Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

Check Point: Vulnerabilities? Not in This House

Truth in IT
05/05/2025
20
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett Small World Big Data. We are here at RSAC 2025. Lots and lots of people here. Lots and lots of cybersecurity goodness going on. Lot of excitement. I 'm with Check Point software and they are excited. So we're going to get right into it and ask first of all what what role does Check Point play in in cybersecurity regime. We're in the middle of it all. We started the whole everybody here is because we started this business. We started the firewall business over 30 years ago with our CEO, and we've maintained some market share. And now we've got some leading products that are addressing some of the biggest risks that companies around the world are seeing. You know, we just saw, you know, you were just interviewing our partner there, Verizon. They just released their breach report. Email is still the number one threat vector. And we have the number one product. We're also seeing web application security attacks. We're still seeing firewall attacks. And we have the highest efficacy tools out there. Check Points number one in efficacy. We also it's kind of a fun place to be. We don't have vulnerabilities. Our product doesn't have what other security vendors are going through with the patching regimen and the the nightmare of having your firewall exploited by the bad guys. We don't have that kind of a problem. Why don't you have any vulnerabilities? Well, it's really the Israeli development life cycle. They're it's so they're so paranoid. They're so security conscious. Everybody goes through the military. It's built into their DNA. We're kind of lazy. You know, Americans are security. Israelis take security extremely serious. And the world that uses Check Point gets that benefit. Let me look around the show here and think about the big trends that we're seeing. What what do you call out so far about this year's RSAC and what everyone's talking about, and then what you guys are bringing to the table? Sure. So, of course, I got to say artificial intelligence. I got to say it. I hate to say it, but. So we're seeing two things. We're seeing you have to fight. Artificial intelligence created threats with a bigger gun. I like to say you need to bring a bigger AI gun to the AI gunfight. So your LLM is extra LLM? Well, it's extra strong. So we don't we don't we have our own LLM, which is really kind of cool. We've got copilot. You can talk to your firewall. It'll tell you what you need to fix and whatnot. But the threats we're seeing, we just released our new AI threat report, which has got some quite unique findings in it, where the criminals are using llms that don't have guardrails, they don't have watermarks. So whether it be a deepfake video, a deepfake voice profile creation, code creation, all these kind of threats that are unique and faster moving, our AI threat powered threat Cloud sees it and we have the largest threat cloud in the in the business. But what's unique about ours is we have the countermeasures devised in about 2 or 3 seconds and then distributed out to our entire environment. So we have the countermeasures in place in seconds for these newest threats. Awesome, awesome. Um, if someone wants to I mean, obviously, there's a lot to know about Check Point. Uh, what would you say should be their first step in getting more acquainted with what you guys do? If they don't really know? You know, you can go to the website, but websites or websites, the best thing you can do is, is call somebody at Check Point there. We've got local reps everywhere. They're going to come see your problem. We're going to listen to what your issue is, whether it's email or data center or cloud. Whatever your challenge is, we're probably going to have a solution or a partner to, to to walk in with you. You know, we have we're completely partner driven organization. So you can call the optics and the worldwide technologies and the and the processes and the computer centers and everybody else, and they'll give you their angle. But if you call Check Point, you're going to get an expert. That's the other thing. We only hire. We hire the best of the best. So when we come in, you're getting a pro from Dover who's going to understand your problem? Seen it before. We've got a bunch of old guys like me and old gals working for the company. So, yeah, but we've seen the challenges and we know the most an optimal way to approach it. So we love to talk directly with customers. And the customers love, you know, us helping them solve problems because that's what we do. Very customer focused, but but very partner driven as well. Like to hear about it. Thank you so much. Thanks, Mike for interviewing us. And we'd love to hear from you at Check Point. Come out and check out the website and we'll have some fun with you. Couldn't have said it better. Who's going to get the last word? I am.

Check Point’s Pete Nicoletti doesn’t pull punches—they’ve been doing this for 30+ years, and their firewall legacy speaks volumes. Touting zero known vulnerabilities and a hardened development lifecycle, Check Point tackles the AI threat landscape with real-time threat countermeasures, a powerful threat cloud, and a serious no-nonsense approach to efficacy, especially around email and app security.

Categories:
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Small World Big Data
  • » Cybersecurity Webinars
  • » Cybersecurity Webinars » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • check
  • point
  • firewalls
  • ai
  • security
  • threat
  • prevention
  • secure
  • development
  • zero
  • vulnerabilities
  • email
  • security
  • application
  • security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Check Point: Vulnerabilities? Not in This House

            Upcoming Webinar Calendar

            • 09/16/2025
              12:00 PM
              09/16/2025
              SOC 2 for Startups: Strategies to Reduce Costs, Enhance Efficiency, and Achieve Compliance
              https://www.truthinit.com/index.php/channel/1410/soc-2-for-startups-strategies-to-reduce-costs-enhance-efficiency-and-achieve-compliance/
            • 09/16/2025
              01:00 PM
              09/16/2025
              KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield
              https://www.truthinit.com/index.php/channel/1403/beyond-dmarc-closing-critical-gaps-in-your-email-security-shield/
            • 09/16/2025
              01:00 PM
              09/16/2025
              HUMAN Security: CISO to CISO: A HUMAN conversation about Artificial Intelligence
              https://www.truthinit.com/index.php/channel/1411/ciso-to-ciso-a-human-conversation-about-artificial-intelligence/
            • 09/18/2025
              04:00 AM
              09/18/2025
              Netskope: Die doppelte Funktion der KI: Innovationsantrieb und Sicherheitsgarant
              https://www.truthinit.com/index.php/channel/1445/die-doppelte-funktion-der-ki-innovationsantrieb-und-sicherheitsgarant/
            • 09/18/2025
              04:00 AM
              09/18/2025
              Netskope: La dualité de l’IA : inspirer l’innovation tout en protégeant l’avenir
              https://www.truthinit.com/index.php/channel/1446/la-dualité-de-lia-inspirer-linnovation-tout-en-protégeant-lavenir/
            • 09/18/2025
              10:00 AM
              09/18/2025
              Netskope: La dualità dell'IA: stimolare l'innovazione e salvaguardare il futuro
              https://www.truthinit.com/index.php/channel/1444/la-dualità-dellia-stimolare-linnovazione-e-salvaguardare-il-futuro/
            • 09/18/2025
              11:00 AM
              09/18/2025
              Trend Micro Webinar: Risk in Real Time: Agentic SIEM
              https://www.truthinit.com/index.php/channel/1372/risk-real-time-agentic-siem/
            • 09/18/2025
              01:00 PM
              09/18/2025
              Netskope: Harnessing AI’s Dual Nature: Progress and Protection
              https://www.truthinit.com/index.php/channel/1424/harnessing-ais-potential-for-innovation-and-mitigating-associated-risks/
            • 09/23/2025
              01:00 PM
              09/23/2025
              Enhancing Visibility, Control, and Trust in Cloud-First Data Security Management
              https://www.truthinit.com/index.php/channel/1497/enhancing-visibility-control-and-trust-in-cloud-first-data-security-management/
            • 09/24/2025
              01:00 PM
              09/24/2025
              Transforming Risk into Resilience: Managing Data and Access in Regulated Settings
              https://www.truthinit.com/index.php/channel/1500/transforming-risk-into-resilience-managing-data-and-access-in-regulated-settings/
            • 09/24/2025
              02:00 PM
              09/24/2025
              Achieving Full Network and Application Visibility through Zero Trust with Netskope and ExtraHop
              https://www.truthinit.com/index.php/channel/1427/achieving-full-network-and-application-visibility-through-zero-trust-with-netskope-and-extrahop/
            • 09/25/2025
              12:00 PM
              09/25/2025
              Netskope: Secure the Future--AI Usage & Data Security in the Enterprise
              https://www.truthinit.com/index.php/channel/1434/ensuring-data-security-and-ai-integration-for-a-resilient-enterprise-future/
            • 10/23/2025
              12:00 PM
              10/23/2025
              360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure
              https://www.truthinit.com/index.php/channel/931/360view-preventing-data-exfiltration-keeping-enterprise-data-secure/
            • 10/28/2025
              12:00 PM
              10/28/2025
              Netskope: Data Security Reimagined: Regain Your Control and Confidence
              https://www.truthinit.com/index.php/channel/1432/data-security-reimagined-regain-your-control-and-confidence/
            • 11/20/2025
              12:00 PM
              11/20/2025
              360View: Budget Optimization: Doing More with Less
              https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
            • 12/18/2025
              12:00 PM
              12/18/2025
              360View: 2026 IT Predictions & Emerging Trends
              https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

            Upcoming Spotlight Events

            • Sep
              16

              KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield

              09/16/202501:00 PM ET
              More events

              Upcoming 360 View Events

              • Oct
                23

                360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure

                10/23/202512:00 PM ET
                • Nov
                  20

                  360View: Budget Optimization: Doing More with Less

                  11/20/202512:00 PM ET
                  • Dec
                    18

                    360View: 2026 IT Predictions & Emerging Trends

                    12/18/202512:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Sep
                      16

                      SOC 2 for Startups: Strategies to Reduce Costs, Enhance Efficiency, and Achieve Compliance

                      09/16/202512:00 PM ET
                      • Sep
                        16

                        HUMAN Security: CISO to CISO: A HUMAN conversation about Artificial Intelligence

                        09/16/202501:00 PM ET
                        • Sep
                          18

                          Netskope: Die doppelte Funktion der KI: Innovationsantrieb und Sicherheitsgarant

                          09/18/202504:00 AM ET
                          More events

                          Recent Industry Events

                          • Sep
                            10

                            Netskope: Ask Bob: How to Mitigate Your Risk Profile

                            09/10/202501:00 PM ET
                            • Sep
                              09

                              From SSE to SASE: Transforming Connectivity with Netskope One SD-WAN

                              09/09/202511:00 AM ET
                              • Aug
                                26

                                Renown Health Secures 10K Mailboxes & Stops $1M+ in Email Threats (Abnormal Security Webinar)

                                08/26/202501:00 PM ET
                                More events
                                Truth in IT
                                • Sponsor
                                • About Us
                                • Terms of Service
                                • Privacy Policy
                                • Contact Us
                                • Preference Management
                                Desktop version
                                Standard version