24/10/2025
A Risk We Can’t Ignore: Burnout in Cyber Security
One of the key risks that we have been working through in 2025 is one of human error. Many people…
Published: 13/08/23
Set a periodic schedule using the -e flag, set up your waiting SFTP server and have your chosen files securely transferred via the network for analysis and/or long-term storage.
Remember to change the max file size using the -m flag if you wish to collect files over 100MB as is the default configuration.
The following Check Point devices are supported :
✅ Multi-Domain Security Management
✅ Quantum Maestro
✅ Quantum Scalable Chassis
✅ Quantum Security Gateways
✅ Quantum Security Management
✅ VSX
More information is available here.
For any Check Point related questions feel free to reach out to SEP2, a proud Elite Partner, and speak with one of our CCSM Elite technical engineers to get your questions answered.
24/10/2025
One of the key risks that we have been working through in 2025 is one of human error. Many people…
17/10/2025
SEP2 are proud to celebrate Gartner’s recognition of Google as a Leader in their 2025 Gartner® Magic Quadrant™ for Security…
07/10/2025
At SEP2, we’re passionate about nurturing new talent and helping individuals discover their potential in the cyber security field.