Continuing Policy Work-in-Progress with R80.10 Session Take Over | Tech Bytes

Subscribers:
79,900
Published on ● Video Link: https://www.youtube.com/watch?v=l2cHSon2bMw



Duration: 3:33
739 views
5


R80.10 enables security administrators to work on the same policy at the same time. But what happens if a project needs to be finished and the security administrator is not available to do so? R80.10 Session Take Over feature allows for other security administrators to finish the work already.

For more information visit https://www.checkpoint.com/products-solutions/security-management/




Other Videos By Check Point Software


2017-10-03Secure your Mobile Phone Now | Introducing Check Point SandBlast Mobile
2017-10-02Advanced Cyber Attack Business Protection
2017-09-20Check Point's Avi Rembaum: Shedding Light on the Dark Web
2017-09-13Bashware Technique Demonstration
2017-09-11[Part 4] Protecting Your Mobile Workforce with SandBlast Mobile & Microsoft Intune
2017-09-11[Part 3] Protecting Your Mobile Workforce with SandBlast Mobile & Microsoft Intune
2017-09-11Protect Your Mobile Workforce with SandBlast Mobile & Microsoft Intune
2017-09-11Protecting Your Mobile Workforce with SandBlast Mobile & Microsoft Intune Pt.1
2017-08-17Securing Data Exchange with Check Point SandBlast and Safe-T HDS
2017-07-26CyberTalk: Conversations on the Cloud with ESG's Jon Oltsik | Cloud Security | CyberTalk
2017-07-24Continuing Policy Work-in-Progress with R80.10 Session Take Over | Tech Bytes
2017-07-20Managing Security Policy Changes with R80.10 | Tech Bytes
2017-07-19Converting Another Vendor's Security Policy to Check Point is a SmartMove | Tech Bytes
2017-07-17SandBlast Agent Protects From Advanced Zero-day Malware
2017-07-17Overview of SandBlast Agent Forensics Report | Tech Bytes
2017-07-17Installing SandBlast Agent on the Enterprise Endpoint
2017-07-17SandBlast Agent Backs Up Anti-Virus by Preventing Recently Discovered Malware | Tech Bytes
2017-07-17SandBlast Agent Anti-Bot Protects the Endpoint from Bot Invasions | Tech Bytes
2017-07-13Introducción a Compliance Blade
2017-07-06Estado de la Ciberseguridad en Operadores de ICS Españolas | Check Point CyberDay Spain 2017
2017-07-06Un Viaje Seguro a la Nube | Check Point CyberDay Spain 2017



Tags:
security management
enterprise security management
security management software
best security management
r80
r80.10
r77
r77.30
infinity
check point infinity
data center security
session take over
Tech Bytes
security administrator
security gateway
check point software
security
security technology
security solutions
r80.10 policy takeover
progres r80
r80.10 best practices