Check Point

Results: 733



#Item
511

CHS INFORMATION LITERACY SURVEY We need your help! We’d like to know how confident you feel about your information-gathering skills. Check one of the following that best describes you: Section A. Point Access

Add to Reading List

Source URL: www.carl-harvey.com

Language: English - Date: 2010-07-19 23:14:12
    512Business / United States securities law / 73rd United States Congress / United States Securities and Exchange Commission / Short / Treasury stock / Repurchase agreement / Check Point / Securities Act / Finance / Financial economics / Stock market

    UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C[removed]FORM 6-K

    Add to Reading List

    Source URL: www.checkpoint.com

    Language: English - Date: 2014-01-28 08:20:39
    513Computing / Data security / Computer network security / Computer security / Easy2comply / Check Point / Information security / Audit / Business continuity / Information technology audit / Information technology management / Security

    Check Point Datasheet easy2comply™ IT Risk & Governance provides a comprehensive framework for aligning IT operations

    Add to Reading List

    Source URL: www.checkpoint.com

    Language: English - Date: 2012-05-08 13:50:07
    514Check Point / Business / Governance /  risk management /  and compliance / Computer network security / Easy2comply / Computing

    Customer Case Study Achieved 76% reduction in compliance overhead by integrating multiple GRC (Governance,

    Add to Reading List

    Source URL: www.checkpoint.com

    Language: English - Date: 2012-05-08 13:50:05
    515Internal audit / Audit / TRAC / Information technology audit process / Chief audit executive / Auditing / Business / Easy2comply

    Check Point Datasheet easy2comply™ IAM (Internal Audit Management) is a software solution that improves the performance

    Add to Reading List

    Source URL: www.checkpoint.com

    Language: English - Date: 2012-05-08 13:50:07
    516Deep packet inspection / Computing / Easy2comply / Computer security / Internal control / Business / Auditing / Check Point / Computer network security

    Internal Control Management for Sarbanes Oxley Discover why 50,000 professionals have switched to easy2comply™

    Add to Reading List

    Source URL: www.checkpoint.com

    Language: English - Date: 2012-05-08 13:50:23
    517Business / Actuarial science / Security / Computer network security / Check Point / Easy2comply / Operational risk management / Risk management / Basel II / Risk / Management / Ethics

    Operational Risk Management for Basel II Discover why 50,000 professionals have switched to easy2comply™

    Add to Reading List

    Source URL: www.checkpoint.com

    Language: English - Date: 2012-05-08 13:50:19
    518Reference / Computing / Source code / Comment / Metadata

    Solution to Exercise 3: Derived fields and Check file commands unrelated to a specific field Key Point(s): • Commands that are specific for a field should be written by accessing the 3. Checks tab in the process bar as

    Add to Reading List

    Source URL: www.tbrieder.org

    Language: English - Date: 2014-03-15 12:05:50
    519Actuarial science / Security / Computer network security / Easy2comply / Check Point / Operational risk management / Operational risk / Risk management / Risk / Management / Ethics

    Operational Risk Management for Solvency II Discover why 50,000 professionals have switched to easy2comply™

    Add to Reading List

    Source URL: www.checkpoint.com

    Language: English - Date: 2012-05-08 13:50:24
    520Cyberwarfare / Sophos / Check Point / Symantec / Application firewall / Entrust / Network security / RSA / Cloud computing security / Computing / Computer security / Computer network security

    Feb. 25, 2014 • San Francisco 2014 SC Awards U.S. Cyber risk at an all-time high

    Add to Reading List

    Source URL: media.scmagazine.com

    Language: English - Date: 2014-02-25 16:56:09
    UPDATE