Check Point TV | Let's Talk R80 Cyber Security Management

Subscribers:
79,900
Published on ● Video Link: https://www.youtube.com/watch?v=9N35YXh_-Hw



Duration: 1:47
606 views
2


Check Point TV speaks with security experts to dive into the best features of R80.20 that make it the cyber security management console for Gen V. For more information visit https://www.checkpoint.com/




Other Videos By Check Point Software


2019-05-03Check Point Cyber Security Collaborates with Splunk for Cyber Threat Protection
2019-04-26CloudGuard Dome9 compliance – Easily automate compliance requirements and security best practices
2019-04-11Cloud Security for AWS Cloud Environments | Check Point CloudGuard
2019-04-11Cloud Security Compliance with CloudGuard Dome9 for AWS
2019-04-11Complete Cloud Security Compliance with CloudGuard for Azure
2019-04-11Cloud security compliance solution with CloudGuard Google Cloud Platform
2019-04-11Mobile Security Management Application Demo | Check Point WatchTower
2019-04-04Remote debugging the Google Maps Snake Game | Check Point Research
2019-03-19CheckMates Nuggets - What is Threat Cloud all about?
2019-03-13Check Point customer experience summary | CPX 360 2019
2019-03-13Check Point TV | Let's Talk R80 Cyber Security Management
2019-03-13Check Point TV | Let's Talk CloudGuard IaaS Solution
2019-03-13Security Management as a Service | New from CPX 360
2019-03-13Check Point SmartConsole SmartTasks | New from CPX 360
2019-03-13New features for SmartConsole coming soon | New from CPX 360
2019-03-13Check Point SmartConsole extension | New from CPX 360
2019-03-13Integration with Check Point Splunk | New from CPX 360
2019-03-13Policy management with R80 | New from CPX 360
2019-03-13Change management in R80.20 SmartConsole | New from CPX 360
2019-03-13SmartConsole Features you need to start using | New from CPX 360
2019-03-07UltraHack: The Security Risks of Medical IoT



Tags:
CPX
CPX 360
Check Point Innovations
cyber security
R80
R80.20
cyber security management
security management
infinity architecture
managing firewall
Gen V
Updatable Objects
Identity Awareness