About Check Point Advanced Endpoint Security

Unprotected endpoints put an entire business at risk from threats, data loss, and unauthorized access. To mitigate these risks, businesses implement endpoint security, but this can challenge security administrators in multiple ways. Creating and managing new policies for desktops, laptops, Macs, and other devices quickly becomes complicated. In addition, engaging and educating users can take valuable time away from administrators. Different risks and groups require different tools to manage and enforce endpoint and corporate policies. Managing all these aspects requires more of your admin’s time, effort, and thinking to execute well.

Specification

Deployment

  • Perpetual

    Perpetual

Operating system

  • W

    Windows

Best suitable for

Size :

1-10

11-15

16-200

201-500

501-1000

1001-5000

5000+

Organization type :

SMEs

Mid Market

Enterprise

Govt

PSUs

Startups

Agencies

Industries :

  • All Industries

About Check Point Software Technologies Ltd

Check Point Software Technologies Ltd. is a leading IT security industry established in 1993 with its patented stateful inspection technology, which is still the foundation for most network security technology today. The company aims at developing numerous technologies that help secure the use of the internet by corporates and consumers while transacting and communicating.
view more products by Check Point Software Technologies Ltd

Client References

Starkey

Starkey

Dehnam Capital

Dehnam Capital

Helvetia

Helvetia

Edenred

Edenred

Lauranty

Lauranty

Features

  • Firewall protects endpoints by controlling inbound and outbound traffic.
  • Compliance Check ensures compliance while accessing the corporate network.
  • Remote Access VPN secures access to corporate resources when remote.
  • Full Disk Encryption secures the entire drive.
  • Media Encryption encrypts removable storage media.
  • Port control enables management and auditing of all endpoint ports.
  • Capsule Docs seamlessly protect documents, ensuring access to authorized users.

SandBlast Agent works in conjunction with Antivirus and other security solutions from Check Point, as well as from other vendors. It enhances the detection capabilities of existing Antivirus products, enabling protection from advanced threats and providing actionable incident analysis. When triggered by an event or investigation request by another Check Point component or third party solution, endpoint forensics logs are analyzed to generate reports viewable in SmartEvent and SmartLog.

Ransomware impacts businesses by encrypting data files and demanding ransom for their retrieval. Anti-Ransomware uses a behavioral analysis engine capable of detecting and remediating ransomware infections. The signature-less technology works both online and offline. Ransomware infections are automatically and fully quarantined based on SandBlast Agent’s forensic analysis and files that were encrypted prior to the attack containment are restored.

Our Zero Phishing uses dynamic analysis and advanced heuristics to identify and prevent access to new and unknown phishing sites targeting user credentials through web browsers in real-time. This capability prevents theft of corporate credentials from potential breaches of passwords on third party sites by alerting users when violating the corporate password re-use policies.

  • AUTOMATIC TRIGGERS
    •  Anti-Bot detection on the network or on the endpoint
    •  Threat Emulation detection on the network
    •  Check Point Antivirus detection on the endpoint
    •  Third-party Antivirus detection on the endpoint
    •  Manual Indicators of Compromise (IoCs)
  • DAMAGE DETECTION
    •  Automatically identify: Data exfiltration, data manipulation or encryption, key logging
  • ROOT CAUSE ANALYSIS
    •  Trace and identify root cause across multiple system restarts in real-time
  • MALWARE FLOW ANALYSIS
    •  Automatically generates interactive graphic model of the attack flow
  • MALICOUS BEHAVIOR DETECTION
    •  Over 40 malicious behavior categories
    •  Hundreds of malicious indicators

Document sharing is a frequent source of business data loss, especially when mobile users are involved. Check Point Capsule Docs is a secure mobile document management system that follows your documents wherever they go, making sure you have complete control over who is accessing sensitive data and what they can do with it.

  • Check Point Full Disk Encryption (FDE) provides transparent security for all information on all endpoint drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity before the operating systems loads, while encryption prevents data loss from theft.
  • Check Point Media Encryption and Port Protection provides centrally enforceable encryption of removable storage media such as USB flash drives, backup hard drives, CDs and DVDs, for maximum data protection. Educating users on when to share and not share corporate data via UserCheck™ prevents future data sharing mistakes. Port control enables management of all endpoint ports, plus centralized logging of port activity for auditing and compliance

Check Point Remote Access VPN provides users with secure, seamless access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.

Plans and Pricing

On Premise

Check Point Endpoint Security

PRICE ON REQUEST

  • Anti-Ransomware
  • Document Security
  • Encryption
  • Remote Access VPN

Videos

Advanced Endpoint Protection & Forensics | Advanced Threat Prevention

Compare

Reviews

Add Review

Be the first to write a review


Is this product information sufficient?