- CheckMates
- :
- Products
- :
- Quantum
- :
- Management
- :
- TechTalk: Compliance Best Practices
Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×
Sign in with your Check Point UserCenter/PartnerMap account to access more great content and get a chance to win some Apple AirPods! If you don't have an account, create one now for free!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
TechTalk: Compliance Best Practices
In this session, we provided an overview of how the Check Point Compliance Blade can verify your security management configuration is compliant to your organizations's requirements. Specifically, we will cover the following:
- Get alerted when a configuration violates security best practices
- Fix the misconfiguration, modify the best practice, or create an exception for this instance and follow-up on it later
- Ensure your best practices are compliant with specific regulations
- Q&A regarding supported contents and roadmap
Video: Video Link : 5743
1 Reply
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi guys, some useful links:
Short tutorials: Compliance Blade how-to videos
Advanced technical guide: ATRG: Compliance Blade (R80.10 and above)
The live Q&A may have ended, but we are still here to answer all your questions regarding Security Best Practices at Check Point products.
