Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?
A . SmartView Monitor
B . SmartEvent
C . SmartUpdate
D . SmartDashboard
SmartEvent correlates logs from all Check Point enforcement points, including end-points, to identify suspicious activity from the clutter. Rapid data analysis and custom event logs immediately alert administrators to anomalous behavior such as someone attempting to use the same credential in multiple geographies simultaneously.