Check Point Total Endpoint Security
Prevents data leakage and encrypts removable media
Endpoint Security Software Blades:
- Full Disk Encryption
- Media Encryption
- Remote Access
- Anti-Malware / Program Control
- WebCheck
- Firewall / Compliance Check (included in container purchase)
*The purchase of an Endpoint container is required per user
*Includes 1 year Standard Support. Includes all Endpoint Security blades: Full Disk Encryption, Media Encryption, VPN, and WebCheck. Antimalware blade is NOT included in the annual Total Security Blade.
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
מחירים נוספים מופיעים למטה, או לחצו כאן!
שימו לב: כל המחירים באתר כוללים מע"מ. החיוב יבוצע על פי שער "העברות והמחאות מכירה" של המטבע (דולר אמריקאי) ביום אישור ההזמנה.
Check Point Full Disk Encryption Overview:
The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
Comprehensive data protection for endpoint hard drive
- Protects from unauthorized access when laptops are lost or stolen
- Highest security certifications for compliance—FIPS, Common Criteria, BITS
- Comprehensive platform support—including Windows, Mac OS X and Linux
Trusted and proven security for highly-scalable deployments
- Proven in data security deployments of more than 200,000 seats
- Rapid deployment—as fast as 50,000 seats per month
- Nine years as a leader in Gartner Magic Quadrant for Mobile Data Protection
Integrated into Check Point Software Blade Architecture
- Activate endpoint full disk encryption on any Check Point security gateway
- Single-console, centrally-managed endpoint solution
- Supported gateways include: UTM-1, Power-1, IP Appliances, and IAS Appliances
Media Encryption Software Blade Overview:
The Check Point Media Encryption Software Blade provides centrally-enforceable encryption of removable storage media such as USB flash drives, backup hard drives, CDs and DVDs, for maximum data protection. Port control enables management of all endpoint ports, plus centralized logging of port activity for auditing and compliance.
Comprehensive data protection and control for endpoint removable media
- Encrypt files and folders; track and manage removable devices individually
- Automatic transparent encryption for DVDs and CDs burned with endpoint PCs
- Integrated into Software Blade Architecture for on-demand data security
Maximize operational efficiency with industry-leading performance
- Fast initial and recurring scan times
- Minimal memory usage
Easy-to-use, transparent centralized management from a single console
- Central policy enforcement of removable media and port usage policies
- Central log of media usage and data movement for compliance, forensic analysis
Remote Access VPN Software Blade Overview:
The Check Point Remote Access VPN Software Blade provides users with secure, seamless access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.
Secure access to corporate resources while traveling or working remotely
- Full IPsec VPN connectivity for strong authentication and data integrity
- Endpoint compliance scanning protects from malware and intrusions
Simple user experience
- Seamless roaming between networks and automatic session configuration
- Re-establishes lost connections by automatically switching connection modes
Integrated into Check Point Software Blade Architecture
- Activate endpoint remote access protection on any Check Point gateway
- Centrally-managed endpoint solution
- Supported gateways include: UTM-1, Power-1, IP Appliances, and IAS Appliances
Anti-Malware & Program Control Software Blade Overview:
The Check Point Anti-Malware & Program Control Software Blade efficiently detects and removes malware from endpoints with a single scan. Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behavior blockers and heuristic analysis. Program control allows only approved programs to run on the endpoint. This software blade is easily managed by unified Endpoint Security Management.
Improves user productivity and frees up system resources
- Industry’s fastest malware and anti-virus scan and boot time
- Smallest memory and disk footprints
- Single-console centralized management
Prevents malware from accessing endpoints with a single scan
- Malware is identified using signatures, behavior blockers, heuristic analysis
- Protection is automatically updated with optional Program Advisor Service
- Knowledge base of more than one million trusted or suspicious programs
Integrated into Check Point Software Blade Architecture
- Flexible licensing options—annual or perpetual
- Centrally managed and deployed
- Activate anti-malware and program control on any Check Point security gateway
WebCheck Endpoint Software Blade Overview:
The Check Point WebCheck Endpoint Software Blade protects the enterprise against the rising number of web-based threats. Known and unknown web threats, such as drive-by downloads, phishing sites and zero-day attacks, are isolated with browser virtualization technology, while advanced heuristics stop users from going to dangerous sites. This software blade is easily managed by unified Endpoint Security Management.
Comprehensive web and browser security for endpoints
- Full protection against drive-by downloads and other web-based threats
- Advanced anti-phishing and site heuristics alert users about dangerous sites
- Dual-browser mode protects corporate data on endpoints from malicious software
Integrated into Check Point Software Blade Architecture
- Activate endpoint web and browser security on any endpoint
- Flexible licensing options—annual or perpetual
Centrally Managed
- Centrally managed and deployed
- Coexists and managed with other Software Security Blades
Firewall & Compliance Check Overview:
The Check Point Firewall & Compliance Check Software Blade protects endpoints by controlling inbound and outbound traffic and ensuring policy compliance, with centralized management from a single console. Definable zones and security levels protect endpoint systems from unauthorized access. Integrated stealth technology makes endpoints invisible to attackers. This software blade is easily managed by unified Endpoint Security Management.
Comprehensive endpoint security and policy compliance
- Desktop firewall secures endpoints by regulating inbound and outbound traffic
- Centrally definable traffic control, security levels and stealth technology
- Compliance Check ensures that endpoints are in compliance while accessing the corporate network
Integrated into Check Point Software Blade Architecture
- Easily activate endpoint firewall and compliance check on any endpoint
- Flexible licensing options – annual or perpetual
Centrally Managed
- Centrally managed and deployed
- Shared object data base with Network Firewall allows easy setup
Documentation:
Download the Check Point Software Blade Architecture Brochure (PDF).
הערות תמחור:
- שימו לב: כל המחירים באתר כוללים מע"מ.
- החיוב יבוצע על פי שער "העברות והמחאות מכירה" של המטבע (דולר אמריקאי) ביום אישור ההזמנה.
- מחירי המוצרים וזמינותם כפופים לשינויים ללא הודעה מוקדמת.
*The purchase of an Endpoint container is required per user
*Includes 1 year Standard Support. Includes all Endpoint Security blades: Full Disk Encryption, Media Encryption, VPN, and WebCheck. Antimalware blade is NOT included in the annual Total Security Blade.
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר