Just a curiosity, which one is the authentication method Checkpoint consider the
least resource intensive?
Regards,

Stefano.




================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to