02/03/2026
Secure Access: 3 Critical Lessons for the Identity-First Perimeter
Our Head of Technology, James Woodward, explains why secure access is essential for transitioning to an identity-first perimeter and shares…
Published: 13/08/23
Set a periodic schedule using the -e flag, set up your waiting SFTP server and have your chosen files securely transferred via the network for analysis and/or long-term storage.
Remember to change the max file size using the -m flag if you wish to collect files over 100MB as is the default configuration.
The following Check Point devices are supported :
✅ Multi-Domain Security Management
✅ Quantum Maestro
✅ Quantum Scalable Chassis
✅ Quantum Security Gateways
✅ Quantum Security Management
✅ VSX
More information is available here.
For any Check Point related questions feel free to reach out to SEP2, a proud Elite Partner, and speak with one of our CCSM Elite technical engineers to get your questions answered.
02/03/2026
Our Head of Technology, James Woodward, explains why secure access is essential for transitioning to an identity-first perimeter and shares…
20/02/2026
We are proud to announce that SEP2 has earned a Bronze Medal in our latest EcoVadis Sustainability Assessment, placing us…
11/02/2026
Our Chosen Charity of the Year SEP2’s Charity Committee is delighted to announce Maxi’s Mates as our official Charity of…