Check Point EndPoint Security 
Are you ready for the challenge of re-shaping information technology security? If so, then we are looking for you. Check Point is the worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology.
 |
|
Endpoint Security Management Check Point Endpoint Policy Management
 |
|
The Check Point Endpoint Policy Management Software Blade simplifies endpoint security management by unifying all endpoint security capabilities in a single console. Monitor, manage and enforce policy, from an at-a-glance dashboard down to user and machine details, all with a few clicks. |
Endpoint Security Products World-class support for all your Check Point products with one comprehensive service contract.
Check Point Full Disk Encryption
 |
|
The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft. |
Check Point Media Encryption
 |
|
The Check Point Media Encryption Software Blade provides centrally-enforceable encryption of removable storage media such as USB flash drives, backup hard drives, CDs and DVDs, for maximum data protection. Port control enables management of all endpoint ports, plus centralized logging of port activity for auditing and compliance. |
Anti-Malware & Program Control
 |
|
The Check Point Anti-Malware & Program Control Software Blade efficiently detects and removes malware from endpoints with a single scan. Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behavior blockers and heuristic analysis. Program control allows only approved programs to run on the endpoint. This software blade is easily managed by unified Endpoint Security Management. |
Firewall & Compliance Check
 |
|
The Check Point Firewall & Compliance Check Software Blade protects endpoints by controlling inbound and outbound traffic and ensuring policy compliance, with centralized management from a single console. Definable zones and security levels protect endpoint systems from unauthorized access. Integrated stealth technology makes endpoints invisible to attackers. This software blade is easily managed by unified Endpoint Security Management. |
Remote Access VPN Software Blade
 |
|
The Check Point Remote Access VPN Software Blade provides users with secure, seamless access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data. |
Check Point WebCheck Endpoint Software Blade
 |
|
The Check Point WebCheck Endpoint Software Blade protects the enterprise against the rising number of web-based threats. Known and unknown web threats, such as drive-by downloads, phishing sites and zero-day attacks, are isolated with browser virtualization technology, while advanced heuristics stop users from going to dangerous sites. This software blade is easily managed by unified Endpoint Security Management. |
|
|
|
Further information on Check Point Products and Services is available from our marketing team on 0118 979 0000 or email us at info@acenseo.com.
No comments:
Post a Comment