Solved

Checkpoint comparison

Posted on 2002-06-30
4
556 Views
Last Modified: 2013-11-16
I'm looking for Tim Holman,i'm asking you the same question since i was satisfied with the documentation you've given to me with my previous question. What's the comparison between Checkpoint VPN-1 Enterprise versus watchguard versus CISCO PIX...tnx...
0
Comment
Question by:Mariecel_LSI
  • 3
4 Comments
 
LVL 23

Accepted Solution

by:
Tim Holman earned 50 total points
ID: 7125176
I will answer your other open question  :)
0
 

Author Comment

by:Mariecel_LSI
ID: 7130987
Tim_holman I will revised my question, :) This is what i need, a documentation between Checkpoint VPN-1 versus Watchguard versus CISCO PIX? tnx.... :)
0
 

Author Comment

by:Mariecel_LSI
ID: 7131002
Hey where should i go now?  i overlooked tim holmans answers, i need to rate him for excellent rather than rejecting it and convert it to a comment...  :)
0
 

Author Comment

by:Mariecel_LSI
ID: 7131004
Found it..  :)
0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Knowing where your website is hosted is as important as the features you receive, the monthly fee, and the support you receive. Due diligence should be done when choosing your next hosting provider.
The next five years are sure to bring developments that are just astonishing, and we will continue to try to find the balance between connectivity and security. Here are five major technological developments from the last five years and some predict…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question