Introduction
R81 is the industry’s most advanced threat prevention and security management software that delivers uncompromising simplicity and consolidation across the enterprise.
Whether it be deploying the latest technologies and security to protect the organization or expertly crafting security policies, the new features of R81 include Infinity Threat Prevention, the industry’s first autonomous threat prevention system that provides fast self-driven policy creation and one-click security profiles always keeping policies up to date. Policies are installed in seconds, upgrades require one click, and gateways can be simultaneously upgraded in minutes.
R81 further features secure connectivity for encrypted traffic utilizing the latest standards including TLS 1.3 and HTTP/2. In addition, the Scalable Platform software is now aligned with the R81 Cyber Security Platform bringing feature parity to Check Point Maestro.

Infinity Threat Prevention is an innovative management model that:
-
Provides zero-maintenance protection from zero-day threats, and continuously and autonomously ensures that your protection is up to date on the latest cyber threats and prevention technologies
-
Empowers administrators with out-of-the-box policy profiles based on business and IT security needs
-
Streamlines the configuration and deployment of policy profiles across gateways
-
Provides simple and powerful customization to best serve the needs of your organization.

-
Manage your custom intelligence feeds through SmartConsole. Add, delete, or modify IoC feeds fetched by the security gateways and import files in CSV or STIX 1.x.
-
Threat Extraction is now supported in the ICAP server mode in addition to Threat Emulation and Anti-Virus.
-
Improved use of IoCs for indicators based on source IPv4 and IPv6 addresses.
|
Note - Administrators can still perform granular manual changes to override Check Point’s recommended policies and profiles. |

-
Generic Data Center - Use Generic Data Center Objects in the Source and Destination columns of Access Control, NAT, Threat Prevention, and HTTPS Inspection rules to enforce access to or from IP addresses defined on external web servers. IP addresses defined in the object are automatically updated without a need for policy installation.
-
Support an unlimited number of languages in UserCheck objects

-
Accelerated Policy Installation - A new Access Control policy installation flow that optimizes common cases of use and drastically speeds up the installation. The policy installation is accelerated based on the changes made to the Access Control policy since the last installation. To learn more about Accelerated Policy Installation refer to the R81 Security Management Administration Guide.
-
Concurrent Security Policy installation - one or more administrators can run multiple installation tasks of different policies on multiple gateways at the same time.

-
Support for domain objects, updatable objects, security zones, access roles, and data center objects.

-
Data Center Query Objects - Use data center objects to represent multiple data centers in the security policy when you build queries. This provides easier and more efficient division of the responsibilities to manage data centers.
-
New data centers support:
-
Kubernetes Data Center - added CloudGuard Controller support for Kubernetes clusters. Administrators can now create a Kubernetes-aware security policy for Kubernetes north- south traffic.
-
VMware vCenter version 7.
-
-
CloudGuard Controller can use the system proxy for connections to all data centers.
-
A new object category in SmartConsole's object explorer called "Cloud" aggregates all data centers, data center objects, and data center queries into one.

-
Changes report - generate a report that lists the changes between two revisions or the changes performed during a private session.
-
Administrators can now view, add, and delete licenses through SmartConsole.

-
A new MITRE ATT&CK view to investigate security issues according to the MITRE defense models and extract immediate action items based on the mitigation flow.
The goal of this demonstration is to demonstrate the unique and advanced capabilities of Check Point R81.10 Quantum Network Security Management.
Watch Demo Video