![]()
|
How does Threat Emulation work? | ||
Flexible deployment in the cloud or dedicated appliance
Check Point Threat Emulation provides customers with flexible deployment options. Inspecting files on any Check Point Security Gateway and emulating these files on either an on-site dedicated appliance or through a cloud-based service.



