- Products
- Learn
- Local User Groups
- Partners
- More
The State of Ransomware Q1 2026
Key Trends and Their Impact
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
We use this feature when the host might contain multiple IP addresses and we want the access rule to be applied to all IPs on the object. It saves you from creating multiple objects for the same single host.
For example, we use it for TACACS sourced from multiple interfaces on a router.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY