Solved

Checkpoint comparison

Posted on 2002-06-30
4
558 Views
Last Modified: 2013-11-16
I'm looking for Tim Holman,i'm asking you the same question since i was satisfied with the documentation you've given to me with my previous question. What's the comparison between Checkpoint VPN-1 Enterprise versus watchguard versus CISCO PIX...tnx...
0
Comment
Question by:Mariecel_LSI
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 23

Accepted Solution

by:
Tim Holman earned 50 total points
ID: 7125176
I will answer your other open question  :)
0
 

Author Comment

by:Mariecel_LSI
ID: 7130987
Tim_holman I will revised my question, :) This is what i need, a documentation between Checkpoint VPN-1 versus Watchguard versus CISCO PIX? tnx.... :)
0
 

Author Comment

by:Mariecel_LSI
ID: 7131002
Hey where should i go now?  i overlooked tim holmans answers, i need to rate him for excellent rather than rejecting it and convert it to a comment...  :)
0
 

Author Comment

by:Mariecel_LSI
ID: 7131004
Found it..  :)
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here's a look at newsworthy articles and community happenings during the last month.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question