var fDesc=new Array(); fDesc[0] = "In the face of increasingly sophisticated attacks, it takes multiple layers of security to be protected today - at the perimeter, inside the network, at all user endpoints. How can you manage the growing complexity? Check Point's Network Policy Management Software Blade gives you control over configuring and managing even the most complex security deployments"; function tShowHide(id, show) { var s = document.getElementById("desc"); if ((s.innerHTML.length<=212 || show==1) && show!=2) { s.innerHTML = fDesc[id]; if (document.getElementById('m1')) document.getElementById('m1').style.display='none'; if (document.getElementById('m2')) document.getElementById('m2').style.display='none'; if (document.getElementById('more_txt')) document.getElementById('more_txt').style.display='inline'; } else { s.innerHTML = ''; } }