In this session, we provided an overview of how the Check Point Compliance Blade can verify your security management configuration is compliant to your organizations's requirements. Specifically, we will cover the following:
- Get alerted when a configuration violates security best practices
- Fix the misconfiguration, modify the best practice, or create an exception for this instance and follow-up on it later
- Ensure your best practices are compliant with specific regulations
- Q&A regarding supported contents and roadmap
Video: Video Link : 5743