- Products
- Learn
- Local User Groups
- Partners
- More
Introduction Check Point Software Technologies (Check Point for short) is a company operating exclus...
Introduction Our lectures are designed for mastering both theoretical and practical aspects of Check...
Introduction In this lecture, we will cover installation and initial configuration of a new Security...
In this lecture, we will cover deployment and initial configuration of a Security Gateway. Deploym...
In this lecture, we will talk about managing the Operating System of Gaia based Check Point devices,...
In this part, we are starting to work with the main Check Point security administration tool: SmartC...
In the previous part, we have started working with SmartConsole, which is the main administrative to...
In this part, we will discuss different types of Network Address Translation (NAT), set up Internet ...
In this lecture, we add Application Control, URL Filtering and Content Awareness functionalities to ...
Introduction Identity Awareness (IA) allows you to easily add user, user group, and machine identity...
In Lecture 7, we mentioned different types of Security Policies, such as Access Control, Threat Prev...
Logging and Reporting are major points for any security solution. In this lecture, we talk about wor...
Abstract This document is a tutorial for beginners. It provides step by step instructions and exampl...
Author: @Craig_Brehm Abstract This document is intended for people who wish to get some hands-on ex...
Hi there, Ever wonder how Access Policy traffic is handled behind the scenes? How...
In this video, originally filmed for Gartner review process, we go over the main administration oper...
In this video we show how simple it is to deploy and secure a multi-cloud environment. (view in My V...
In this video we go over Smart-1 Cloud functionalities. (view in My Videos)
In this video we show how to secure containers with Check Point solutions. (view in My Videos)
In this video we show how to build an Identity Based Security in a multi-cloud environment. (view in...
In this video we secure the public cloud environment. (view in My Videos)
In this video we show how to detect cyber threats with Check Point solutions (view in My Videos)
In this video we show FWaaS - Harmony Connect. (view in My Videos)
In this video we review Application Control and URL Filtering. (view in My Videos)
In this video we show TLS Inspection capabilities with Check Point. (view in My Videos)
In this video we review Hyper Scale Clustering with Quantum Maestro. (view in My Videos)
We are happy to feature a new video course by @Magnus_Holmberg: Check Point R81.x Here is the first ...
In this video, Magnus Holmberg talks about SmartConsole layout
In this video, Magnus Holmberg talks about some of the SmartConsole functionalities, including: Rule...
In this video, Magnus Holmberg continues talking about admin tools, covering CLI, Gaia Portal, Smart...
In this video, Magnus Holmberg continues talking about some of the SmartConsole functionalities, inc...
Check Point's Quantum is the best Threat Prevention solution on the Market! It offers uncompromising...
In this video, Magnus Holmberg continues discussing SmartConsole functionality, focusing on objects....
In this video Magnus Holmberg continues to discuss SmartConsole functionality, focusing on object m...
Key values of Quantum SD-WAN are: Providing resilient connectivity on top of Best Security Optimiz...
In this series of videos, we'll show you how you can use Quantum SD-WAN to: Provide resilient conne...
Check Point's Quantum SD-WAN enables the system to intelligently direct network traffic based on fac...
Check Point's Quantum SD-WAN enables the system to intelligently direct network traffic based on fac...
Multi-Domain Security Management delivers more security and control by segmenting security managemen...
In this video series we will dive deep into Check Point's ElasticXL, a new clustering technology int...
Hi,Am trying something new out with more or longer format "learning by doing"More or less explaining...