Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Check Point: Vulnerabilities? Not in This House

Truth in IT
05/05/2025
21
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett Small World Big Data. We are here at RSAC 2025. Lots and lots of people here. Lots and lots of cybersecurity goodness going on. Lot of excitement. I 'm with Check Point software and they are excited. So we're going to get right into it and ask first of all what what role does Check Point play in in cybersecurity regime. We're in the middle of it all. We started the whole everybody here is because we started this business. We started the firewall business over 30 years ago with our CEO, and we've maintained some market share. And now we've got some leading products that are addressing some of the biggest risks that companies around the world are seeing. You know, we just saw, you know, you were just interviewing our partner there, Verizon. They just released their breach report. Email is still the number one threat vector. And we have the number one product. We're also seeing web application security attacks. We're still seeing firewall attacks. And we have the highest efficacy tools out there. Check Points number one in efficacy. We also it's kind of a fun place to be. We don't have vulnerabilities. Our product doesn't have what other security vendors are going through with the patching regimen and the the nightmare of having your firewall exploited by the bad guys. We don't have that kind of a problem. Why don't you have any vulnerabilities? Well, it's really the Israeli development life cycle. They're it's so they're so paranoid. They're so security conscious. Everybody goes through the military. It's built into their DNA. We're kind of lazy. You know, Americans are security. Israelis take security extremely serious. And the world that uses Check Point gets that benefit. Let me look around the show here and think about the big trends that we're seeing. What what do you call out so far about this year's RSAC and what everyone's talking about, and then what you guys are bringing to the table? Sure. So, of course, I got to say artificial intelligence. I got to say it. I hate to say it, but. So we're seeing two things. We're seeing you have to fight. Artificial intelligence created threats with a bigger gun. I like to say you need to bring a bigger AI gun to the AI gunfight. So your LLM is extra LLM? Well, it's extra strong. So we don't we don't we have our own LLM, which is really kind of cool. We've got copilot. You can talk to your firewall. It'll tell you what you need to fix and whatnot. But the threats we're seeing, we just released our new AI threat report, which has got some quite unique findings in it, where the criminals are using llms that don't have guardrails, they don't have watermarks. So whether it be a deepfake video, a deepfake voice profile creation, code creation, all these kind of threats that are unique and faster moving, our AI threat powered threat Cloud sees it and we have the largest threat cloud in the in the business. But what's unique about ours is we have the countermeasures devised in about 2 or 3 seconds and then distributed out to our entire environment. So we have the countermeasures in place in seconds for these newest threats. Awesome, awesome. Um, if someone wants to I mean, obviously, there's a lot to know about Check Point. Uh, what would you say should be their first step in getting more acquainted with what you guys do? If they don't really know? You know, you can go to the website, but websites or websites, the best thing you can do is, is call somebody at Check Point there. We've got local reps everywhere. They're going to come see your problem. We're going to listen to what your issue is, whether it's email or data center or cloud. Whatever your challenge is, we're probably going to have a solution or a partner to, to to walk in with you. You know, we have we're completely partner driven organization. So you can call the optics and the worldwide technologies and the and the processes and the computer centers and everybody else, and they'll give you their angle. But if you call Check Point, you're going to get an expert. That's the other thing. We only hire. We hire the best of the best. So when we come in, you're getting a pro from Dover who's going to understand your problem? Seen it before. We've got a bunch of old guys like me and old gals working for the company. So, yeah, but we've seen the challenges and we know the most an optimal way to approach it. So we love to talk directly with customers. And the customers love, you know, us helping them solve problems because that's what we do. Very customer focused, but but very partner driven as well. Like to hear about it. Thank you so much. Thanks, Mike for interviewing us. And we'd love to hear from you at Check Point. Come out and check out the website and we'll have some fun with you. Couldn't have said it better. Who's going to get the last word? I am.

Check Point’s Pete Nicoletti doesn’t pull punches—they’ve been doing this for 30+ years, and their firewall legacy speaks volumes. Touting zero known vulnerabilities and a hardened development lifecycle, Check Point tackles the AI threat landscape with real-time threat countermeasures, a powerful threat cloud, and a serious no-nonsense approach to efficacy, especially around email and app security.

Categories:
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Small World Big Data
  • » Cybersecurity Webinars
  • » Cybersecurity Webinars » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • check
  • point
  • firewalls
  • ai
  • security
  • threat
  • prevention
  • secure
  • development
  • zero
  • vulnerabilities
  • email
  • security
  • application
  • security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Check Point: Vulnerabilities? Not in This House

              Upcoming Webinar Calendar

              • 12/16/2025
                01:00 PM
                12/16/2025
                HUMAN Dialogue: Unveiling True Content Insights for Enhanced Performance through Page-Level Intelligence
                https://www.truthinit.com/index.php/channel/1630/human-dialogue-unveiling-true-content-insights-for-enhanced-performance-through-page-level-intelligence/
              • 12/18/2025
                11:00 AM
                12/18/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/
              • 12/18/2025
                01:00 PM
                12/18/2025
                Insights on IconAds, SlopAds, and AI Threats by 2026
                https://www.truthinit.com/index.php/channel/1649/insights-on-iconads-slopads-and-ai-threats-by-2026/
              • 01/22/2026
                01:00 PM
                01/22/2026
                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA
                https://www.truthinit.com/index.php/channel/1668/netskope-securing-access-go-beyond-vpn-and-nac-to-universal-ztna/

              Upcoming Spotlight Events

              • Jan
                22

                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                01/22/202601:00 PM ET
                More events

                Upcoming Industry Events

                • Dec
                  16

                  HUMAN Dialogue: Unveiling True Content Insights for Enhanced Performance through Page-Level Intelligence

                  12/16/202501:00 PM ET
                  • Dec
                    18

                    Trend Micro Webinar: Smarter Decision Making via Network Intelligence

                    12/18/202511:00 AM ET
                    • Dec
                      18

                      Insights on IconAds, SlopAds, and AI Threats by 2026

                      12/18/202501:00 PM ET
                      More events

                      Upcoming 360 View Events

                      • Dec
                        18

                        360View: 2026 IT Predictions & Emerging Trends

                        12/18/202512:00 PM ET
                        More events

                        Recent Spotlight Events

                        • Dec
                          10

                          The Next Generation of Managed Data Security Services

                          12/10/202501:00 PM ET
                          • Dec
                            02

                            The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                            12/02/202501:00 PM ET
                            • Nov
                              20

                              Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                              11/20/202501:00 PM ET
                              More events

                              Recent Industry Events

                              • Dec
                                11

                                Partner Tech Insights: Bridge Gaps and Enhance Revenue with Druva’s Microsoft Expansion.

                                12/11/202501:00 PM ET
                                • Dec
                                  11

                                  Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions

                                  12/11/202512:00 PM ET
                                  • Dec
                                    11

                                    Revamping Active Directory Management to Stay Secure in 2025

                                    12/11/202508:00 AM ET
                                    More events
                                    Truth in IT
                                    • Sponsor
                                    • About Us
                                    • Terms of Service
                                    • Privacy Policy
                                    • Contact Us
                                    • Preference Management
                                    Desktop version
                                    Standard version