In this session, we will provide an overview of how the Check Point Compliance Blade can verify your security management configuration is compliant to your organizations's requirements. Specifically, we will cover the following:
- Get alerted when a configuration violates security best practices
- Fix the misconfiguration, modify the best practice, or create an exception for this instance and follow-up on it later
- Ensure your best practices are compliant with specific regulations
- Q&A regarding supported contents and roadmap
REGISTER HERE