Поиск по тегу «r80.10» в разделе Видеокаталог

HD 00:25:18
Check Point и DevSecOps: безопасность в новой эре разработки ПО
Микросервисы, контейнеры, Kubernetes, DevOps, DevSecOps – эти термины все прочнее входят в нашу жизнь. Даже самые консервативные организации начинают использовать такие технологии. А многие уже в полной мере вкусили их преимущества. Но к...
Cмотреть видео
HD 00:29:35
CloudGuard IaaS: динамическая сетевая безопасность в отечественных и зарубежных облаках - ви
Амир Алиев, консультант по информационной безопасности, Check Point Software Technologies Задействовав ресурсы публичного облака у вас может возникнуть вопрос - где здесь безопасность и кто за нее отвечает? а докладе вы узнаете ответ на эт...
Cмотреть видео
HD 00:27:13
iot: Безопасная экосистема Интернета вещей (IoT) - видео
Do you trust your IoT devices? Itzik Feiglevitch, Product Manager, Check Point Software TechnologiesРастущие с экспоненциальной скоростью устройства Интернета вещей приносят значительную ценность бизнесу, развивая и расширяя его возможности...
Cмотреть видео
HD 00:08:24
Check Point: Lightboard Series: Dynamic Revisions
This video elaborates on the logic behind the R80.10 Security Management architecture focusing on the dynamic revisions feature. This feature automatically stores the full history of database changes, with very little footprint, consuming ...
Cмотреть видео
HD 00:02:38
Check Point: R80.10 Policy Management – IPS Protections in Detect (Staging) State
This video elaborates on the logic behind new IPS protections status after IPS update operation and introduces best practice on changing the status of detect-staging on prevent when enough information was gathered regarding the new IPS prot...
Cмотреть видео
HD 00:02:53
Check Point: R80.10 Logs and Monitor Pane – Key Components and Operations video
In this movie, we elaborate on the key components and operations of events management and reporting, within ’s R80.10 suite.
Cмотреть видео
HD 00:03:05
Check Point: Migrating from R77.3O to R80.10 Using Advanced Upgrade Procedure
This video demonstrates advanced upgrade of a real customer database from R77.30 to R80.10.
Cмотреть видео
HD 00:02:27
Check Point: Upgrading from R77.3O to R80.10 Via CPUSE
This video demonstrates in-place upgrade of a real customer database from R77.30 to R80.10 via CPUSE interface in the Web UI.
Cмотреть видео
HD 00:03:33
Check Point: Continuing Policy Work-in-Progress with R80.10 Session Take Over | Tech Bytes
R80.10 enables security administrators to work on the same policy at the same time. But what happens if a project needs to be finished and the security administrator is not available to do so? R80.10 Session Take Over feature allows for oth...
Cмотреть видео
HD 00:03:13
Check Point: Managing Security Policy Changes with R80.10 | Tech Bytes
When new services are introduced and your security policy needs to be adjusted accordingly, what tools will you be using? R80.10 makes it easier to implement changes. The “Where Used” and “Replace” tools will help security administrators ma...
Cмотреть видео
HD 00:04:03
Check Point: Use R80.10 New Packet Mode Feature to Search Through Policy
Packet Mode, a new feature introduced within R80.10, enables you to search the rule base as if it were a packet going through the security policy. For more information visit: R80.10 features the most advanced threat prevention across netw...
Cмотреть видео
HD 00:23:09
Check Point: R80.10 Best Practices – Migrating from R77.30
Get the insights from Professional Services on how to migrate from R77.30 to R80.10.
Cмотреть видео
HD 00:04:45
Check Point: R80.10 Policy Revision
R80.10 Policy revision explained. Learn how to work with policy revision in R80.10. For more information: R80.10 features the most advanced threat prevention across networks and cloud, managed by a single security management console. Secu...
Cмотреть видео
HD 00:04:47
Check Point: R80.10 SmartConsole Security Policies View | Threat Prevention
This video is an overview that describes important features and functionality of the R80.10 SmartConsole and focuses on: Unified Access and Threat Prevention Policies Example of inline layers for zone-based policy Using multiple blades in o...
Cмотреть видео
HD 00:05:27
Check Point: Start Building Your Unified Policy with R80.10 | Security Management | Tech Bytes
R80.10 policy management is unified so you can create and monitor these policies harmoniously. One single policy manages your users, devices, applications, data and networks. With this unified policy, you also get unparalleled granular cont...
Cмотреть видео
HD 00:04:32
Check Point: R80.10 Security Management | Tech Bytes: Gateways, Logs, and Manage & Settings
This video is an overview that describes important features and functionality of the R80.10 SmartConsole. More information: To learn more about R80.10 Security Management: Infinity is the only fully consolidated cyber security architec...
Cмотреть видео
HD 01:03:18
Check Point: and Tufin: Security Management for the Future | Enterprise Network Security
and Tufin provide complete, simplified and automated security management for the enterprise network of the future. For more information: Together, the Tufin Orchestration Suite with Firewalls and Security Management products provide ad...
Cмотреть видео
HD 00:07:14
Check Point: Creating Host Objects with R80 Management API Tutorial | Security Management Tutorial
How to use R80 Management API to run a BASH script that automatically creates host objects in the Security Management server database. For more information: This video tutorial is intended for users that are familiar with automation scri...
Cмотреть видео
HD 00:02:07
Check Point: R80 Enhances Efficiency at the University of Kansas
The University of Kansas tested R80 security management and liked what they saw. Today they enjoy increased operational efficiency through concurrent administration capabilities, APIs for automation and a single pane of glass.
Cмотреть видео
HD 00:02:11
Check Point: R80 Streamlines Security Management at Appvion | Data Center Security
Appvion, a manufacturer of specialty papers, tested R80 security management during development and now uses it every day to gain efficiency, high visibility and concurrent management capabilities.
Cмотреть видео
HD 00:04:01
Check Point: Tutorial: Configuring Application Control
How to use R80 SmartConsole to get started with the Application Control, URL Filtering Software Blades, and URL Filtering Settings with R80 Security Management. For more information: Infinity, the first consolidated security across net...
Cмотреть видео
HD 00:03:30
Check Point: Tutorial: Configuring IPS Settings with R80 Security Management Server | Advanced Threa
How to use R80 SmartConsole to configure the settings for the IPS Software Blade. For more information visit:
Cмотреть видео
HD 00:01:25
Check Point: ‹âȋâ_‹Ä´‹Ä»‹Ä ‹â£¨Á ‹¨ŠüȌ¡_¾¬©‹âՌÐ‹â_¾öȋªR80
‹Ä‹â¤‹Äċâø‹Äȋĝ‹â_‹Ä_‹Äö‹¨R80‹âȋâ_‹Ä´‹Ä»‹Ä ‹â£¨Á ‹Äыĩ‹ÄċÄö‹Ä¥‹â©‹Ä_‹Äʋø‹Û‹â‹âä‹â ‹â܋Ä_‹Ä_‹â¦‹Û‹Äà‹Ä‹â_‹â_‹Û‹Äà‹Ä_‹âÀ‹Û‹â¢‹ÄыĻ‹â±‹Ä_‹âá‹Ä¤‹Ä_‹âՌ÷Šüۋ¨‹â_‹Ä_‹â_‹Ä_‹ÄNj¬µ±ŠüیÎЋ¥‹â΋Ù‹Ä‹Ä»‹âá‹Ä_‹¤¨Á ‹ÛâŽÇ÷Œ¼_...
Cмотреть видео
HD 00:00:39
Check Point: Automation with VMware vCenter Orchestrator and R80 Smart Management
Use VMware vCenter Orchestrator to provision security policies in ‰Ûªs R80 Smart Management Console leveraging the open API interface. This video demos automated security policy provisioning. Rules that are provisioned include Stealth rul...
Cмотреть видео
HD 00:01:48
Check Point: vSEC controller Demo with R80 Smart Management | Cloud Security
This video demos the vSEC cloud security integration with VMware vCenter and NSX. It shows you how to integrate a vCenter server in the Smart Console, provision a security rule based on imported vCenter objects like VM name, integrate wit...
Cмотреть видео
HD 00:01:25
Check Point: R80 Security Management | Advanced Threat Prevention
's R80 Security Management helps you consolidate security functions so you can be more efficient and effective at deploying the strongest protections across your organization. More Information:
Cмотреть видео
HD 00:01:28
Check Point: RSA 2016: R80 Security Management Launch | Security Management Software
For more information: Organizations that possess consolidated security simplify complex environments, improve efficiency and ensure security is consistently deployed across the organization. Change the way you manage security with integra...
Cмотреть видео
HD 00:01:44
Check Point: Security Management Customer Success Story: Talisys | R80 Security Management
More information on R80 Security Management visit Talisys, an innovator in financial securities processing software, leverages R80 to reduce security management complexity. Building on ‰Ûªs leadership in speedy root cause analysis, they a...
Cмотреть видео