Blog

Enterprise Cybersecurity Solutions Knowledge Base

Tuning and Optimizing Check Point Firewall's Ring Buffer | Compuquip

Is your firewall dropping allowed traffic unexpectedly, without logging? Does it seem like your..

David Barker
David Barker
January 25, 2021

Is XDR The Next Big Thing In Cybersecurity?

Welcome to 2021, and welcome to another year of new and emerging technologies. Although XDR rose to..

Jose Bormey
Jose Bormey
January 21, 2021

Upgrade & Hotfix a Cluster With Check Point's Central Deployment Tool

The Check Point Central Deployment Tool (CDT) is a utility that builds on the subject of my last..

David Barker
David Barker
November 27, 2020

AskAnEngineer: Is A SASE Model The Future For Organizations?

If you haven’t already heard, secure access service edge (SASE for short) is what Gartner refers to..

Jose Bormey
Jose Bormey
November 25, 2020

CRO Ricardo Panez to Become Compuquip President & COO

With over two years in the books now, Ricardo Panez has been instrumental to our expansions across..

Jose Bormey
Jose Bormey
October 28, 2020

Using the Check Point Remote Installation Daemon for Firewall System Administration

Long a feature of multitasking operating systems, a daemon is a computer program that runs in the..

David Barker
David Barker
October 26, 2020

Why Your Business Needs Cloud Security Posture Management

As a cybersecurity community, we cannot forget about the human aspect of this profession. Even the..

Jose Bormey
Jose Bormey
October 22, 2020

Say Hello to Our New Director of Services, Abrael Delgado!

Since joining the Compuquip team in 2015, Abrael has fostered an environment within our services..

Jose Bormey
Jose Bormey
October 15, 2020

Pros + Cons to Consider Before Migrating to The Cloud

For years now, the thought of migrating to “The Cloud” is one that many organizations shared..

Jose Bormey
Jose Bormey
September 23, 2020

Clearing RAM Cache, Buffer & Swap Space on a Check Point Firewall | CQ

Does your firewall seem like it is always low on memory? Does it get sluggish at times and seem..

David Barker
David Barker
September 21, 2020

Phishing: The Common Culprit

This blog post will describe the concept of Phishing and how attackers configure deceiving sites to..

Abrael Delgado
Abrael Delgado
August 12, 2020

Securing Machine Learning Systems to Avoid Security Risks

If you are an organization that uses machine learning (ML), plans to use ML, or works with vendors..

Lenny Simon
Lenny Simon
August 4, 2020

contact us

Protect your business with our cybersecurity solutions

Elevate your cybersecurity efforts now to prevent costly breaches. Let’s discuss next steps. Complete this form so our IT security professionals can get in touch with you.

Compuquip uses the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

What are you looking for?