This script is Copyright (C) 2005-2012 Tenable Network Security, Inc.
It is possible to connect to the remote Check Point system.
The remote host seems to be a Check Point Secure Platform, and it
allows connections to its web console management.
Letting attackers know that you are using this software will help them
focus their attack or make them change their strategy. In addition to
this, an attacker may attempt to launch a brute-force attack to log
into the remote interface.
Filter incoming traffic to this port.
Risk factor :
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now