What We’ve Learned From Speaking With Our Customers
February 10, 2016 in Thought LeadershipA month ago I shared some of our plans for 2016 and mentioned that I’d be speaking with our customers, asking them a few questions.… Read More
A month ago I shared some of our plans for 2016 and mentioned that I’d be speaking with our customers, asking them a few questions.… Read More
Find detailed steps required to configure and troubleshoot a VPN for the DAIP gateway connected to the Internet using USB 3G-modem. Read more …
Welcome to 2016! By now you’ve probably read all of the vendors’ “predictions” for 2016, are done with the holiday celebrations and are ready to… Read More
Find detailed steps required to create scripts, increase VSX visibility, understand the resulting output, create integrations, etc. Read more …
The following excerpt from Timothy C. Hall’s latest book “Max Power: Check Point Firewall Performance Optimization” describes the Dual Default Gateway problem and their impact on performance. Read more …
Welcome 5.3! In this release we’ve included over 400 improvements to the underlying infrastructure and bugfixes, added new content and expanded our Palo Alto Networks… Read More
Darshan K. Doshi describes how to configure IPSec VPN between Palo Alto and Cisco ASA. Read more …
UPDATE: The book is no longer offered by indeni. Please go to www.maxpowerfirewalls.com to purchase the book. Below is the original blog post as it… Read More
This October, we are hosting a few events across the east coast of the United States together with our partners. So, if you’re in the… Read More
Rasheen Whidbee describes how to automate the export of Check Point log files into a readable format. Read more …
Safeway, a company headquartered in Rosh-Haain, Israel, has recently released BackBox version 4.5. In this new version, BackBox includes “Application level monitoring”, capable of providing… Read More
Johnathan Browall Nordström describes how to set up Authenticaton for Administrators in both in WebUI/SSH and SmartDashboard (for Check Point GAIA). Read more …
Danny Jung describes visually how to set up certificate based VPNs with Check Point appliances. Read more …
Chris Spillane provides a quick guide to troubleshooting device clustering or config sync for version 11.x.
UPDATE May 31st 2016: Check Point has updated the SK. The rollout of SHA-256 has been postponed to June 5th 2016. Back in April 2015, Check… Read More
In my conversations with firewall users I often hear references to the “battle of the titans” between Check Point and Palo Alto Networks. Both are… Read More
Maxim Bilyukov compiled this FAQ about How the Certification Revocation List (CRL) check mechanism works on a Check Point gateway. Maxim Bilyukov is a Technical Solutions Architect at AKON Technologies and has been working with Check Point Firewalls for five years. Read more …
We often get asked if we have data pertaining to the upgrade processes and cycles of Check Point users around the world. The short answer… Read More
Chris Spillane urges the upgrade of your version 9.x of F5 and provides a concise guide for the upgrade to version 10.2.4. Chris is a Senior Security Analyst at NTT Com Security and has been working with F5 Load Balancers for more than seven years.
This is a real life sample alert from indeni alert guide for Palo Alto Firewalls. Description: This cluster has the same Group ID as… Read More