Which Check Point software blade provides visibility of users, groups and machines while also providing access control through identity-based policies?
B. Identity Awareness
C. Application Control
D. URL Filtering
Explanation: Check Point Identity Awareness Software Blade provides granular visibility of users, groups and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console.