Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library

Check Point: Vulnerabilities? Not in This House

Truth in IT
05/05/2025
20
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett Small World Big Data. We are here at RSAC 2025. Lots and lots of people here. Lots and lots of cybersecurity goodness going on. Lot of excitement. I 'm with Check Point software and they are excited. So we're going to get right into it and ask first of all what what role does Check Point play in in cybersecurity regime. We're in the middle of it all. We started the whole everybody here is because we started this business. We started the firewall business over 30 years ago with our CEO, and we've maintained some market share. And now we've got some leading products that are addressing some of the biggest risks that companies around the world are seeing. You know, we just saw, you know, you were just interviewing our partner there, Verizon. They just released their breach report. Email is still the number one threat vector. And we have the number one product. We're also seeing web application security attacks. We're still seeing firewall attacks. And we have the highest efficacy tools out there. Check Points number one in efficacy. We also it's kind of a fun place to be. We don't have vulnerabilities. Our product doesn't have what other security vendors are going through with the patching regimen and the the nightmare of having your firewall exploited by the bad guys. We don't have that kind of a problem. Why don't you have any vulnerabilities? Well, it's really the Israeli development life cycle. They're it's so they're so paranoid. They're so security conscious. Everybody goes through the military. It's built into their DNA. We're kind of lazy. You know, Americans are security. Israelis take security extremely serious. And the world that uses Check Point gets that benefit. Let me look around the show here and think about the big trends that we're seeing. What what do you call out so far about this year's RSAC and what everyone's talking about, and then what you guys are bringing to the table? Sure. So, of course, I got to say artificial intelligence. I got to say it. I hate to say it, but. So we're seeing two things. We're seeing you have to fight. Artificial intelligence created threats with a bigger gun. I like to say you need to bring a bigger AI gun to the AI gunfight. So your LLM is extra LLM? Well, it's extra strong. So we don't we don't we have our own LLM, which is really kind of cool. We've got copilot. You can talk to your firewall. It'll tell you what you need to fix and whatnot. But the threats we're seeing, we just released our new AI threat report, which has got some quite unique findings in it, where the criminals are using llms that don't have guardrails, they don't have watermarks. So whether it be a deepfake video, a deepfake voice profile creation, code creation, all these kind of threats that are unique and faster moving, our AI threat powered threat Cloud sees it and we have the largest threat cloud in the in the business. But what's unique about ours is we have the countermeasures devised in about 2 or 3 seconds and then distributed out to our entire environment. So we have the countermeasures in place in seconds for these newest threats. Awesome, awesome. Um, if someone wants to I mean, obviously, there's a lot to know about Check Point. Uh, what would you say should be their first step in getting more acquainted with what you guys do? If they don't really know? You know, you can go to the website, but websites or websites, the best thing you can do is, is call somebody at Check Point there. We've got local reps everywhere. They're going to come see your problem. We're going to listen to what your issue is, whether it's email or data center or cloud. Whatever your challenge is, we're probably going to have a solution or a partner to, to to walk in with you. You know, we have we're completely partner driven organization. So you can call the optics and the worldwide technologies and the and the processes and the computer centers and everybody else, and they'll give you their angle. But if you call Check Point, you're going to get an expert. That's the other thing. We only hire. We hire the best of the best. So when we come in, you're getting a pro from Dover who's going to understand your problem? Seen it before. We've got a bunch of old guys like me and old gals working for the company. So, yeah, but we've seen the challenges and we know the most an optimal way to approach it. So we love to talk directly with customers. And the customers love, you know, us helping them solve problems because that's what we do. Very customer focused, but but very partner driven as well. Like to hear about it. Thank you so much. Thanks, Mike for interviewing us. And we'd love to hear from you at Check Point. Come out and check out the website and we'll have some fun with you. Couldn't have said it better. Who's going to get the last word? I am.

Check Point’s Pete Nicoletti doesn’t pull punches—they’ve been doing this for 30+ years, and their firewall legacy speaks volumes. Touting zero known vulnerabilities and a hardened development lifecycle, Check Point tackles the AI threat landscape with real-time threat countermeasures, a powerful threat cloud, and a serious no-nonsense approach to efficacy, especially around email and app security.

Categories:
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Small World Big Data
  • » Cybersecurity Webinars
  • » Cybersecurity Webinars » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • check
  • point
  • firewalls
  • ai
  • security
  • threat
  • prevention
  • secure
  • development
  • zero
  • vulnerabilities
  • email
  • security
  • application
  • security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Check Point: Vulnerabilities? Not in This House

              Upcoming Webinar Calendar

              • 11/12/2025
                12:00 PM
                11/12/2025
                Zendesk Customer Spotlight [Pure Insurance]: How to Scale Employee Service from IT to HR
                https://www.truthinit.com/index.php/channel/1545/zendesk-customer-spotlight-pure-insurance-how-to-scale-employee-service-from-it-to-hr/
              • 11/12/2025
                10:00 PM
                11/12/2025
                Transforming AI Trends into Tangible Business Success with Druva
                https://www.truthinit.com/index.php/channel/1555/transforming-ai-trends-into-tangible-business-success-with-druva/
              • 11/13/2025
                05:00 AM
                11/13/2025
                EMEA Partner Sales Talk: Transforming AI Buzz into Tangible Business Value with Druva
                https://www.truthinit.com/index.php/channel/1554/emea-partner-sales-talk-transforming-ai-buzz-into-tangible-business-value-with-druva/
              • 11/13/2025
                12:30 PM
                11/13/2025
                Insights from a Certified CMMC Assessor: Sidestepping Common Assessment Pitfalls
                https://www.truthinit.com/index.php/channel/1536/insights-from-a-certified-cmmc-assessor-sidestepping-common-assessment-pitfalls/
              • 11/13/2025
                01:00 PM
                11/13/2025
                Transforming AI Buzz into Tangible Business Gains with Druva
                https://www.truthinit.com/index.php/channel/1556/transforming-ai-buzz-into-tangible-business-gains-with-druva/
              • 11/13/2025
                01:00 PM
                11/13/2025
                Innovative Strategies from LinkedIn + HUMAN to Combat Click Fraud and Enhance Campaigns
                https://www.truthinit.com/index.php/channel/1583/innovative-strategies-from-linkedin-human-to-combat-click-fraud-and-enhance-campaigns/
              • 11/18/2025
                01:00 PM
                11/18/2025
                Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook
                https://www.truthinit.com/index.php/channel/1579/microsoft-advanced-group-policy-management-agpm-end-of-life-your-practical-migration-playbook/
              • 11/18/2025
                01:00 PM
                11/18/2025
                HUMAN Dialogue: Fostering Trust Amidst the Rise of Agentic Commerce
                https://www.truthinit.com/index.php/channel/1582/human-dialogue-fostering-trust-amidst-the-rise-of-agentic-commerce/
              • 11/20/2025
                05:00 AM
                11/20/2025
                Druva: Prove you can outsmart ransomware in this virtual cyber recovery simulation!
                https://www.truthinit.com/index.php/channel/1619/untitled-channel/
              • 11/20/2025
                11:00 AM
                11/20/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 11/20/2025
                12:00 PM
                11/20/2025
                360View: Budget Optimization: Doing More with Less
                https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
              • 11/20/2025
                12:00 PM
                11/20/2025
                CMMC Certification: Next Steps for Continuous Monitoring and Management
                https://www.truthinit.com/index.php/channel/1558/cmmc-certification-next-steps-for-continuous-monitoring-and-management/
              • 11/20/2025
                01:00 PM
                11/20/2025
                Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era
                https://www.truthinit.com/index.php/channel/1612/rethinking-hybrid-access-securing-users-vendors-and-infrastructure-in-the-zero-trust-era/
              • 12/04/2025
                12:00 PM
                12/04/2025
                CMMC Level 2 Assessment Insights: Expectations from an OSC and C3PAO Assessor
                https://www.truthinit.com/index.php/channel/1557/cmmc-level-2-assessment-insights-expectations-from-an-osc-and-c3pao-assessor/
              • 12/09/2025
                01:00 PM
                12/09/2025
                Energize Your Connections with Netskope and Presidio Collaboration
                https://www.truthinit.com/index.php/channel/1553/energize-your-connections-with-netskope-and-presidio-collaboration/
              • 12/10/2025
                01:00 PM
                12/10/2025
                The Next Generation of Managed Data Security Services
                https://www.truthinit.com/index.php/channel/1620/cyera-the-next-generation-of-managed-data-security-services/
              • 12/11/2025
                12:00 PM
                12/11/2025
                Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
                https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

              Discover. Register. Attend. Win.

              • November 2025 D.R.A.W.

                November 2025 D.R.A.W.

                10/27/202501:17 PM ET

                Upcoming Spotlight Events

                • Nov
                  18

                  Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook

                  11/18/202501:00 PM ET
                  • Nov
                    20

                    Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                    11/20/202501:00 PM ET
                    • Dec
                      10

                      The Next Generation of Managed Data Security Services

                      12/10/202501:00 PM ET
                      More events

                      Upcoming Industry Events

                      • Nov
                        12

                        Zendesk Customer Spotlight [Pure Insurance]: How to Scale Employee Service from IT to HR

                        11/12/202512:00 PM ET
                        • Nov
                          12

                          Transforming AI Trends into Tangible Business Success with Druva

                          11/12/202510:00 PM ET
                          • Nov
                            13

                            EMEA Partner Sales Talk: Transforming AI Buzz into Tangible Business Value with Druva

                            11/13/202505:00 AM ET
                            More events

                            Upcoming 360 View Events

                            • Nov
                              20

                              360View: Budget Optimization: Doing More with Less

                              11/20/202512:00 PM ET
                              • Dec
                                18

                                360View: 2026 IT Predictions & Emerging Trends

                                12/18/202512:00 PM ET
                                More events

                                Recent Spotlight Events

                                • Oct
                                  22

                                  Cut Ticket Resolution Time in Half with Smarter IT Documentation

                                  10/22/202501:00 PM ET
                                  • Oct
                                    15

                                    Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?

                                    10/15/202501:00 PM ET
                                    • Sep
                                      16

                                      KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield

                                      09/16/202501:00 PM ET
                                      More events

                                      Recent Industry Events

                                      • Oct
                                        30

                                        Rethinking Secure Access Beyond VPN and NAC for a Zero Trust Era

                                        10/30/202512:00 PM ET
                                        • Oct
                                          30

                                          Rethink secure access solutions in a zero trust landscape beyond VPN and NAC.

                                          10/30/202506:00 AM ET
                                          • Oct
                                            29

                                            Practical Strategies for Platform Engineering in the AI Era

                                            10/29/202512:00 PM ET
                                            More events
                                            Truth in IT
                                            • Sponsor
                                            • About Us
                                            • Terms of Service
                                            • Privacy Policy
                                            • Contact Us
                                            • Preference Management
                                            Desktop version
                                            Standard version