In This Section: |
Thank you for choosing Check Point’s TE Appliances. We hope that you will be satisfied with this system and our support services. Check Point products are the most up to date and secure solutions available today.
Check Point also delivers worldwide educational, professional and support services through a network of Authorized Training Centers, Certified Support Partners and Check Point technical support personnel. We make sure that you get the most out of your security investment.
For more about the Internet Security Product Suite and other security solutions, see the Check Point Web site, or call Check Point at 1(800) 429-4391. For more technical information about Check Point products, consult the Check Point Support Center.
Welcome to the Check Point family. We look forward to meeting all of your current and future network, application and management security needs.
Threat Emulation prevents infections from undiscovered exploits, zero-day and targeted attacks. This innovative solution quickly inspects incoming files, launches suspicious files in a virtual sandbox, discovers malicious behavior and then prevents discovered malware from entering the network. The Emulation appliance is an on-premises solution to emulate threats.
For more about using Threat Emulation, see the R77 Versions Threat Prevention Administration Guide.
Key Features:
This document provides:
Note - Screenshots in this guide may apply only to the highest model to which this guide applies. |
This section describes the contents of the shipping carton.
Item |
Description |
---|---|
Appliance |
Check Point TE Appliances |
Documentation |
|
Rack Mounting Accessories |
Rack mounting hardware kit (including ear mounts and screws) |
Cables |
|