- Products
- Learn
- Local User Groups
- Partners
- More
CheckMates Fifth Birthday
Celebrate with Us!
days
hours
minutes
seconds
Join the CHECKMATES Everywhere Competition
Submit your picture to win!
Harmony Mobile 4:
New Version, New Capabilities
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
CheckFlix!
All Videos In One Space
they were asking if we can block requests at the checkpoint r80.10. The suggestion was to use the Application Control. An example of a malicious request is "www[.]example[.]com/wp/wp-login[/]php.
You can block with App Control, but you can also do it with Threat Prevention.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY