02/03/2026
Secure Access: 3 Critical Lessons for the Identity-First Perimeter
Our Head of Technology, James Woodward, explains why secure access is essential for transitioning to an identity-first perimeter and shares…
Published: 07/11/24
If you are using the latest Check Point Software hardware models such as :
✅19000
✅29000
✅9000
✅MLS/QLS LightSpeed
… and you notice the system load is much higher than expected upon a fresh install or during known quieter periods with little network throughput.
👉 DO NOT PANIC – the system is working by design !
SecureXL has been moved to User Space on specific Jumbo HotFix versions, which has the impact of making the more traditional long serving Linux tools unable to accurately determine true system resource usage.
However, all is not lost, Check Point provide the following tooling that provides accurate monitoring data for system administrators to maintain a healthy system workload and operational efficiency.
✅CPview (sk101878) – CPU > Overview > Host
✅Skyline (sk178566) – “System > CPU”
✅SNMP OID 1.3.6.1.4.1.2620.1.6.7.5
More information and in depth detailed breakdown is provided here by Check Point.
02/03/2026
Our Head of Technology, James Woodward, explains why secure access is essential for transitioning to an identity-first perimeter and shares…
20/02/2026
We are proud to announce that SEP2 has earned a Bronze Medal in our latest EcoVadis Sustainability Assessment, placing us…
11/02/2026
Our Chosen Charity of the Year SEP2’s Charity Committee is delighted to announce Maxi’s Mates as our official Charity of…