When fully loaded, Check Point Endpoint Security can fully control endpoints to ensure security compliance. We noticed that if other Check Point products already were running in the environment - such as a security gateway VPN, a DLP product or a Document Security product, among others - this offering can work alongside them and be managed directly using the Check Point Smart Console.Īs for functionality, this product has a lot of features and functions. We found the initial deployment to be simple and straightforward. The initial deployment is comprised of deploying the Endpoint Security Server and management console and then deploying the Endpoint Security clients to all the machines on the network. Installation and deployment was quite easy, but it did require quite a few steps. Each one of these modules can be purchased separately or the entire set can be purchased as a full suite. These add-ons are referred to by Check Point as Software Blades and they include Full Disk Encryption, Media Security, Remote Access, Anti-Malware and Program Control, WebCheck, and Firewall and Compliance Check. This product is comprised of a base system, which can be supplemented with various components to suit a customer's needs. Endpoint Security from Check Point offers up a lot of functionality that can be customized for the needs of the environment.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |