Dameon Welch-Abernathy

TechTalk: Advanced Threat Prevention Best Practices

Discussion created by Dameon Welch-Abernathy Moderator on Dec 6, 2017
Latest reply on Dec 15, 2017 by Nicolas McKerrall

Keeping threats from impacting your organization doesn’t have to be challenging! Join Threat Prevention Expert Nick McKerral to learn how to implement Threat Prevention Best Practices using Check Point Infinity:


  • Learn how to activate the IPS, AB, AV blades in R80.10
  • Learn how to activate and utilize Threat Emulation and Extraction to protect web and email
  • Learn all about Check Point’s new inline threat extraction capabilities
  • Learn about Sandblast Agent with browser based Threat Emulation, Extraction, Anti-phishing, domain credential protection capabilities, and more!


Watch the recording: TechTalk: Advanced Threat Prevention Best Practices Video 

Answers to questions we did not get to during the session will be summarized and answered below.