Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Check Point: Vulnerabilities? Not in This House

Truth in IT
05/05/2025
20
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett Small World Big Data. We are here at RSAC 2025. Lots and lots of people here. Lots and lots of cybersecurity goodness going on. Lot of excitement. I 'm with Check Point software and they are excited. So we're going to get right into it and ask first of all what what role does Check Point play in in cybersecurity regime. We're in the middle of it all. We started the whole everybody here is because we started this business. We started the firewall business over 30 years ago with our CEO, and we've maintained some market share. And now we've got some leading products that are addressing some of the biggest risks that companies around the world are seeing. You know, we just saw, you know, you were just interviewing our partner there, Verizon. They just released their breach report. Email is still the number one threat vector. And we have the number one product. We're also seeing web application security attacks. We're still seeing firewall attacks. And we have the highest efficacy tools out there. Check Points number one in efficacy. We also it's kind of a fun place to be. We don't have vulnerabilities. Our product doesn't have what other security vendors are going through with the patching regimen and the the nightmare of having your firewall exploited by the bad guys. We don't have that kind of a problem. Why don't you have any vulnerabilities? Well, it's really the Israeli development life cycle. They're it's so they're so paranoid. They're so security conscious. Everybody goes through the military. It's built into their DNA. We're kind of lazy. You know, Americans are security. Israelis take security extremely serious. And the world that uses Check Point gets that benefit. Let me look around the show here and think about the big trends that we're seeing. What what do you call out so far about this year's RSAC and what everyone's talking about, and then what you guys are bringing to the table? Sure. So, of course, I got to say artificial intelligence. I got to say it. I hate to say it, but. So we're seeing two things. We're seeing you have to fight. Artificial intelligence created threats with a bigger gun. I like to say you need to bring a bigger AI gun to the AI gunfight. So your LLM is extra LLM? Well, it's extra strong. So we don't we don't we have our own LLM, which is really kind of cool. We've got copilot. You can talk to your firewall. It'll tell you what you need to fix and whatnot. But the threats we're seeing, we just released our new AI threat report, which has got some quite unique findings in it, where the criminals are using llms that don't have guardrails, they don't have watermarks. So whether it be a deepfake video, a deepfake voice profile creation, code creation, all these kind of threats that are unique and faster moving, our AI threat powered threat Cloud sees it and we have the largest threat cloud in the in the business. But what's unique about ours is we have the countermeasures devised in about 2 or 3 seconds and then distributed out to our entire environment. So we have the countermeasures in place in seconds for these newest threats. Awesome, awesome. Um, if someone wants to I mean, obviously, there's a lot to know about Check Point. Uh, what would you say should be their first step in getting more acquainted with what you guys do? If they don't really know? You know, you can go to the website, but websites or websites, the best thing you can do is, is call somebody at Check Point there. We've got local reps everywhere. They're going to come see your problem. We're going to listen to what your issue is, whether it's email or data center or cloud. Whatever your challenge is, we're probably going to have a solution or a partner to, to to walk in with you. You know, we have we're completely partner driven organization. So you can call the optics and the worldwide technologies and the and the processes and the computer centers and everybody else, and they'll give you their angle. But if you call Check Point, you're going to get an expert. That's the other thing. We only hire. We hire the best of the best. So when we come in, you're getting a pro from Dover who's going to understand your problem? Seen it before. We've got a bunch of old guys like me and old gals working for the company. So, yeah, but we've seen the challenges and we know the most an optimal way to approach it. So we love to talk directly with customers. And the customers love, you know, us helping them solve problems because that's what we do. Very customer focused, but but very partner driven as well. Like to hear about it. Thank you so much. Thanks, Mike for interviewing us. And we'd love to hear from you at Check Point. Come out and check out the website and we'll have some fun with you. Couldn't have said it better. Who's going to get the last word? I am.

Check Point’s Pete Nicoletti doesn’t pull punches—they’ve been doing this for 30+ years, and their firewall legacy speaks volumes. Touting zero known vulnerabilities and a hardened development lifecycle, Check Point tackles the AI threat landscape with real-time threat countermeasures, a powerful threat cloud, and a serious no-nonsense approach to efficacy, especially around email and app security.

Categories:
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Small World Big Data
  • » Cybersecurity Webinars
  • » Cybersecurity Webinars » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • check
  • point
  • firewalls
  • ai
  • security
  • threat
  • prevention
  • secure
  • development
  • zero
  • vulnerabilities
  • email
  • security
  • application
  • security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Check Point: Vulnerabilities? Not in This House

              Upcoming Webinar Calendar

              • 12/02/2025
                01:00 PM
                12/02/2025
                The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security
                https://www.truthinit.com/index.php/channel/1629/the-invisible-threat-how-polymorphic-malware-is-outsmarting-your-email-security/
              • 12/02/2025
                01:00 PM
                12/02/2025
                Kickstart Your Journey with Netwrix
                https://www.truthinit.com/index.php/channel/1631/kickstart-your-journey-with-netwrix/
              • 12/04/2025
                12:00 PM
                12/04/2025
                Insights from an OSC and C3PAO Assessor on CMMC Level 2 Evaluation
                https://www.truthinit.com/index.php/channel/1557/insights-from-an-osc-and-c3pao-assessor-on-cmmc-level-2-evaluation/
              • 12/04/2025
                01:00 PM
                12/04/2025
                CMMC Success: Enhancing Compliance with Intelligent Endpoint Protection Solutions
                https://www.truthinit.com/index.php/channel/1650/cmmc-success-enhancing-compliance-with-intelligent-endpoint-protection-solutions/
              • 12/09/2025
                01:00 PM
                12/09/2025
                Energize Your Connections with Netskope and Presidio Insights
                https://www.truthinit.com/index.php/channel/1553/energize-your-connections-with-netskope-and-presidio-insights/
              • 12/10/2025
                01:00 PM
                12/10/2025
                The Next Generation of Managed Data Security Services
                https://www.truthinit.com/index.php/channel/1620/cyera-the-next-generation-of-managed-data-security-services/
              • 12/10/2025
                10:00 PM
                12/10/2025
                Partner Tech Talk: Bridge Gaps and Boost Revenue with Druva’s Microsoft Expansion in APAC
                https://www.truthinit.com/index.php/channel/1624/partner-tech-talk-bridge-gaps-and-boost-revenue-with-druvas-microsoft-expansion-in-apac/
              • 12/11/2025
                05:00 AM
                12/11/2025
                Maximize Revenue Opportunities with Druva’s Microsoft Expansion Strategies in EMEA.
                https://www.truthinit.com/index.php/channel/1625/maximize-revenue-opportunities-with-druvas-microsoft-expansion-strategies-in-emea/
              • 12/11/2025
                12:00 PM
                12/11/2025
                Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
                https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
              • 12/11/2025
                01:00 PM
                12/11/2025
                Maximize Revenue Opportunities with Druva's Microsoft Expansion Insights.
                https://www.truthinit.com/index.php/channel/1623/maximize-revenue-opportunities-with-druvas-microsoft-expansion-insights/
              • 12/16/2025
                01:00 PM
                12/16/2025
                HUMAN Dialogue: Uncovering Insights and Safeguarding Performance through Page-Level Intelligence
                https://www.truthinit.com/index.php/channel/1630/human-dialogue-uncovering-insights-and-safeguarding-performance-through-page-level-intelligence/
              • 12/18/2025
                11:00 AM
                12/18/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/
              • 12/18/2025
                01:00 PM
                12/18/2025
                Insightful Perspectives on IconAds, SlopAds, and AI Threats in 2026
                https://www.truthinit.com/index.php/channel/1649/insightful-perspectives-on-iconads-slopads-and-ai-threats-in-2026/

              Upcoming Spotlight Events

              • Dec
                02

                The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                12/02/202501:00 PM ET
                • Dec
                  10

                  The Next Generation of Managed Data Security Services

                  12/10/202501:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Dec
                    04

                    Insights from an OSC and C3PAO Assessor on CMMC Level 2 Evaluation

                    12/04/202512:00 PM ET
                    • Dec
                      04

                      CMMC Success: Enhancing Compliance with Intelligent Endpoint Protection Solutions

                      12/04/202501:00 PM ET
                      • Dec
                        09

                        Energize Your Connections with Netskope and Presidio Insights

                        12/09/202501:00 PM ET
                        More events

                        Upcoming 360 View Events

                        • Dec
                          18

                          360View: 2026 IT Predictions & Emerging Trends

                          12/18/202512:00 PM ET
                          More events

                          Recent Spotlight Events

                          • Nov
                            20

                            Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                            11/20/202501:00 PM ET
                            • Nov
                              18

                              Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook

                              11/18/202501:00 PM ET
                              • Oct
                                22

                                Cut Ticket Resolution Time in Half with Smarter IT Documentation

                                10/22/202501:00 PM ET
                                More events

                                Recent Industry Events

                                • Nov
                                  20

                                  CMMC Certification: Next Steps for Continuous Monitoring and Management

                                  11/20/202512:00 PM ET
                                  • Nov
                                    19

                                    Deep Packet Inspection (DPI) Insights within Endpoint Protector Learning Lab

                                    11/19/202511:00 AM ET
                                    • Nov
                                      18

                                      HUMAN Dialogue: Cultivating Trust Amidst the Rise of Agentic Commerce

                                      11/18/202501:00 PM ET
                                      More events
                                      Truth in IT
                                      • Sponsor
                                      • About Us
                                      • Terms of Service
                                      • Privacy Policy
                                      • Contact Us
                                      • Preference Management
                                      Desktop version
                                      Standard version