Skip navigation

News

Recent Posts
Daniel Dor
"One of the most dangerous threats targeting mobile users is the banking malware. These malicious pieces of code are designed to steal financial information and transfer funds to their own accounts. Over the years, perpetrators successfully managed to overcome all obstacles set before them, such as the 2-Factor-Authentication security mechanism
0

Daniel Dor
"Some of the required apps are public apps, such as SAP BI, but many are in-house apps or in-house customizations of public apps. If you want to use these apps, you have security problems, because these apps often do not follow proper security measures. They can cause data leakage on compromised BYOD or from poor usage from users... In addition,
0
Top & Trending
Atul Sharma
Secure XL considers Partial connection as an accelerated path, but by definition partial connection means "connection that exists in the Firewall Connections Table, but not in the SecureXL Connections Table"   So my confusion is what connection is considered as a partial connection ? How does the SecureXL know that a particular connection
2
Top & Trending
galit.ganor
OverviewR80 adds a new way to read information and to send commands to the Check Point management server. Just like it is possible to create objects, work on the security policy using the SmartConsole GUI, it is now possible to do the same using command line tools and through web-services. Target audienceThe management API was created with the
0