 Check Point Firewall Security Solution
 Creating a Strong Firewall Security Policy
 Remote Access to the Network
 Creating VPN Policies
 Adding Users to the Security Policy
 Defining an Internet Access Policy
 Threat Prevention Policies
 IPS
 Anti-Bot and Anti-Virus
 Protecting Networks from Bots
 Protecting Networks from Viruses
 ThreatSpect Engine and ThreatCloud Repository
 Learning about Malware
 Examining Anti-Bot and Anti-Virus Protections
 Enabling the Anti-Bot and Anti-Virus Software Blades
 Anti-Bot and Anti-Virus Rule Base
 Sample Rule Base
 Anti-Spam
 Securing Data
 Maximizing Network Performance
 Configuring the NAT Policy
 Monitoring and Logging
 Index
|