This centralized management console is used to define security policies

  DOWNLOAD Free

This centralized management console is used to define security policies; view graphical representations of an organization's security topology; monitor and report on network and security data; and centrally distribute licenses and software updates to Check Point perimeter, internal and web security gateways.

  DOWNLOAD Free
Specifications
License type:
Freeware
Related stories