Endpoint Security​

Check Point Endpoint Security ™ is the first and only single agent that combines all the critical components for total security on the endpoint. Check Point delivers a high level of security while it is completely transparent to the user. Endpoint Security simplifies endpoint security by reducing the number of security applications and eliminating multiple logins, updates and patches . This makes it a lot easier for the administrator and urges the operational costs.

Endpoint Policy Management
The Check Point Endpoint Policy Management Software Blade simplifies endpoint security management by unifying all endpoint security capabilities for PC & Mac in a single console. Monitor, manage, educate and enforce policy, from an at-a-glance dashboard down to user and machine details, all with a few clicks.
 

Endpoint Security Products​

Full Disk Encryption
The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
 

 

Media Encryption
The Check Point Media Encryption Software Blade provides centrally-enforceable encryption of removable storage media such as USB flash drives, backup hard drives, CDs and DVDs, for maximum data protection. Educating users on when to share and not share corporate data via UserCheck prevents future data sharing mistakes. Port control enables management of all endpoint ports, plus centralized logging of port activity for auditing and compliance.

AntiMalware & Program Control
The Check Point Anti-Malware & Program Control Software Blade efficiently detects and removes malware from laptops and desktops with a single scan. Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behavior blockers and heuristic analysis. Program control allows only approved programs to run the endpoint. This software blade is easily managed by unified Endpoint Security Management.

Firewall & Compliance Check
The Check Point Firewall & Compliance Check Software Blade protects endpoints by controlling inbound and outbound traffic and ensuring policy compliance, with centralized management from a single console. Definable zones and security levels protect endpoint systems from unauthorized access. Integrated stealth technology makes endpoints invisible to attackers. This software blade is easily managed by unified Endpoint Security Management.

Remote Access VPN
The Check Point Endpoint Remote Access VPN Software Blade provides users with secure, seamless access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.

 

 
Contact Information

In Person:
Belgium: +32 2 370 39 11
Luxembourg: +352 26 10 31 91
 
Via Email:

networksecurity.ecs.be@arrow.com