 Check Point Firewall Security Solution
 Creating a Strong Firewall Security Policy
 Remote Access to the Network
 Overview
 Check Point Mobile Access Solutions
 Configuring Remote Access to Network Resources
 Sample Mobile Access Workflow
 Sample Mobile Access Deployment
 Using the Mobile Access Configuration Wizard
 Allowing Mobile Connections
 Defining Access to Applications
 Activating Single Sign On
 Connecting to a Citrix Server
 Endpoint Compliance Check
 Creating VPN Policies
 Adding Users to the Security Policy
 Defining an Internet Access Policy
 Threat Prevention Policies
 Securing Data
 Maximizing Network Performance
 Configuring the NAT Policy
 Monitoring and Logging
 Index
|