Symantec logo

Example—how VVR uses the checkpoint

Example—how VVR uses the checkpoint