Create a Post
Showing results for 
Search instead for 
Did you mean: 
Employee Employee

Compliance Blade Webinar - ATAM

Did you know? 95% of ALL data breaches are caused by human errors and misconfiguration. The Compliance Blade uses Security Best Practices to make sure that Security Policy rules comply with Check Point configuration and policy recommendations. Furthermore, Compliance Blade translates thousands of complex regulatory requirements into actionable security best practices.

compliance webinar.jpgLearn all about Compliance Blade such as:

  • Why Use The Compliance Blade?
  • Licensing
  • Compliance Blade Demo
    • Built-in Compliance Checks
    • Custom Compliance Checks (Firewall Policy and GAIA OS)

Compliance Logging and Alerting


Craig Watkins - Advanced Technical Account Manager

Craig Watkins.jpg

0 Replies


Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events