Keeping threats from impacting your organization doesn’t have to be challenging! Join Threat Prevention Expert Nick McKerral to learn how to implement Threat Prevention Best Practices using Check Point Infinity:
- Learn how to activate the IPS, AB, AV blades in R80.10
- Learn how to activate and utilize Threat Emulation and Extraction to protect web and email
- Learn all about Check Point’s new inline threat extraction capabilities
- Learn about Sandblast Agent with browser based Threat Emulation, Extraction, Anti-phishing, domain credential protection capabilities, and more!
Watch the recording: TechTalk: Advanced Threat Prevention Best Practices Video
Answers to questions we did not get to during the session will be summarized and answered below.