Sentences with phrase «modification of check point»

* Firewall technologies including general configuration, risk analysis, security policy, rules creation and modification of Check Point R65, R70 & R77, Palo Alto and Cisco ASA.
a b c d e f g h i j k l m n o p q r s t u v w x y z