Tutorial: Configuring Application Control

Subscribers:
79,900
Published on ● Video Link: https://www.youtube.com/watch?v=Sl3XohItwN8



Category:
Tutorial
Duration: 4:01
20,253 views
60


How to use R80 SmartConsole to get started with the Check Point Application Control, URL Filtering Software Blades, and URL Filtering Settings with R80 Security Management. For more information: http://supportcontent.checkpoint.com/solutions?id=sk108623

Check Point Infinity, the first consolidated security across networks, cloud and mobile, provides the highest level of
threat prevention against both known and unknown targeted attacks to keep you protected now and in the future.
Check Point R80.10 , part of Check Point Infinity, takes security management to new levels, merging security
leadership with Ease of use –into a unified console for a full-spectrum visibility. The R80.10 provides organizations
improved performance of powerful security features, with a new user-friendly front-end.




Other Videos By Check Point Software


2017-01-30Cyber Security Demo for Industrial Control Systems
2017-01-23Hamas’ Cyber Tactics Exposed - Attacking IDF Soldier’s Mobile Phones
2017-01-18vSEC for your AWS Workloads
2017-01-16Secure Your AWS Apps and Data | Cloud Security
2017-01-13Koch Media Crushes Advanced Attacks with SandBlast | Advanced Threat Prevention
2017-01-03Daymark Secures Cloud with CloudGuard (formerly vSEC) for Microsoft Azure | Cloud Security
2016-11-28モバイルデバイスを狙う中間者攻撃
2016-11-22Creating Host Objects with R80 Management API Tutorial | Security Management Tutorial
2016-11-22R80 Streamlines Security Management at Appvion | Data Center Security
2016-11-22R80 Enhances Efficiency at the University of Kansas
2016-11-20Tutorial: Configuring Application Control
2016-10-31From HummingBad to Worse: Android Malware Campaign | SandBlast Mobile Security
2016-10-26Tutorial: Configuring IPS Settings with R80 Security Management Server | Advanced Threat Prevention
2016-10-14Recomendaciones para una navegaciÌ_n segura en Internet CNN Chile
2016-10-14Juan Rivera, habla sobre seguridad en redes sociales
2016-10-14Guerra cibernÌ©tica, nuestro paÌ_s es vulnerable a ataques en la red
2016-10-14Jorge Steinfeld, Check Point Software; Entrevista en RPP TV
2016-10-14Entrevista a Francisco Robayo, sobre los delitos en la red Teleamazonas Ecuador
2016-10-14El Quinto Elemento, ponencia de Check Point en Per̼
2016-10-14Entrevista a Renato Garreton Vulnerabilidades en sistemas Android causÌ_ problemas en Whatsapp
2016-10-14Vicente Amozurrutia Director M̩xico de Check Point en TV Azteca Noticias



Tags:
R80
smart console
application control
url filtering
app control
security management
enterprise security management
security management software
best security management
r80.10
r77
r77.30
infinity
check point infinity
data center security
check point software
check point
malware
software
security
security software
cyber attacks
network
threat prevention
attack
web security
cyber security
network solutions
product solutions
privacy
tutorial
application
control