Check Point Tech Bytes: R80.20 Identity Tags and Updatable Objects

Subscribers:
79,900
Published on ● Video Link: https://www.youtube.com/watch?v=DwMkMElB5Lk



Duration: 7:18
3,584 views
17


This video elaborates on one the most important aspects of the Check Point Infinity architecture which is the dynamic, unified characteristics of a policy.

Legacy Static policy means ticketing, many install policy operations and inherent discrepancies within the policy will ruin our operational efficiency.
However, by solving these challenges with a Dynamic approach – the security operations engineers only need to design a single policy rule for each scenario that will seamlessly control all operational aspects of an enterprise, while keeping access changes strict, yet adaptive.




Other Videos By Check Point Software


2019-01-22Fortnite Vulnerability Coverage on Good Morning America
2019-01-222019 Cyber Security Report | Threat Trends Analysis
2019-01-21Check Point Maestro – LightBoard Series - Security of hyperscale technical deep dive
2019-01-21Check Point Maestro – Security of Hyperscale at a glance
2019-01-21Introducing Check Point Maestro | A hyperscale network security solution
2019-01-16Fortnite Login Vulnerability
2019-01-15Check Point TechBytes: R80.20 Performance Innovations
2019-01-15CPX 360 2019 Conference Preview - Last Chance to Register for Cyber Security Summit
2019-01-08Better safe than sorry | Check Point & BlackBerry protect your Mobile
2019-01-04Check Point Tech Bytes: Endpoint Management as a Service Overview
2019-01-02Check Point Tech Bytes: R80.20 Identity Tags and Updatable Objects
2019-01-02Check Point Infinity Talks: R80.20 Log Enhancements
2019-01-02Check Point Online PO Introduction
2018-12-21Check Point Tech Bytes: CloudGuard Deployment and Agile Capabilities
2018-12-21Check Point Software official sponsor of the NFL Chicago Bears - Sales Team Edition Edits
2018-12-21CPX 360 2019 Conference Preview - Cybersecurity Solutions Innovation Roadmap
2018-12-20Live Hack - AWS Account Hijack with 2FA Bypass
2018-12-14CPX 360 2019 Keynote & Tracks Overview - The Industry's Premier Cyber Security Summit & Expo
2018-12-13NSX-T 2.3 Deployment Guide
2018-12-12CPX 360 2019 - CyberTalk Keynotes for the Premier Cyber Security Summit & Expo
2018-12-12CPX 360 2019 - Agenda Sneak Peek for the Premier Cyber Security Summit & Expo



Tags:
Check Point SmartConsole
SmartConsole
dynamic cyber security
security tags
identity tags
integration with CISCO
security group tags
cyber security
infinity architecture
Check Point new features
Check Point technical marketing
TME
tech bytes
fifth generation cyber threats
adaptive security
updatable objects
Cloudguard controller
office365
online services security
security groups
dynamic tags
check point
security