- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Slides available below the Q&A, which is below the session video.
In Check Point for Beginners: Videos: Configuring Access Control and Threat Prevention
Yes! We’re working with several OEMs, cybersecurity companies, MSSPs, and end-customers who are using our API for a variety of use cases—including prevention, automation (within SIEM/SOAR), and response.
It can be done on both.
The Brand Spoofing Database is managed by our AI modal system and is updated based on real-world traffic and intelligence-driven criteria.
We support QUIC with HTTPS Inspection as of R82.
Most Threat Prevention blades share the same infrastructure as what is used for Application Control and URL Filtering. The performance impact of additional blades is minimal.
HTTPS Inspection has its own unique impact as it requires maintaining two connections (from client to gateway, and from gateway to server).
Yes, the HTTPS inspection includes DNS verifications - that's needed to verify the Subject Name field content in the certificate. Since R80.30 a lot of improvements have been made. The latest improvements in R82 allow to detect TLS handshake failures that may result of DNS lookup failures. These client and server side failure detections reduced CPU cycles. In addtion learning mode allows to create a list of resources where we can't apply inspection and the TLS parser has been improved to save CPU cycles as well. Then we have CPU bypass under load in case there is too much TLS traffic, then some traffic will be bypassed until the CPU load get lower and the gateway takes again TLS connections for inspection.
You can also use ExternalZone. In fact, this is necessary when Application Control is not used.
Threat Prevention is less effective without HTTPS Inspection, but it still provides some benefits.
There are reasons for both approaches, and sometimes you will mix Ordered and Inline Layers. Where an inline policy makes the most sense is for outbound Internet access.
The product documentation and sk161632.
URL Filtering and Threat Prevention blades use different databases. It is important to review the full log card to see which blade is blocking the communication so the right action can be done to remediate the situation. If the blade is URL Filtering, it is a miscategorization. If the blade is one of the Threat Prevention blades (e.g. Anti-Bot, Anti-Virus), it is a false positive.
On average, Threat Extraction performs inspections very quickly and is designed to avoid disrupting normal workflows. The specific SLO can vary depending on the file type, presence of macros, embedded functions, as well as the machine’s CPU.
You have two options:
In addition, you can get the original file assuming it goes through the protection engines, it is done via browser extension.
This is an example where you can use an inline layer.
The top-level rule permits access to the specific web page (by FDQN or IP) and then, in the inline layer, allow only, e.g TLS 1.3 and block anything else.
Yes, we are able to run Win11 on TE2000XN appliance, please see sk180619 for more information
Private ThreatCloud is out-of-scope for this session. However, please reach out to your local Check Point office.
You control this in malware_config as described in sk92224. Note that using DNS in hold mode may cause delays up until the DNS cache of hosts is populated.
Any to any Threat Prevention means you apply TP without helping the engines to understand the expected flow of communication. I don't recommend this as it adds load to the gateway. If you define the internal networks as protected scope, you protect the outbound traffic from the internal networks with lowest possible resources
ThreatCloud AI is primarily designed for detection and investigation purposes. But, stay tuned - we’re working on some exciting updates, that will introduce new feeds!
In these environments, it's best to use the recommend custom TP policy - the autonomous is more for small to medium perimeter gateways.
You can leverage your own feeds with ioc_feeds and Network Feed objects.
We do have plans to release a new feature that monitors network behavior and provide actionable insights for IPS protections.
It is already possible to connect your on-premise management to Infinity Portal to leverage various AI-enabled offerings. The functionality will be determined by the amount of data you choose to share or allow access to.
Amazing, as always!
If a public IP is being blocked by the external IOC feed and needs to be whitelisted, what is the correct method to do so?
We have a mechanism for this in R82 and R81.20 starting from JHF 43.
It's described in: https://support.checkpoint.com/results/sk/sk132193
Slides available below the Q&A, which is below the session video.
In Check Point for Beginners: Videos: Configuring Access Control and Threat Prevention
Yes! We’re working with several OEMs, cybersecurity companies, MSSPs, and end-customers who are using our API for a variety of use cases—including prevention, automation (within SIEM/SOAR), and response.
It can be done on both.
The Brand Spoofing Database is managed by our AI modal system and is updated based on real-world traffic and intelligence-driven criteria.
We support QUIC with HTTPS Inspection as of R82.
Most Threat Prevention blades share the same infrastructure as what is used for Application Control and URL Filtering. T
...Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 19 | |
| 17 | |
| 14 | |
| 8 | |
| 7 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY