Unified Endpoint Security Management
A full suite of Endpoint Security Software Blades are managed under one console and server by the Endpoint Policy Management Software Blade, providing:
Full Disk Encryption: Combines pre-boot protection, boot authentication and strong encryption to make sure that only authorized users are given access to information stored on desktops and laptops.
Media Encryption and Port Protection: Protects data stored on the computers by encrypting removable media devices and allowing tight control over computers’ ports (USB, Bluetooth and so on).
Capsule Docs: Capsule Docs is a secure mobile document management system that follows your documents wherever they go, making sure you have complete control over who is accessing sensitive data and what they can do with it.
Remote Access VPN: Provide secure, seamless access to corporate networks remotely
Anti-Malware: Protect endpoints from unknown viruses, worms, and Trojan horse malware.
Firewall and Compliance Check: Stop unwanted traffic, prevent malware and block targeted attacks and ensuring that protected computers comply with your organization’s security requirements and assign different security levels according to the compliance state of the endpoint computer.
SandBlast Agent: SandBlast Agent defends endpoints with a complete set of real-time advanced protection technologies, including Threat Emulation, Threat Extraction, Anti-Ransomware, Anti-Bot, Zero Phishing and Automated Incident Analysis.
Granular User Security
The Endpoint Policy Management Software Blade provides granular user security, in addition to associated machines, from a single console.
With an Active Directory-based structure, search or drill down from the console within a few clicks to view:
User’s associated machines
All policies and exceptions are viewable and editable from one screen
Policies can be changed for groups or individuals
Unique ‘sliders’ make setting policy easy
Fine-grained policy settings can be customized for exceptions
Free Compliance Analysis Tool
This free tool provides an immediate visibility to your current endpoint security posture and potential risks. This tool will analyze your security posture and provide with a report including 3 categories: Data Loss risks, Intrusion Risks and Malware Risks.
Integrated into Check Point Software Blade Architecture
The Endpoint Policy Management Software Blade is fully integrated into the Software Blade architecture, saving time and reducing costs by allowing customers to quickly expand security protections to meet changing requirements.
Single Console and Customizable At-a-Glance Dashboard
The Endpoint Policy Management Software Blade enables central policy management, enforcement and logging from a single, user-friendly console. Centralized management offers unmatched leverage and control of security policies and multiple deployment options offer easy installation and minimize user impact, for a reduced overall cost of operations.
The Endpoint Policy Management Software Blade allows you to enforce endpoint compliance on multiple checks before users log into the network.
You can check that the:
appropriate endpoint security software blades are installed
correct OS service pack are installed on the endpoint
only approved applications are able to run on the endpoint
appropriate anti-malware product and version is running on the endpoint.
Plus, set users to Observe, Warn, or Restrict access to the network if they are not compliant with the policy. Also, allows for automatic or user-based remediation.
Integrated with Check Point Management Architecture
Manage Endpoint and Network Security from one management appliance with capabilities such as performing security forensics, security analysis, and search security events.