The exponential growth of data from various sources like network, cloud, mobile, and virtual systems constantly introduces new threats. This is the fifth generation of cyber attacks.

Organizations need to quickly adapt and protect themselves, requiring more powerful, high-performance security. Check Point Infinity, the first consolidated security across networks, cloud and mobile, provides the highest level of threat prevention against both known and unknown targeted attacks to keep you protected now and in the future.

Check Point R80.10, part of Check Point Infinity, takes security management to new levels, merging security leadership with Ease of use –into a unified console for a full-spectrum visibility. The R80.10 provides organizations improved performance of powerful security features, with a new user-friendly front-end.

We are getting closer to the end of support date of R77.30 (September ’19) and we are more than happy to tell you about the most important changes in the R80.10 and R80.20 releases, in order to make a transition to this new release as smooth as possible.

Check Point invites you to a brief Lunch & Learn session* about the latest unified security management.


  • The new Management Architecture
  • Policy Management, logging and monitoring
    • Layers (ordered and inline)
    • Unified policy
    • Role based administration
    • API
    • Security Zones
    • Datacenter- and updatable objects
    • The new Event and Reporter functionality
  • Gateway improvements
    • Unified Threat Prevention policy management
    • Threat Prevention improvements
    • SecureXL improvements

December 13, 2018

10am – 4pm

Tolnasingel 2
2411 PV Bodegraven

*This session is dedicated for end users only