- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Ask Check Point Threat Intelligence Anything!
October 28th, 9am ET / 3pm CET
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
Slides and Q&A are below.
Soon. It will be available via UserCenter.
DNS Security is included in the NGTP and NGTX license. Zero Phishing is included only in the NGTX license.
This is a separate offering that requires R81.20, pricing will be announced at GA.
Yes. Eliminating SmartConsole is part of our longer-term roadmap.
R81.10.00 has been available since July 2022. Download from sk179004. R81.10.05 is currently in EA.
Not currently, but it is planned for a future release (not R81.20).
We can be an MX or a nexthop similar to a SEG (and pass traffic to an existing solution). Of course, if you’re using a cloud-based email provider, you probably want to use Harmony Email and Collaboration (a.k.a. Avanan) instead.
This is supported from R81 using ioc_feeds. In R81.20, we offer a Network Feed feature, which is a bit more flexible.
Yes, it is a mandatory requirement since almost all web traffic is HTTPS.
Minimum hardware requirements will be listed in the release notes. If you have specific sizing questions for your environment, reach out to your Check Point SE. In general, it should be similar to R81.10.
Yes, you should be able to configure exceptions for your own phishing sites used for internal training.
These are complimentary solutions. The Zero Phishing on the gateway only protects phishing when webmail and similar is accessed through the gateway. Harmony Email and Collaboration works regardless of where the users access webmail from.
Yes, of course. Additional hardware should be supported with this release as well.
Accelerating Layer 7 inspection is part of our long-term roadmap for our Lightspeed platforms.
When the end user clicks into a field to enter information, if it’s determined the site is phishing, entry into the text field will be blocked by the Javascript.
It’s a separate offering that is coming soon. It will be available for R81.10 or R81.20 with JHF when released.
Not part of R81.20
It is best to address this with the TAC.
We've been scanning domains for a long time now with the Anti-Virus and Anti-BOT blades. If both are already enabled you shouldn't have any issue
Not initially, but a future JHF is expected to improve performance.
These are already covered with our existing IPS and Anti-bot blades.
Zero Phishing must be done with an inline gateway that is running HTTPS Inspection.
The scanning is passive and it requires further integration with further network components.
Going forward, Network Feeds are probably the better choice for the vast majority of use cases. Refer to this thread for discussion on the matter.
Quantum IoT requires an on-prem gateway managed with either an on-prem Smart-1 or Smart-1 Cloud as well as an Infinity Portal tenant.
Outbound HTTPS Inspection requires a Certificate Authority key. This is required because certificates are generated on the fly. A wildcard certificate cannot sign other certificates.
There is an interval that can be set in the Network Feed window, called "Check feed interval" under Network. The lowest interval that can be set is one minute.
Correct. We have a "Test Feed" button in SmartConsole you can use to verify the feed is working.
Yes it is
Yes, you can configure smart-task for that with the required mails addresses
SmartWorkflow features are also available via the API, which means it can be integrated into ServiceNow and similar platforms.
Network Feed are fetched by the gateway.
No. The products/services that are part of Horizon involve Infinity Portal.
SmartWorkflow adds two roles to the admin permission profile in addition to the Install Policy permission:
Persons with the Install Policy permission will only be able to install changes that were published.
It is already supported with R81.10
Changes must be approved per-session, not globally. Any object/rule modified in any session but not yet published will show as "locked" in SmartConsole and will not be editable until the relevant session is approved or discarded.
No.
All we showed will be part of the initial release (without JHF).
The requirements (which will be publicly documented in SK187070 when R81.20 is GA) are as follows:
VSX is supported as well.
At the moment, no. However, it is something we are evaluating for a future release.
No. For that, use the existing ioc_feeds feature.
The SD-WAN offering is separate from R81.20. It will also be supported on R81.10.
Yes
Yes, you won't need to create admins in SmartConsole.
Already supported, see sk174878 and sk175385.
Identity Awareness in general will be more robust and scalable as a result of the changes made in R81.20.
Before HyperFlow- yes, a single connection is processed by a single FW instance assigned on a single core. HyperFlow allows offloading jobs to additional core(s) as needed.
Yes
No, but it should have more than in R81.10.
It will be mentioned in release notes and upgrade guides. Having said that, if you are on a version prior to R80.40, you should upgrade as prior releases are no longer supported.
In the coming weeks. It is already available as an EA.
This was already done as part of the R81 release. There is still a separate installation ISO for Scalable Platforms and there are some features not yet implemented on Maestro yet and we will continue to close these gaps in coming releases.
That and the SmartConsole Web will be able to leverage SAML authentication in R81.20, which will allow you to use whatever authentication methods are configured in your IdP.
Please communicate your specific requirements with your Check Point SE.
Yes, we made sure they can co-exist safely.
No specific changes to SSH DPI have been made. If you have specific requirements, please reach out to your Check Point SE.
For now, yes.
This is actually not a new feature, as it was rolled out in releases since R80.40 in the JHF. For more details, refer to this CheckMates thread.
Planned for a future release.
Yes
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY