Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library

Check Point: Vulnerabilities? Not in This House

Truth in IT
05/05/2025
20
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett Small World Big Data. We are here at RSAC 2025. Lots and lots of people here. Lots and lots of cybersecurity goodness going on. Lot of excitement. I 'm with Check Point software and they are excited. So we're going to get right into it and ask first of all what what role does Check Point play in in cybersecurity regime. We're in the middle of it all. We started the whole everybody here is because we started this business. We started the firewall business over 30 years ago with our CEO, and we've maintained some market share. And now we've got some leading products that are addressing some of the biggest risks that companies around the world are seeing. You know, we just saw, you know, you were just interviewing our partner there, Verizon. They just released their breach report. Email is still the number one threat vector. And we have the number one product. We're also seeing web application security attacks. We're still seeing firewall attacks. And we have the highest efficacy tools out there. Check Points number one in efficacy. We also it's kind of a fun place to be. We don't have vulnerabilities. Our product doesn't have what other security vendors are going through with the patching regimen and the the nightmare of having your firewall exploited by the bad guys. We don't have that kind of a problem. Why don't you have any vulnerabilities? Well, it's really the Israeli development life cycle. They're it's so they're so paranoid. They're so security conscious. Everybody goes through the military. It's built into their DNA. We're kind of lazy. You know, Americans are security. Israelis take security extremely serious. And the world that uses Check Point gets that benefit. Let me look around the show here and think about the big trends that we're seeing. What what do you call out so far about this year's RSAC and what everyone's talking about, and then what you guys are bringing to the table? Sure. So, of course, I got to say artificial intelligence. I got to say it. I hate to say it, but. So we're seeing two things. We're seeing you have to fight. Artificial intelligence created threats with a bigger gun. I like to say you need to bring a bigger AI gun to the AI gunfight. So your LLM is extra LLM? Well, it's extra strong. So we don't we don't we have our own LLM, which is really kind of cool. We've got copilot. You can talk to your firewall. It'll tell you what you need to fix and whatnot. But the threats we're seeing, we just released our new AI threat report, which has got some quite unique findings in it, where the criminals are using llms that don't have guardrails, they don't have watermarks. So whether it be a deepfake video, a deepfake voice profile creation, code creation, all these kind of threats that are unique and faster moving, our AI threat powered threat Cloud sees it and we have the largest threat cloud in the in the business. But what's unique about ours is we have the countermeasures devised in about 2 or 3 seconds and then distributed out to our entire environment. So we have the countermeasures in place in seconds for these newest threats. Awesome, awesome. Um, if someone wants to I mean, obviously, there's a lot to know about Check Point. Uh, what would you say should be their first step in getting more acquainted with what you guys do? If they don't really know? You know, you can go to the website, but websites or websites, the best thing you can do is, is call somebody at Check Point there. We've got local reps everywhere. They're going to come see your problem. We're going to listen to what your issue is, whether it's email or data center or cloud. Whatever your challenge is, we're probably going to have a solution or a partner to, to to walk in with you. You know, we have we're completely partner driven organization. So you can call the optics and the worldwide technologies and the and the processes and the computer centers and everybody else, and they'll give you their angle. But if you call Check Point, you're going to get an expert. That's the other thing. We only hire. We hire the best of the best. So when we come in, you're getting a pro from Dover who's going to understand your problem? Seen it before. We've got a bunch of old guys like me and old gals working for the company. So, yeah, but we've seen the challenges and we know the most an optimal way to approach it. So we love to talk directly with customers. And the customers love, you know, us helping them solve problems because that's what we do. Very customer focused, but but very partner driven as well. Like to hear about it. Thank you so much. Thanks, Mike for interviewing us. And we'd love to hear from you at Check Point. Come out and check out the website and we'll have some fun with you. Couldn't have said it better. Who's going to get the last word? I am.

Check Point’s Pete Nicoletti doesn’t pull punches—they’ve been doing this for 30+ years, and their firewall legacy speaks volumes. Touting zero known vulnerabilities and a hardened development lifecycle, Check Point tackles the AI threat landscape with real-time threat countermeasures, a powerful threat cloud, and a serious no-nonsense approach to efficacy, especially around email and app security.

Categories:
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Small World Big Data
  • » Cybersecurity Webinars
  • » Cybersecurity Webinars » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • check
  • point
  • firewalls
  • ai
  • security
  • threat
  • prevention
  • secure
  • development
  • zero
  • vulnerabilities
  • email
  • security
  • application
  • security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Check Point: Vulnerabilities? Not in This House

              Upcoming Webinar Calendar

              • 10/22/2025
                01:00 PM
                10/22/2025
                Cut Ticket Resolution Time in Half with Smarter IT Documentation
                https://www.truthinit.com/index.php/channel/1541/cut-ticket-resolution-time-in-half-with-smarter-it-documentation/
              • 10/23/2025
                12:00 PM
                10/23/2025
                360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure
                https://www.truthinit.com/index.php/channel/931/360view-preventing-data-exfiltration-keeping-enterprise-data-secure/
              • 10/23/2025
                12:00 PM
                10/23/2025
                Secureframe: CMMC Series - Crafting a Readiness Roadmap for Streamlined Certification Success
                https://www.truthinit.com/index.php/channel/1535/cmmc-series-crafting-a-readiness-roadmap-for-streamlined-certification-success/
              • 10/28/2025
                12:00 PM
                10/28/2025
                Reimagining Data Security: Regain Your Control and Confidence
                https://www.truthinit.com/index.php/channel/1432/reimagining-data-security-regain-your-control-and-confidence/
              • 10/30/2025
                06:00 AM
                10/30/2025
                Rethink secure access solutions beyond VPN and NAC in a zero trust landscape.
                https://www.truthinit.com/index.php/channel/1547/rethink-secure-access-solutions-beyond-vpn-and-nac-in-a-zero-trust-landscape/
              • 10/30/2025
                12:00 PM
                10/30/2025
                Revolutionizing Secure Access Beyond VPN and NAC for a Zero Trust Era
                https://www.truthinit.com/index.php/channel/1546/revolutionizing-secure-access-beyond-vpn-and-nac-for-a-zero-trust-era/
              • 11/12/2025
                12:00 PM
                11/12/2025
                Zendesk Customer Spotlight [Pure Insurance]: How to Scale Employee Service from IT to HR
                https://www.truthinit.com/index.php/channel/1545/zendesk-customer-spotlight-pure-insurance-how-to-scale-employee-service-from-it-to-hr/
              • 11/12/2025
                10:00 PM
                11/12/2025
                Transforming AI Buzz into Tangible Business Value with Druva
                https://www.truthinit.com/index.php/channel/1555/transforming-ai-buzz-into-tangible-business-value-with-druva/
              • 11/13/2025
                05:00 AM
                11/13/2025
                Transform AI Buzz into Tangible Business Success with Druva
                https://www.truthinit.com/index.php/channel/1554/transform-ai-buzz-into-tangible-business-success-with-druva/
              • 11/13/2025
                12:30 PM
                11/13/2025
                Insights from a Certified CMMC Assessor: Sidestepping Common Assessment Pitfalls
                https://www.truthinit.com/index.php/channel/1536/insights-from-a-certified-cmmc-assessor-sidestepping-common-assessment-pitfalls/
              • 11/13/2025
                01:00 PM
                11/13/2025
                Partner Sales Insights: Transforming AI Buzz into Tangible Business Value with Druva
                https://www.truthinit.com/index.php/channel/1556/partner-sales-insights-transforming-ai-buzz-into-tangible-business-value-with-druva/
              • 11/20/2025
                12:00 PM
                11/20/2025
                Next Steps After CMMC Certification: Strategies for Ongoing Compliance and Maintenance
                https://www.truthinit.com/index.php/channel/1558/next-steps-after-cmmc-certification-strategies-for-ongoing-compliance-and-maintenance/
              • 11/20/2025
                12:00 PM
                11/20/2025
                360View: Budget Optimization: Doing More with Less
                https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
              • 12/04/2025
                12:00 PM
                12/04/2025
                CMMC Level 2 Assessment Insights: Expectations from an OSC and C3PAO Assessor
                https://www.truthinit.com/index.php/channel/1557/cmmc-level-2-assessment-insights-expectations-from-an-osc-and-c3pao-assessor/
              • 12/09/2025
                02:00 PM
                12/09/2025
                Energize Your Connections Through Netskope and Presidio Solutions
                https://www.truthinit.com/index.php/channel/1553/energize-your-connections-through-netskope-and-presidio-solutions/
              • 12/11/2025
                12:00 PM
                12/11/2025
                Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
                https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

              Upcoming Spotlight Events

              • Oct
                22

                Cut Ticket Resolution Time in Half with Smarter IT Documentation

                10/22/202501:00 PM ET
                More events

                Upcoming Industry Events

                • Oct
                  23

                  Secureframe: CMMC Series - Crafting a Readiness Roadmap for Streamlined Certification Success

                  10/23/202512:00 PM ET
                  • Oct
                    28

                    Reimagining Data Security: Regain Your Control and Confidence

                    10/28/202512:00 PM ET
                    • Oct
                      30

                      Rethink secure access solutions beyond VPN and NAC in a zero trust landscape.

                      10/30/202506:00 AM ET
                      More events

                      Upcoming 360 View Events

                      • Oct
                        23

                        360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure

                        10/23/202512:00 PM ET
                        • Nov
                          20

                          360View: Budget Optimization: Doing More with Less

                          11/20/202512:00 PM ET
                          • Dec
                            18

                            360View: 2026 IT Predictions & Emerging Trends

                            12/18/202512:00 PM ET
                            More events

                            Recent Spotlight Events

                            • Oct
                              15

                              Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?

                              10/15/202501:00 PM ET
                              • Sep
                                16

                                KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield

                                09/16/202501:00 PM ET
                                • Sep
                                  11

                                  Cyera: An Executive’s Guide to Secure AI Adoption

                                  09/11/202501:00 PM ET
                                  More events

                                  Recent Industry Events

                                  • Oct
                                    16

                                    Secureframe: ISO 27001 for Startups: Understanding Its Importance and Accelerating Certification

                                    10/16/202512:30 PM ET
                                    • Oct
                                      16

                                      EMEA Cyber Resilience for VMware: Achieving Clean Recovery with Clarity

                                      10/16/202506:00 AM ET
                                      • Oct
                                        15

                                        APAC Modern Cyber Resilience for VMware: Achieving Seamless Recovery with Confidence

                                        10/15/202512:30 AM ET
                                        More events
                                        Truth in IT
                                        • Sponsor
                                        • About Us
                                        • Terms of Service
                                        • Privacy Policy
                                        • Contact Us
                                        • Preference Management
                                        Desktop version
                                        Standard version