Overview

Pricing

Features

Specification

Review

Alternatives

Analysis

Compare

Check Point Advanced Endpoint Security
Check Point Advanced Endpoint Security
Check Point Advanced Endpoint Security
V Play

Check Point Advanced Endpoint Security

Sold by : Check Point

66%

iconTechjockey Buyer Protection

  • icon Trust Pay
  • icon Support
  • icon Easy Checkout

About Check Point Advanced Endpoint Security

checkpoint endpoint security is the best endpoint security solutions. Unprotected endpoints put an entire business at risk from threats, data loss, and unauthorized access. To mitigate these risks, businesses implement endpoint security, but this can challenge security administrators in multiple ways. Creating and managing new policies for desktops, laptops, Macs, and other devices quickly becomes complicated. In addition, engaging and educating users can take valuable time away from administrators. Different risks and groups require different tools to manage and enforce endpoint and corporate policies. Managing all these aspects requires more of your admin’s time, effort, and thinking to execute well.

Sold By : Check Point

Get Check Point Advanced Endpoint Security support 31 Chatting right now

Buy Check Point Advanced Endpoint Security1104 People added this product in their cart

Call for Check Point Advanced Endpoint Security demo2817 People requested to call back

Techjockey Buyer Protection

  • iconTrust Pay
  • iconSupport
  • icon Easy Checkout

Check Point Advanced Endpoint Security Features

Firewall protects endpoints by controlling inbound and outbound traffic. Compliance Check ensures compliance while accessing the corporate network. Remote Access VPN secures access to corporate resources when remote.
Full Disk Encryption secures the entire drive. Media Encryption encrypts removable storage media. Port control enables management and auditing of all endpoint ports. Capsule Docs seamlessly protect documents, ensuring access to authorized users.
SandBlast Agent works in conjunction with Antivirus and other security solutions from Check Point, as well as from other vendors. It enhances the detection capabilities of existing Antivirus products, enabling protection from advanced threats and providing actionable incident analysis. When triggered by an event or investigation request by another Check Point component or third party solution, endpoint forensics logs are analyzed to generate reports viewable in SmartEvent and SmartLog.
Ransomware impacts businesses by encrypting data files and demanding ransom for their retrieval. Anti-Ransomware uses a behavioral analysis engine capable of detecting and remediating ransomware infections. The signature-less technology works both online and offline. Ransomware infections are automatically and fully quarantined based on SandBlast Agent’s forensic analysis and files that were encrypted prior to the attack containment are restored.
Our Zero Phishing uses dynamic analysis and advanced heuristics to identify and prevent access to new and unknown phishing sites targeting user credentials through web browsers in real-time. This capability prevents theft of corporate credentials from potential breaches of passwords on third party sites by alerting users when violating the corporate password re-use policies.
AUTOMATIC TRIGGERS  Anti-Bot detection on the network or on the endpoint  Threat Emulation detection on the network  Check Point Antivirus detection on the endpoint  Third-party Antivirus detection on the endpoint  Manual Indicators of Compromise (IoCs) DAMAGE DETECTION  Automatically identify: Data exfiltration, data manipulation or encryption, key logging ROOT CAUSE ANALYSIS  Trace and identify root cause across multiple system restarts in real-time MALWARE FLOW ANALYSIS  Automatically generates interactive graphic model of the attack flow MALICOUS BEHAVIOR DETECTION  Over 40 malicious behavior categories  Hundreds of malicious indicators
Document sharing is a frequent source of business data loss, especially when mobile users are involved. Check Point Capsule Docs is a secure mobile document management system that follows your documents wherever they go, making sure you have complete control over who is accessing sensitive data and what they can do with it.
Check Point Full Disk Encryption (FDE) provides transparent security for all information on all endpoint drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity before the operating systems loads, while encryption prevents data loss from theft. Check Point Media Encryption and Port Protection provides centrally enforceable encryption of removable storage media such as USB flash drives, backup hard drives, CDs and DVDs, for maximum data protection. Educating users on when to share and not share corporate data via UserCheck™ prevents future data sharing mistakes. Port control enables management of all endpoint ports, plus centralized logging of port activity for auditing and compliance
Check Point Remote Access VPN provides users with secure, seamless access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.

Get Check Point Advanced Endpoint Security support31 Chatting right now

Buy Check Point Advanced Endpoint Security1104 People added this product in their cart

Call for Check Point Advanced Endpoint Security demo2817 People requested to call back

iconTechjockey Buyer Protection

  • icon Trust Pay
  • icon Support
  • icon Easy Checkout

Check Point Advanced Endpoint Security Specifications

Check Point Advanced Endpoint Security Reviews

66% Highly Recommended

OVERALL 4.4 star-icon

5 star
100% Complete (warning)
100%
4 star
0% Complete (warning)
0%
3 star
0% Complete (warning)
0%
2 star
0% Complete (warning)
0%
1 star
0% Complete (warning)
0%

Customer Feedback

Review

We love to hear from our buyers! If you have used the solution already, why not share your thoughts and help others make the right purchase.

mohd muneer uddin

Position: User

Overall Rating

Ease of Use

Value for Money

Features

Support

Easy to understand the VPN

PROS :

CONS :

Feb 4 2019

Ankur garg

Position: User

Overall Rating

Ease of Use

Value for Money

Features

Support

Great security

PROS :

CONS :

Oct 29 2018

saurabh ranjan

Position: User

Overall Rating

Ease of Use

Value for Money

Features

Support

first class experience

PROS :

CONS :

Aug 28 2018

rajesh sehgal

Position: User

Overall Rating

Ease of Use

Value for Money

Features

Support

Helpul and efficient service

PROS :

CONS :

Aug 21 2018

Check Point Advanced Endpoint Security Alternatives

See All
  • Cyber Security Software Price Chart

  • Cyber Security Software User Rating Chart

  • Cyber Security Software Price vs Features

  • Cyber Security Software Price vs Ease of Use

  • Cyber Security Software Price vs User Rating

compare_icon Compare With Related Software

Starting Price

PRICE ON REQUEST

Reviews (4 reviews)

Platforms

not_16.svg
not_16.svg

Deployment

not_16.svg
detail_faq_tick.svg
VS
Compare Now

Choose The Features You Want and We'll Find the Perfect Software for You

How to Buy a Product from Techjockey

Play this video

Explainer Video
How to buy the right software from 15,000 options in just 2 minutes
This video helps you in choosing products, add to cart, billing address, payment methods & more.. a complete product journey from our website to your business.
close