![]() The compliance policy is composed of different types of rules. The scan starts when the Internet browser tries to open the Mobile Access Portal. The compliance scanner is installed on mobile devices and computers with ActiveX (for Internet Explorer on Windows) or Java. Mobile devices and computers are scanned one time to make sure that they are compliant before they can connect to the network. lets you use the Endpoint Security on Demand feature to create compliance policies and add more security to the network. Software Blade Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. The Mobile Access Check Point Software Blade on a Security Gateway that provides a Remote Access VPN access for managed and unmanaged clients. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |