- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
the GWs have only one IP address which is the one connected to the PUBLIC SUBNET of the deployment.
You will be using those IPs to establish SIC. of course they will change when new GWs will be deployed and old will be deleted according to the ASG sizing but we are using the CME component to automatically scan / deploy / delete the ASG GWs from the Management Server.
Check the GWLB admin guide:
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY