cancel
Showing results for 
Search instead for 
Did you mean: 
Post a Question
Jason_Smith2
inside How-To Videos 2019-04-17
views 1397
Employee

Use of Private ThreatCloud behind Load Balancer

I recently had a POC where we were required to demonstrate an HA configuration of the Private ThreatCloud in which traffic and failover was controlled by a pair of load balancers. In this POC, the requirement was that devices in a specific site should only talk with the PTC within their site unless it went down then the load balancer would redirect the PTC requests to a PTC in a different site. I wanted to share a video that highlights the configuration and performs a couple of tests of adding gateways to the PTC in addition to simulating a failover. LITHIUM.OoyalaPlayer.addVideo('https:\/\/player.ooyala.com\/static\/v4\/production\/', 'lia-vid-o3ZTNuaDE6r38XtgsECfco7oKFi_irwTw1600h867r160', 'o3ZTNuaDE6r38XtgsECfco7oKFi_irwT', {"pcode":"kxN24yOtRYkiJthl3FdL1eXcRmh_","playerBrandingId":"ODI0MmQ3NjNhYWVjODliZTgzY2ZkMDdi","width":"1600px","height":"867px"});(view in My Videos)
Yair_Herling
inside How-To Videos 2019-04-11
views 845 1 21
Employee+

LightBoard Series - Maestro - Security of hyperscale (technical deep dive)

Maestro’s architecture is designed to secure networks both large and small, by orchestrating multiple security gateways into one unified security system. It allows our customers to seamlessly increase their security solutions, on the fly with security of Hyperscale – on demand expansion for gateways of all sizes. It brings operational supremacy with new options for organizations to architect and manage their cyber security platforms, But what's really exciting is the Cloud-level resiliency, This is the only unified security system that is reliable, super resilient and cost-efficient. Something that up until now was only available to telco’s and very institutions – but at Check Point we never stop innovating and we now are bringing Hyperscale network security to you!
Yair_Herling
inside How-To Videos 2019-03-17
views 2389 4 8
Employee+

R80.20 Identity Tags and Updatable Objects

This video elaborates on one the most important aspects of the Check Point Infinity architecture which is the dynamic, unified characteristics of a policy.legacy Static policy means ticketing, many install policy operations and inherent discrepancies within the policy will ruin our operational efficiency.However, by solving these challenges with a Dynamic approach – the security operations engineers only need to design a single policy rule for each scenario that will seamlessly control all operational aspects of an enterprise, while keeping access changes strict, yet adaptive. Enjoy
Yair_Herling
inside How-To Videos 2019-01-24
views 2353 4 10
Employee+

Endpoint Management as a Service Overview (EA Release)

This video elaborates on Check Point’s new Management as a Service capability of the Endpoint Management (still in EA)Enjoy
Yair_Herling
inside How-To Videos 2019-01-07
views 1821 2
Employee+

CloudGuard Deployment and Agile Capabilities

At Check Point, we believe that security needs to support these dynamic environments and bring DevOps and Security Together for Better and Safer Business Outcomes. That is why we support many automation and ease of use capabilities. For example, for Fast Deployments, You can do single-click deployments of CloudGuard from the AWS,Azure, and Google Cloud Marketplaces, Use our library of automated AWS CloudFormation templatesand Azure ARM template to simplify the deployment of various configurations such as Security Management Servers,single CloudGuard gateways, clusters, and scale sets. Or use our Quick Start to deploy an Auto Scaling group of CloudGuard Security Gateways to protect a web service. All of these tools will help you to quickly get started with Check Point CloudGuard.
Yair_Herling
inside How-To Videos 2019-01-07
views 1678 6
Employee+

Check Point Infinity Talks: R80.20 log enhancements

This video elaborates on Check Point’s new log analytics in SmartView. One of the challenges related to threats analyses is the ability to digest a large quantity of logs related to security incidents. Our second challenge is a more common approach taken by leading vendors i.e. generating a security event only by the technology that identifies and handles the threats. Check Point’s SmartView is addressing these challenges with an advanced aggregation technology and a rich granular visualization of the data. This new capability is changing the focus from a blade-centric approach into an attack-vector approach. Enjoy
Yair_Herling
inside How-To Videos 2019-01-01
views 1777 1
Employee+

CloudGuard SaaS Phishing Protection - Demo Snippet

Leverage artificial intelligence to stop sophisticated phishing attacks, spear-phishing, and email spoofing on Office365 and Gmail.
Yair_Herling
inside How-To Videos 2019-01-01
views 1708 4
Employee+

CloudGuard SaaS Identity Protection - Demo Snippet

Eliminate the biggest SaaS threat: Prevent account takeovers with transparent, strong authentication.
Yair_Herling
inside How-To Videos 2019-01-01
views 1681 1
Employee+

CloudGuard SaaS Zero-Day Threat Protection - Demo Snippet

Protect email attachments and file downloads on Office365, Gmail, Box, OneDrive, and more. CloudGuard SaaS provides market-leading breach prevention that stops zero-day attacks before they reach SaaS users. Our Zero-Day Threat Protection leverages Check Point’s renowned SandBlast technology that scored 100% block rate and highest in evasion testing with NSS Labs. It uses evasion resistant CPU-level sandbox to block malware and zero-day threats and sanitizes files to deliver users safe content in seconds.
Yair_Herling
inside How-To Videos 2019-01-01
views 1564 3
Employee+

CloudGuard SaaS Shadow IT Discovery - Demo Snippet

Gain instant visibility into threats and discover unsanctioned use of SaaS applications with CloudGuard SaaS
Yair_Herling
inside How-To Videos 2018-12-14
views 56277 5 4
Employee+

R80.20 Log Exporter Feature

This video elaborate on Check Point's R80.20 log exporter feature, introducing an easy and secure method for exporting Check Point logs to 3rd party SIEM applications, using various protocols (like TCP or UDP) and formats (like syslog, CEF, or LEEF)
Sunny_Gill
inside How-To Videos 2018-09-11
views 49830 3 14
Employee+

How to connect a SMB appliance to the Security Management Portal

Quick video showing how to connect a SMB appliance to the Security Management Portal.
Sunny_Gill
inside How-To Videos 2018-09-07
views 52413 2 8
Employee+

How to change the SSL-VPN port on a locally managed SMB Appliance

How to change the SSL-VPN port on a locally managed SMB Appliance
Sunny_Gill
inside How-To Videos 2018-09-04
views 48562 2 13
Employee+

How to add a 30 day evaluation license to a SMB appliance

A short video showing how to easily generate and add a 30 day evaluation license to a Small Business Security Appliance.
Yair_Herling
inside How-To Videos 2018-09-02
views 49327 5 15
Employee+

R80.20 Multi-Tasking Feature

R80.20, our latest release, offer various improvement to both security management gateways. One of them is the ability to open several SmartConsole sessions in parallel and thus switch between tasks seamlessly.