Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 

Access Control and Threat Prevention Best Practices TechTalk: Video, Slides, and Q&A

Slides available below the Q&A, which is below the session video.

Where are the more detailed videos?

In Check Point for Beginners: Videos: Configuring Access Control and Threat Prevention 

Do other third parties also leverage Threatcloud AI?

Yes! We’re working with several OEMs, cybersecurity companies, MSSPs, and end-customers who are using our API for a variety of use cases—including prevention, automation (within SIEM/SOAR), and response.

How DNS Queries check is performend , at Endpoint or also at gateway level?

It can be done on both.

When a new Check Point customer is activated, despite of which service its contracting from Check Point, does it brand is added to the Brand Spoofing Database?

The Brand Spoofing Database is managed by our AI modal system and is updated based on real-world traffic and intelligence-driven criteria.

How does HTTP Inspection work on QUIC connections?

We support QUIC with HTTPS Inspection as of R82.

What effect does enabling addition Threat Prevention blades impact on performance?

Most Threat Prevention blades share the same infrastructure as what is used for Application Control and URL Filtering. T

...
TO READ THE FULL POST it's simple and free

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events