- Products
- Learn
- Local User Groups
- Partners
- More
CheckMates Fifth Birthday
Celebrate with Us!
days
hours
minutes
seconds
Join the CHECKMATES Everywhere Competition
Submit your picture to win!
Check Point Proactive support
Free trial available for 90 Days!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
The 2022 MITRE Engenuity ATT&CK®
Evaluations Results Are In!
Now Available: SmartAwareness Security Training
Training Built to Educate and Engage
MITRE ATT&CK
Inside Check Point products!
CheckFlix!
All Videos In One Space
R80 includes integrated logs in the policy views. Often, changes happen from inspecting traffic logs. Can we demonstrate how it speeds up policy change management?
Threat Prevention - 1 click!
Simply right-click the log and select "Add Exception". Details of the exception to the threat prevention policy are filled automatically.
Access Control - about 5 clicks!
Because the access control policy is all about order of rules and first-match, the administrator has to choose the desired location of his rules.
After clicking a rule and seeing its logs, right-clicking a log's source or destination IP address opens a context menu with an option to create a host from it.
During the creation of a new rule, when picking source/destination, the recently created objects always show up on the top of the picker and save time from searching for them in the list of network objects.
This is one of the ways in which R80 SmartConsole tries to "understand" the mind of the user and suggest the most suitable common actions and values.
Threat Prevention - 1 click!
Simply right-click the log and select "Add Exception". Details of the exception to the threat prevention policy are filled automatically.
Access Control - about 5 clicks!
Because the access control policy is all about order of rules and first-match, the administrator has to choose the desired location of his rules.
After clicking a rule and seeing its logs, right-clicking a log's source or destination IP address opens a context menu with an option to create a host from it.
During the creation of a new rule, when picking source/destination, the recently created objects always show up on the top of the picker and save time from searching for them in the list of network objects.
This is one of the ways in which R80 SmartConsole tries to "understand" the mind of the user and suggest the most suitable common actions and values.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY