- CheckMates
- :
- Products
- :
- General Topics
- :
- Vulnerabilities in checkpoint - doing an inventory...
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Vulnerabilities in checkpoint - doing an inventory of protection
Hello!
I am doing an inventory of protection for a company and would like an insight into what kind of vulnerabilities there are, hardware and software vulnerabilities in the checkpoint firewall.
I know so far that Checkpoint is one of the top, if not the top brand, compared to the competitors.
With that in mind, what are the strengths and weaknesses of checkpoint firewalls? What vulnerabilities are likely to get through, get exploited, or what doesn't it protect against?
I appreciate all the help I can get!
Best regards,
CS
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
First, Check Point is two words 🙂
AFAIK, there are no active known security issues with Check Point as of today, all previously found issues are properly addressed.
Concerning the log term competitive stance, you do want to see the slides and the video recording by VP of Strategic Marketing @Moti Sagey, from CPX 360 2022 keynotes session.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I would also suggest looking at the comparison between Check Point and other vendors, including the area of vulnerabilities:
https://www.checkpoint.com/comparison/