Solved

Checkpoint comparison

Posted on 2002-06-30
4
555 Views
Last Modified: 2013-11-16
I'm looking for Tim Holman,i'm asking you the same question since i was satisfied with the documentation you've given to me with my previous question. What's the comparison between Checkpoint VPN-1 Enterprise versus watchguard versus CISCO PIX...tnx...
0
Comment
Question by:Mariecel_LSI
  • 3
4 Comments
 
LVL 23

Accepted Solution

by:
Tim Holman earned 50 total points
ID: 7125176
I will answer your other open question  :)
0
 

Author Comment

by:Mariecel_LSI
ID: 7130987
Tim_holman I will revised my question, :) This is what i need, a documentation between Checkpoint VPN-1 versus Watchguard versus CISCO PIX? tnx.... :)
0
 

Author Comment

by:Mariecel_LSI
ID: 7131002
Hey where should i go now?  i overlooked tim holmans answers, i need to rate him for excellent rather than rejecting it and convert it to a comment...  :)
0
 

Author Comment

by:Mariecel_LSI
ID: 7131004
Found it..  :)
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
With healthcare moving into the digital age with things like Healthcare.gov, the digitization of patient records and video conferencing with patients, data has a much greater chance of being exposed than ever before.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question