Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 

Tip of the Week - Threats Investigation Using Threat Prevention Software Blades

_Val_
Admin
Admin
3 1 1,082

Check Point's comprehensive Threat Prevention solution helps protect networks from today's sophisticated malware and cyber-attacks. 

But once an attack or malware incident is identified and prevented, what are you going to do next? Ask yourself these questions:

  • How can I investigate if a host is truly infected?
  • What is the nature of the threat?
  • Are there additional infected hosts in my network?

Threat Prevention Software Blades can help you with finding answers. For more information, refer to SecureKnowledge article sk100633.

Documentation available there for download will help you to identify, investigate, review and re-mediate security incidents related to the Threat Prevention events.

1 Comment