<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Compliance Blade Webinar - ATAM in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Compliance-Blade-Webinar-ATAM/m-p/119110#M22184</link>
    <description>&lt;P&gt;Did you know? 95% of ALL data breaches are caused by human errors and misconfiguration.&amp;nbsp;The Compliance Blade uses Security Best Practices to make sure that Security Policy rules comply with Check Point configuration and policy recommendations. Furthermore, Compliance Blade translates thousands of complex regulatory requirements into actionable security best practices.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-right" image-alt="compliance webinar.jpg" style="width: 300px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11774i7B654FFD74141BDB/image-size/large?v=v2&amp;amp;px=999" role="button" title="compliance webinar.jpg" alt="compliance webinar.jpg" /&gt;&lt;/span&gt;Learn all about&amp;nbsp;Compliance Blade&amp;nbsp;such as:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Why Use The Compliance Blade?&lt;/LI&gt;
&lt;LI&gt;Licensing&lt;/LI&gt;
&lt;LI&gt;Compliance Blade Demo&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Built-in Compliance Checks&lt;/LI&gt;
&lt;LI&gt;Custom Compliance Checks (Firewall Policy and GAIA OS)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;Compliance Logging and Alerting&lt;/P&gt;
&lt;P&gt;Speaker:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Craig Watkins&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- Advanced Technical Account Manager&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Craig Watkins.jpg" style="width: 211px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11773i64F51F4328AD6D2D/image-dimensions/211x210?v=v2" width="211" height="210" role="button" title="Craig Watkins.jpg" alt="Craig Watkins.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FELldXxyAnxA%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DELldXxyAnxA&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FELldXxyAnxA%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="600" height="337" scrolling="no" title="Check Point ATAM - Compliance Blade" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 May 2021 21:50:18 GMT</pubDate>
    <dc:creator>Gershom_Blas</dc:creator>
    <dc:date>2021-05-21T21:50:18Z</dc:date>
    <item>
      <title>Compliance Blade Webinar - ATAM</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Compliance-Blade-Webinar-ATAM/m-p/119110#M22184</link>
      <description>&lt;P&gt;Did you know? 95% of ALL data breaches are caused by human errors and misconfiguration.&amp;nbsp;The Compliance Blade uses Security Best Practices to make sure that Security Policy rules comply with Check Point configuration and policy recommendations. Furthermore, Compliance Blade translates thousands of complex regulatory requirements into actionable security best practices.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-right" image-alt="compliance webinar.jpg" style="width: 300px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11774i7B654FFD74141BDB/image-size/large?v=v2&amp;amp;px=999" role="button" title="compliance webinar.jpg" alt="compliance webinar.jpg" /&gt;&lt;/span&gt;Learn all about&amp;nbsp;Compliance Blade&amp;nbsp;such as:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Why Use The Compliance Blade?&lt;/LI&gt;
&lt;LI&gt;Licensing&lt;/LI&gt;
&lt;LI&gt;Compliance Blade Demo&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Built-in Compliance Checks&lt;/LI&gt;
&lt;LI&gt;Custom Compliance Checks (Firewall Policy and GAIA OS)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;Compliance Logging and Alerting&lt;/P&gt;
&lt;P&gt;Speaker:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Craig Watkins&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- Advanced Technical Account Manager&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Craig Watkins.jpg" style="width: 211px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11773i64F51F4328AD6D2D/image-dimensions/211x210?v=v2" width="211" height="210" role="button" title="Craig Watkins.jpg" alt="Craig Watkins.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FELldXxyAnxA%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DELldXxyAnxA&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FELldXxyAnxA%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="600" height="337" scrolling="no" title="Check Point ATAM - Compliance Blade" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 May 2021 21:50:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Compliance-Blade-Webinar-ATAM/m-p/119110#M22184</guid>
      <dc:creator>Gershom_Blas</dc:creator>
      <dc:date>2021-05-21T21:50:18Z</dc:date>
    </item>
  </channel>
</rss>

