cancel
Showing results for 
Search instead for 
Did you mean: 
Create a Post
How-To Videos
Mohit_Yadav
Mohit_Yadav inside How-To Videos 2 weeks ago
views 245 4

How to Prepare a lab for checkpoint using vmware

Hi,I am new to checkpoint and want to set up a lab on my laptop using vmware. Please guide me with the process or any video(youtube) for that. I want to install R80.x in the lab. I want to go fo CCSA, so any study material for that will be very helpful. Thanks in advance.Mohit Yadav
Shay_Levin
inside How-To Videos 3 weeks ago
views 238 3
Admin

AWS RDS - Public IP - Awareness & Auto Remediation with CloudGuard Dome9

RDS misconfiguration is common. manually identifying misconfiguration and remediate immediately is almost impossible. RDS should not be defined with a public IP ! How do you become aware of RDS misconfiguration? Do you know how many RDS are deployed in your AWS account? Do you know in which regions are your RDS deployed? Do you know if your RDS has public IP? Check this How-to video for continuously finding misconfiguration and  Auto Remediate with CloudBots.      
Shay_Levin
inside How-To Videos 3 weeks ago
views 658 1 7
Admin

R80.40 - Feature List - Episode-1

In this video, I will show you where you can find the R80.40 feature list. Right after the last CPX on February 6, I will publish a few movies which would demonstrate the main features.  
Shay_Levin
inside How-To Videos 2019-12-17
views 432 2
Admin

AWS - Automated remediation via Dome9 CloudBots

What do you do if you have hundreds of security groups and many team members that manage those security groups ? How do you make sure that your environment is continuously secured ?! In this video, you will learn about the best practices for managing and auto-remediate violated AWS security groups. You will learn about the following topics: Managing AWS security groups Cloud Security Posture Repository Dome9 GSL Language  Periodic Compliance CloudBots  
Rolando_Panez
inside How-To Videos 2019-12-09
views 918 1 3
Employee

Oracle Cloud Cluster Deployment

This is a series of videos on how to deploy a CloudGuard IaaS cluster in Oracle Cloud Infrastructure, based on sk142872.   (view in My Videos)   (view in My Videos)   (view in My Videos)   (view in My Videos)   (view in My Videos)   (view in My Videos)   (view in My Videos)   (view in My Videos)   (view in My Videos)   (view in My Videos)
Jim_Oqvist
inside How-To Videos 2019-11-28
views 582 1 3
Employee+

Compliance blade overview and how to get some more out of SmartEvent

In this recording from a lecture I and Kai had with several customers you will get a quick compliance blade overview and learn how to get some more out of SmartEvent Content Compliance Blade overview Why do I need SmartEvent? How do I use SmartEvent (view in My Videos)  
Yair_Herling
inside How-To Videos 2019-10-01
views 5353 13 9
Employee+

R80.20 Identity Tags and Updatable Objects

This video elaborates on one the most important aspects of the Check Point Infinity architecture which is the dynamic, unified characteristics of a policy.legacy Static policy means ticketing, many install policy operations and inherent discrepancies within the policy will ruin our operational efficiency.However, by solving these challenges with a Dynamic approach – the security operations engineers only need to design a single policy rule for each scenario that will seamlessly control all operational aspects of an enterprise, while keeping access changes strict, yet adaptive.  Enjoy
Yair_Herling
inside How-To Videos 2019-08-22
views 59972 10 5
Employee+

R80.20 Log Exporter Feature

This video elaborate on Check Point's R80.20 log exporter feature, introducing an easy and secure method for exporting Check Point logs to 3rd party SIEM applications, using various protocols (like TCP or UDP) and formats (like syslog, CEF, or LEEF)
Peter_Elmer
inside How-To Videos 2019-07-05
views 1887 2 4
Employee+

Integrating Check Point identity based access into Cisco ISE environments - video

In this video you will learn about the design principals integrating Check Point into Cisco ISE environments. The video takes less than 15 minutes.  Make sure you know the basic concepts of identity based access control documented here.  Content Reviewing the basic concepts for identity based security Overview of the integration to Cisco ISE controlled environments Understanding the advantages of Access Role objects Importing SGT objects from Cisco ISE using CloudGuard Controller Scale identity sharing Have fun 🙂 (view in My Videos)
Yair_Herling
inside How-To Videos 2019-06-17
views 1230 3
Employee+

Understanding Malware DNA – The Classification of Malware Families

key part of understanding detected malware, its potential to damage and remediation steps is its classification to a malware family. For more information visit, https://www.checkpoint.com/products/a... This brand new release includes a new machine learning engine that improves this classification so it is more accurate and fast. Malware DNA, Part of Check Point's SandBlast Network Zero Day Protection includes : • Artificial Intelligence based Malware code decomposition • Insights into malware ancestry • Zero-day malware detection & classification
Yair_Herling
inside How-To Videos 2019-06-17
views 1227 4
Employee+

Check Point Threat Extraction for Web Technology

Threat Prevention protects users from malicious web downloads in real-time! Threat Extraction removes exploitable content, reconstructs files to eliminate potential threats and promptly delivers the clean content to the user. This is thanks to the fastest threat emulation engines for secure delivery of files. Check Point Releases R80.30 with 100 New Features Delivering More Protection against Malicious Downloads and Websites. Read more : https://blog.checkpoint.com/2019/05/15/cyber-security-management-web-extraction-threat-r80-release-update/ For more information : https://www.checkpoint.com/products/advanced-network-threat-prevention/
Yair_Herling
inside How-To Videos 2019-06-17
views 1031 1
Employee+

Check Point Cyber Security Collaborates with Splunk for Cyber Threat Protection

  Cyber security with R80.20 offers a revolutionary way to investigate and analyze threats quickly. Now integrating with Splunk SIEM Platform, we have developed several cyber security dashboards that map the security incidents into a true threat landscape of the customer’s organization with actionable insights. Go to The splunk base app store (splunkbase.splunk/app/4293) and download the Check Point app here: https://splk.it/2GRWAMq
Jason_Smith2
inside How-To Videos 2019-04-17
views 5686
Employee

Use of Private ThreatCloud behind Load Balancer

I recently had a POC where we were required to demonstrate an HA configuration of the Private ThreatCloud in which traffic and failover was controlled by a pair of load balancers.    In this POC, the requirement was that devices in a specific site should only talk with the PTC within their site unless it went down then the load balancer would redirect the PTC requests to a PTC in a different site.   I wanted to share a video that highlights the configuration and performs a couple of tests of adding gateways to the PTC in addition to simulating a failover.  (view in My Videos)
Yair_Herling
inside How-To Videos 2019-04-11
views 2676 1 23
Employee+

LightBoard Series - Maestro - Security of hyperscale (technical deep dive)

Maestro’s architecture is designed to secure networks both large and small, by orchestrating multiple security gateways into one unified security system. It allows our customers to seamlessly increase their security solutions, on the fly with security of Hyperscale – on demand expansion for gateways of all sizes. It brings operational supremacy with new options for organizations to architect and manage their cyber security platforms, But what's really exciting is the Cloud-level resiliency, This is the only unified security system that is reliable, super resilient and cost-efficient. Something that up until now was only available to telco’s and very institutions – but at Check Point we never stop innovating and we now are bringing Hyperscale network security to you!
Yair_Herling
inside How-To Videos 2019-01-24
views 4684 4 12
Employee+

Endpoint Management as a Service Overview (EA Release)

This video elaborates on Check Point’s new Management as a Service capability of the Endpoint Management (still in EA)Enjoy