/m-p/98169#M2659</link>
      <description>&lt;P&gt;Not exactly sure how that would work since code would have to execute code on the host itself to process packets from the network.&lt;BR /&gt;A properly configured desktop firewall (which we do offer) can help limit what is processed by the host.&lt;BR /&gt;Also, if the traffic is encrypted, there's not much to process until the packets are decrypted, where our existing SandBlast Agent protections will help.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2020 05:48:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Host-IPS/m-p/98169#M2659</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-10-05T05:48:04Z</dc:date>
    </item>
    <item>
      <title>Re: Host IPS</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Host-IPS/m-p/139596#M5046</link>
      <description>&lt;P&gt;Would a standalone sandblast agent on a remote laptop outside the corporate network provide CVE specific IPS type protection?&lt;/P&gt;&lt;P&gt;For example, the Log4j IPS on the Security Gateway product:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.checkpoint.com/defense/advisories/public/2021/CPAI-2021-0936.html" target="_blank"&gt;https://www.checkpoint.com/defense/advisories/public/2021/CPAI-2021-0936.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jan 2022 14:57:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Host-IPS/m-p/139596#M5046</guid>
      <dc:creator>IP2</dc:creator>
      <dc:date>2022-01-26T14:57:17Z</dc:date>
    </item>
    <item>
      <title>Re: Host IPS</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Host-IPS/m-p/139636#M5050</link>
      <description>&lt;P&gt;Behavioural protection in prevent mode provides coverage here, stay tuned for some specific compliance enhancements in this regard.&lt;/P&gt;
&lt;P&gt;Otherwise comparative like-to-like gateway protection for roaming users would be the Harmony Connect solution for a layered defense.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jan 2022 22:56:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Host-IPS/m-p/139636#M5050</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-01-26T22:56:00Z</dc:date>
    </item>
  </channel>
</rss>

