- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Join us for the highly anticipated third episode of the "No Suits, No Ties" series! If there is one incident type that many IT Administrators and those performing security roles have to investigate routinely it is phishing.
The security tools and controls for detecting and preventing phishing are leveraging AI and becoming better and more effective at stopping these threats before they make it to end users.
Due to this attackers need to constantly evolve their techniques to avoid detection and improve the chances of their crafted email messages getting through to the intended victims and getting them to interact.
In a recent case investigated by CPIRT we encountered a novel approach to bypassing common phishing controls. In this session, we will examine a spear phishing case involving third party compromise and using the third party tenant to exploit trust.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY