![]() If you already deploy a Check Point Security Gateway, Cloud expands the number of blades available and offloads roaming user traffic to the cloud.Ĭheck Point Cloud tunnels the traffic initiated by the client to the cloud service. By tunneling all roaming user traffic to a firewall-in-the-cloud for security inspection, security is extended beyond the immediate enterprise. All traffic to and from the Internet is inspected for a variety of threats.Ĭloud helps enterprises protect roaming users (laptops) when they are outside the secured office environment. No further configuration is required by the employee. ![]()
0 Comments
Leave a Reply. |