Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Gershom_Blas
Employee Employee
Employee

Compliance Blade Webinar - ATAM

Did you know? 95% of ALL data breaches are caused by human errors and misconfiguration. The Compliance Blade uses Security Best Practices to make sure that Security Policy rules comply with Check Point configuration and policy recommendations. Furthermore, Compliance Blade translates thousands of complex regulatory requirements into actionable security best practices.

compliance webinar.jpgLearn all about Compliance Blade such as:

  • Why Use The Compliance Blade?
  • Licensing
  • Compliance Blade Demo
    • Built-in Compliance Checks
    • Custom Compliance Checks (Firewall Policy and GAIA OS)

Compliance Logging and Alerting

Speaker:

Craig Watkins - Advanced Technical Account Manager

Craig Watkins.jpg

0 Replies

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events