Top Check Point Support Features For 2022
January 13, 2022 in Automation, Check PointAfter another year of remote working and virtual events, we have learned new ways to drive innovation and manage remote workforces. This year, CPX 360… Read More
After another year of remote working and virtual events, we have learned new ways to drive innovation and manage remote workforces. This year, CPX 360… Read More
Network capacity planning is the ongoing process of determining that a network has the resources it needs to prevent an impact on business-critical applications. It… Read More
Label Management A label is a group of multiple devices. Labels let you organize your devices, so you can view information about a group of… Read More
In the past two years, companies have experienced an unprecedented shift toward remote work as a result of the COVID-19 pandemic. This brought new challenges… Read More
At Indeni, as in many organizations, we took immediate actions following the details emerging around CVE-2021-44228. The Log4j vulnerability has come to be known as… Read More
Border Gateway Protocol (BGP) is the routing protocol underpinning the Internet. As networks connect with each other they require a way to communicate. BGP enables… Read More
Zero Touch Provisioning (ZTP) is a very popular technology on the feature list of networking products. ZTP is common in network devices like switches, Access… Read More
Your firewall is the first line of defense against cyber attacks. No doubt firewalls are the most critical component of any security infrastructure for safeguarding… Read More
Device Backup Daily Digest Device backup is an important task for organizations to ensure their security infrastructure is safe from failure and disruption. With all… Read More
Without automation, IT operations teams would spend countless hours gathering diagnostics and device data to keep firewalls up and running. IT teams that manage Check… Read More
Single Sign-on with SAML 2.0 Organizations have been moving to centralize their user access either through third party identity management SaaS services, such as Azure… Read More
Check Point Device Hardening Device hardening is a necessary step to ensure your security devices do not have any potential loopholes which can be exploited… Read More
In today’s competitive market, our success depends on how quickly we can innovate and deliver value to customers. It’s all about speeding time to market… Read More
Guardrails are designed to keep developers from unintentionally creating security issues in the cloud. Developers often move very quickly and are constantly under pressure to… Read More
Shift left security means integrating security into your development process as early as possible. In the last blog post, we discussed the many benefits of… Read More
Indeni’s infrastructure automation alerts you to important issues and automatically troubleshoots them in your environment. We are excited to announce that Indeni 7.5 is available… Read More
While customers are taking advantage of Check Point Maestro Hyperscale Network Security to scale out their security infrastructure, they demand infrastructure automation for this new… Read More
The adoption of public cloud means you are prioritizing your infrastructure automation initiatives. As you grow your cloud environments, keeping your infrastructure manageable can be… Read More
Treating your cloud infrastructure as code (IaC) enables you to handle the growth in demand for your applications. Additionally, you are adopting IaC to scale… Read More
Knowledge Enhancements Indeni supports infrastructure automation by alerting you to important issues in your environment. Today, we have added a few Auto-Detect Elements for Check… Read More