Which product correlates logs and detects security threats, providing a centralized display of potential attack
patterns from all network devices?
SmartEvent correlates logs from all Check Point enforcement points, including end-points, to
identify suspicious activity from the clutter. Rapid data analysis and custom event logs immediately alert
administrators to anomalous behavior such as someone attempting to use the same credential in multiple