I suppose there is something to be said for “turnkey” solutions like the 2012 Appliances. Wonder how long it will take me to figure this one out.
So I have been updating the Check Point IPS signatures in my lab more aggressively lately, and flipped (almost all) of them into “protect” mode. I have noticed some of the signatures are detecting issues with some well known products
I’ve been testing Check Point’s new Capsule a lot lately. I am pretty impressed with what I have seen so far. The client apps create a VPN tunnel to your gateway in Check Point’s Capsule Cloud. There is a slight
Burning in six 12200s for a customer. Has a nice glow to it…
I got the following page at about Midnight CST: I was able to login with my original credentials, but there is no content restored at this point. Looks like Netanium in Massachusetts
There have been some changes in the R75.40 to R77.20 versions. Since there are two OS version options (GAiA and SPlat) things have have gotten even more complex. I hope to have this better documented in the next few days.
It was announced yesterday that Check Point is retiring the CCMA certification. Apparently there is a new certification in development in Israel called the CCSM. There will be an accompanying course for the CCSM, and it is supposedly undergoing “final
Check Point made some new additions in their release notes that better define the path to R77.10. It looks as though we are reaching a tipping point, in that certain versions on SPlat can be upgraded only if it is
Check Point just updated SK 100173 which references the new OpenSSL vulnerability. According to the SK article the following products are not affected: Security Gateway Security Management Server Multi-Domain Security Management Server Endpoint Security Management Server Endpoint Connect clients SSL
I received this email on October 25th: Effective December 31, 2013, Check Point GO device will no longer be available for sale. The final software version is R75 HFA 5, no additional versions will