CCMA's blog

This is a professional blog of Check Point Certified Master Architect (CCMA). It does not represent position of my current employer.

Wednesday, February 19, 2014

VSX R6x to R7x migration tips

›
As you all know, VSX R65 is out of support, and VSX R67 is about to be. Check Point is recommending customers to move to R7x versions as qu...
10 comments:
Tuesday, January 14, 2014

Check Point Quick Tips blog

›
There is an interesting blog about Check Point tricks: "Check Point Quick Tips by Kishin Fatnani" , check it out. Kishin  is a ...
5 comments:
Tuesday, January 7, 2014

Palo Alto acquires an Advanced Threat specialised startup

›
It has been announced that that Palo Alto has acquired Morta Security , a company specialised in APT . It is the second most interesting ac...
Tuesday, December 31, 2013

Security Professional's Nightmare

›
Reportedly, NSA could install backdoors to Juniper devices . Oh my, oh my... Spiegel reporter really has his fun, quoting: "When i...
Tuesday, December 17, 2013

Do we want CPUGcon?

›
With Check Point User Group (CPUG) , we are used to have not only a valuable place to exchange ideas and experience but also an annual eve...
1 comment:
Thursday, December 5, 2013

Three reasons why Check Point DDOS Protector is NOT a Check Point solution

›
Last year Check Point has added a number of so-called DDOS Protector appliances to its portfolio. It is not a secret that this so...
2 comments:
Tuesday, December 3, 2013

Misleading certificate re-creation error

›
A customer of mine has to renew VPN certificate signed by VeriSign because it is about to expire.  The normal procedure would be to delete ...
‹
›
Home
View web version

About Me

My photo
Valeri Loukine
Techniques, methods and tools described in this blog may require advanced expertise to use. Some information presented here may be incorrect or incomplete. Use it on your own risk. Author is not liable in case of any damage. For resolution of your technical issues related to Check Point Software Technologies products and systems always follow standard support procedures.
View my complete profile
Powered by Blogger.