To view online version Click Here

With Check Point’s Compliance 3D Report you can now see if you are ticking the right boxes.

Check Point are now offering customer advice on how to best configure your Check Point Software Blades, avoiding misconfiguration and achieving optimal security and performance.

Check Point has revolutionised compliance with the first integrated and fully automated security & compliance monitoring. The Check Point Compliance Software Blade provides continuous monitoring, strengthens regulatory compliance, maintains secure policy, and reduces audit time & costs.

The Compliance Blade allows you to detail how well configured you are in real time and also makes recommendations on how you can improve.

Now with the reporting tool the blade also permits you to generate the Compliance 3D Report, which allows:

  • Quick insight into your Security and Compliance status against Check Point Security Best Practices.
  • Analysis of Security and Compliance weaknesses across your Management, Security Gateways and Software Blades
  • PCI DSS Compliance summary

For details on how to install your Compliance Blade on a free 30-day trial and/or how to generate your Compliance 3D Report, please Click Here.

For more information on Check Point’s Compliance Software Blade or to see a sample report, please contact us at

Click Here »

Metadigm is a specialist provider of network and end point security solutions. We work with our clients to design, supply, install, support and manage their security solutions.

Our expertise ranges from firewalls, VPNs and UTM appliances, through email and web content security, web filtering, anti virus, anti spam, intrusion prevention and detection, to end point security including laptop encryption, and whitelist-based device and application control.

How Can Metadigm Help You?

Metadigm skills and expertise in network and end point security are based on over 20 years experience. During that time we have installed or currently support internet security infrastructure in over 54 countries for hundreds of clients. These include FTSE 100 enterprise organisations, mid-market companies and SME's across numerous sectors.

*Terms and Conditions Apply


This e-mail/attachment(s) (e-mail) is/are confidential, intended for the addressee only and may be legally privileged. If sent to you in error, please inform the sender immediately and delete the e-mail from your system. You must not use or copy this e-mail for any purpose or disclose its contents to anyone. Blend IT Group accepts no liability for the content of e-mails, other than those sent on its business. No responsibility is accepted for changes made to e-mails after sending. E-mail is checked for viruses known to our anti-virus system, but Blend IT Group accepts no liability for loss or damage suffered due to a virus or similar. Blend IT Group reserves the right to monitor in-coming and out-going e-mail, to the extent permitted by law.