Check Point Tech Bytes: R80.20 Identity Tags and Updatable Objects
Channel:
Subscribers:
79,900
Published on ● Video Link: https://www.youtube.com/watch?v=DwMkMElB5Lk
This video elaborates on one the most important aspects of the Check Point Infinity architecture which is the dynamic, unified characteristics of a policy.
Legacy Static policy means ticketing, many install policy operations and inherent discrepancies within the policy will ruin our operational efficiency.
However, by solving these challenges with a Dynamic approach – the security operations engineers only need to design a single policy rule for each scenario that will seamlessly control all operational aspects of an enterprise, while keeping access changes strict, yet adaptive.
Other Videos By Check Point Software
Tags:
Check Point SmartConsole
SmartConsole
dynamic cyber security
security tags
identity tags
integration with CISCO
security group tags
cyber security
infinity architecture
Check Point new features
Check Point technical marketing
TME
tech bytes
fifth generation cyber threats
adaptive security
updatable objects
Cloudguard controller
office365
online services security
security groups
dynamic tags
check point
security