Student
Shelter In Computers |
Endpoint Security
Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X protection. This integrated suite allows you to manage security protection in a single console. Secure data at rest, data in use and data in transit on endpoint devices.
Most corporate laptops and PCs store proprietary data on their hard drives,
and many users regularly work outside of a secure corporate environment. A data
breach from a lost, stolen or compromised laptop can result in costly fines,
lawsuits and lost revenue. Full Disk Encryption secures the entire hard drive.
Media Encryption and Port Control secure removable media. Capsule Docs enables
organizations to seamlessly protect documents, ensuring access for authorized
users only. Remote Access VPN provides secure access to corporate resources
when traveling or working remotely.
Secure endpoint devices from threats
Threats from malware like viruses, worms and bots change constantly. Users
are targets of phishing emails that may contain links to websites infected with
this malware. To prevent these new and emerging threats, IT departments need
control and visibility into endpoint activity. For example, an endpoint firewall
can block network worms. Malware detection works by using signatures and
behavioral analysis.
Simplify endpoint security with a unified endpoint security policy and reporting
of events
Check Point Endpoint Policy Management gives security administrators the power to enforce, manage, report and educate users with one console. With a customizable management dashboard, administrators have maximum visibility into the specific security areas important to the organization. They can take the steps to deploy and remediate endpoints to ensure compliance with company policy. Our Endpoint Threat Forensics solution identifies and mitigates threats before significant damage is done.
Endpoint Security Threat Forensics
Endpoints are potential entry points for cyber-attacks. The Check Point Endpoint Security Threat Forensics solution identifies and mitigates threats before significant damage is done by monitoring files and the registry for suspicious processes and network activity. When a malware event occurs, a report is automatically created and available to the security team.
Benefits
Identify and mitigate threats before significant damage is done A secure
agent monitors files, processes and network activity on managed endpoints
When a malware event occurs, attack details and an incident report are
automatically created
A storyline with contextual information helps security teams easily understand
the origins of an attack
Enhance threat monitoring with a focused view of all endpoint and network
activity
Events are prioritized so that your security team is able to focus on the most
important events
Aggregation and correlation of network and endpoint events provides a complete
view of threat activity
Incident reports provide a detailed cyber kill chain analysis showing the
timeline of a malicious event
Threat intelligence from Threat Forensics improves your protection from zero-day
malware
Our kernel level-sensors are secure and cannot be disabled by malicious
processes
Indicators of Compromise (IoC) from the event are fed to ThreatCloud to help
block future attacks
Security teams get the endpoint intel needed to better understand the attack and
how to contain and remediate the threat
Company
Endpoint Forensics
By monitoring and recording all endpoint events (including files affected,
processes launched, system registry changes and network activity), we are able
to trace and report on the steps taken by any malware, including zero-day
threats. All of the endpoint sensor data is efficiently stored on the endpoint
itself, erasing the need for additional appliances. Even with thousands of
endpoints, this distributed storage of endpoint events keeps traffic down and
does not overload the network. Our kernel level-sensors are secure and cannot be
disabled by malicious processes.
Prioritized Events
The sheer number of security events can be overwhelming. Our Check Point
SmartEvent helps security teams by prioritizing events, letting them focus on
the most important events. SmartEvent aggregates and correlates network and
endpoint events from our Next Generation Threat Prevention Appliances and
Endpoint Security Suite. With the additional intel from Endpoint Threat
Forensics, security teams have a better understanding of the attack and are able
to mitigate security incidents more efficiently.
Endpoint Policy Management
The Check Point Endpoint Policy Management Software Blade simplifies endpoint
security management by unifying all endpoint security capabilities for PC & Mac
in a single console. Monitor, manage, educate and enforce policy, from an
at-a-glance dashboard down to user and machine details, all with a few clicks.
Benefits
Unified endpoint security management reduces security gaps
Unify all endpoint security protection in a single management console
Straightforward policy language focused on business processes
Comprehensive, immediate security with preconfigured, customizable policies
Integrated into Check Point Software Blade Architecture for on-demand security
Maximum visibility and control of security and at-a-glance dashboard
Manage security for entire organizations, groups, users and their devices
Enforce and remediate endpoint compliance before accessing network
Search for security events across network and endpoints
Manage endpoint and network security from one management appliance
Policy management and security for users, not just machines
Drill-down on users and all their associated machines to investigate status
Apply security policy to users, no matter what machine they log into
Modify, track and report policy changes at all levels of the organization
Use AD or customize your own organizational structure for policy enforcement
Features
Unified Endpoint Security Management
A full suite of Endpoint Security Software Blades are managed under one console
and server by the Endpoint Policy Management Software Blade, providing:
Full Disk Encryption: Combines pre-boot protection, boot authentication and
strong encryption to make sure that only authorized users are given access to
information stored on desktops and laptops.
Media Encryption and Port Protection: Protects data stored on the computers by
encrypting removable media devices and allowing tight control over computers’
ports (USB, Bluetooth and so on).
Remote Access VPN: Provide secure, seamless access to corporate networks
remotely
Anti-Malware and Program Control: Protect endpoints from unknown viruses, worms,
Trojan horses, and from unsecure, malicious and unwanted applications
Firewall and Compliance Check: Stop unwanted traffic, prevent malware and block
targeted attacks and ensuring that protected computers comply with your
organization’s security requirements and assign different security levels
according to the compliance state of the endpoint computer.
Granular User Security
The Endpoint Policy Management Software Blade provides granular user security,
in addition to associated machines, from a single console.
With an Active Directory-based structure, search or drill down from the console
within a few clicks to view:
Organizations
Groups
Specific users
User’s associated machines
In addition:
All policies and exceptions are viewable and editable from one screen
Policies can be changed for groups or individuals
Unique ‘sliders’ make setting policy easy
Fine-grained policy settings can be customized for exceptions
Free Compliance Analysis Tool
This free tool provides an immediate visibility to your current endpoint
security posture and potential risks. This tool will analyze your security
posture and provide with a report including 3 categories: Data Loss risks,
Intrusion Risks and Malware Risks.
Integrated into Check Point Software Blade Architecture
The Endpoint Policy Management Software Blade is fully integrated into the
Software Blade architecture, saving time and reducing costs by allowing
customers to quickly expand security protections to meet changing requirements.
Single Console and Customizable At-a-Glance Dashboard
The Endpoint Policy Management Software Blade enables central policy management,
enforcement and logging from a single, user-friendly console. Centralized
management offers unmatched leverage and control of security policies and
multiple deployment options offer easy installation and minimize user impact,
for a reduced overall cost of operations.
Compliance Check
The Endpoint Policy Management Software Blade allows you to enforce endpoint
compliance on multiple checks before users log into the network.
You can check that the:
appropriate endpoint security software blades are installed
correct OS service pack are installed on the endpoint
only approved applications are able to run on the endpoint
appropriate anti-malware product and version is running on the endpoint.
Plus, set users to Observe, Warn, or Restrict access to the network if they are
not compliant with the policy. Also, allows for automatic or user-based
remediation.
Integrated with Check Point Management Architecture
Manage Endpoint and Network Security from one management appliance with
capabilities such as performing security forensics, security analysis, and
search security events.
Endpoint Anti-Malware & Application Control
The Check Point Anti-Malware & Program Control Software Blade efficiently
detects and removes malware from laptops and desktops with a single scan.
Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using
signatures, behavior blockers and heuristic analysis. Application control allows
only approved software programs to run on the endpoint. This software blade is
easily managed by unified Endpoint Security Management.
Benefits
Improves user productivity and frees up system resources
Industry’s fastest malware and anti-virus scan and boot time
Smallest memory and disk footprints
Single-console centralized management
Prevents malware from accessing endpoints with a single scan
Malware is identified using signatures, behavior blockers, heuristic analysis
Protection is automatically updated with optional Program Advisor Service
Knowledge base of more than one million trusted or suspicious programs
Integrated into Check Point Software Blade Architecture
Flexible licensing options—annual or perpetual
Centrally managed and deployed
Activate anti-malware and application control on any Check Point security
gateway
Features
Single Anti-Malware Scan
The Anti-Malware & Application Control Software Blade efficiently detects and
removes malware from endpoints with a single scan. Viruses, spyware, keystroke
loggers, Trojans and rootkits are identified using signatures, behavior blockers
and heuristic analysis. With antivirus functionality, the Anti-Malware &
Application Control Software Blade stops virus threats before they infect
end-users and before they spread.
When compared to other leading anti-malware solutions, Check Point delivers the
fastest initial and recurring scan times, fastest system boot time and the
smallest memory and disk footprints.
Program Control
Application control ensures that only legitimate and approved programs are
allowed to run and perform tasks on endpoints. Program authenticity is verified
to prevent spoofing, altering or hijacking of applications. Application Control
automatically creates an inventory of all applications attempting network
access, and blocks unauthorized connections and data transfers by malicious
programs.
Centralized Management
The Anti-Malware & Application Control Software Blade is centrally managed by
the Endpoint Policy Management Software Blade, enabling central policy
administration, enforcement and logging from a single, user-friendly console.
Centralized management offers unmatched leverage and control of security
policies and multiple deployment options offer easy installation and minimize
user impact, for a reduced overall cost of operations.
Program Advisor Service for Application Control
The optional Check Point Program Advisor Service delivers real-time updates to
the Anti-Malware & Application Control Software Blade from a knowledge base of
more than one million trusted and suspicious programs.
Anti-Malware and Antivirus Policy
Anti-malware and antivirus policy is managed and deployed from a central
console, giving administrators full control of scan scheduling and remediation
requirements.
Integrated into Check Point Software Blade Architecture
The Anti-Malware & Application Control Software Blade is integrated into the
Software Blade Architecture. Endpoint Security Software Blades from Check Point
bring unprecedented flexibility, control and efficiency to the management and
deployment of endpoint security. Choose from six Software Blades to deploy only
the protection you need, with the freedom to increase security at any time from
a single central management console.
Endpoint Firewall and Compliance Check
The Check Point Firewall & Compliance Check Software Blade protects endpoints
by controlling inbound and outbound traffic and ensuring policy compliance, with
centralized management from a single console. Definable zones and security
levels protect endpoint systems from unauthorized access. Integrated stealth
technology makes endpoints invisible to attackers. This software blade is
easily managed by unified Endpoint Security Management.
Benefits
Comprehensive endpoint security and policy compliance
Desktop firewall secures endpoints by regulating inbound and outbound traffic
Centrally definable traffic control, security levels and stealth technology
Compliance Check ensures that endpoints are in compliance while accessing the
corporate network
Integrated into Check Point Software Blade Architecture
Easily activate endpoint firewall and compliance check on any endpoint
Flexible licensing options – annual or perpetual
Centrally Managed
Centrally managed and deployed
Shared object data base with Network Firewall allows easy setup
Features
Desktop Firewall
The desktop firewall protects the integrity of endpoints by regulating inbound
and outbound traffic. Definable zones and security levels prevent malware from
infecting endpoint systems, block targeted attacks and stop unwanted
traffic. Stealth technology makes endpoints invisible to potential
attackers. Check Point leverages 17 years of Check Point firewall technology
leadership.
Compliance Check
With compliance scanning, endpoint systems are scanned for compliance with
corporate security policy. Systems failing compliance can be directed to
remediation.
Administrators can ensure that endpoints are compliant in a number of different
areas including:
Endpoint Security Client software is up-to-date
Endpoint has the latest authorized Operating System Service Packs
Check for “blacklisted” applications either running or existing on endpoint
Check for authorized anti-malware software, versions and DAT updates.
Centralized Management
The Firewall & Compliance Software Blade is centrally managed by the Endpoint
Policy Management Software Blade, enabling central policy administration,
enforcement and logging from a single, user-friendly console. Centralized
management offers unmatched leverage and control of security policies and
multiple deployment options offer easy installation and minimize user impact,
for a reduced overall cost of operations.
Integrated into Check Point Software Blade Architecture
Endpoint Security Software Blades from Check Point bring unprecedented
flexibility, control and efficiency to the management and deployment of endpoint
security. Choose from six Software Blades to deploy only the protection you
need, with the freedom to increase security at any time from a single central
management console.
Endpoint Remote Access VPN Software
The Check Point Endpoint Remote Access VPN Software Blade provides users with
secure, seamless access to corporate networks and resources when traveling or
working remotely. Privacy and integrity of sensitive information is ensured
through multi-factor authentication, endpoint system compliance scanning and
encryption of all transmitted data.
Benefits
Secure access to corporate resources while traveling or working remotely
Full IPsec VPN connectivity for strong authentication and data integrity
Endpoint compliance scanning protects from malware and intrusions
Simple user experience
Seamless roaming between networks and automatic session configuration
Re-establishes lost connections by automatically switching connection modes
Integrated into Check Point Software Blade Architecture
Activate endpoint remote access protection on any Check Point gateway
Centrally-managed endpoint solution
Features
VPN Auto-Connect
VPN auto-connect re-establishes lost connections by automatically switching
connection modes. It eliminates the need for users to re-authenticate when
roaming between different network types (LAN, WiFi, GPRS, etc.), using
intermittent networks or resuming work from sleep mode.
Multi-Factor Authentication Support
The Endpoint Remote Access VPN Software Blade offers comprehensive
authentication, including:
Username and passwords (including cached passwords)
SecurID
Challenge / Response
CAPI software and hardware tokens
Secure Hotspot Registration
With secure hotspot registration, administrators can selectively grant access to
hotspot registration sites. Hotspot registration pages are loaded automatically
for the user.
Integrated into Check Point Software Blade Architecture
The Endpoint Remote Access VPN Software Blade is integrated into the Software
Blade Architecture. Endpoint Security Software Blades from Check Point bring
unprecedented flexibility, control and efficiency to the management and
deployment of endpoint security. Choose from six Software Blades to deploy only
the protection you need, with the freedom to increase security at any time from
a single central management console.
IPsec VPN
Check Point Endpoint Remote Access VPN Software Blades support full IPsec VPN
connectivity for strong authentication, data integrity and confidentiality.
NAT-T standard support enables traversing between static and dynamic Network
Address Translation (NAT) devices.
Compliance Scanning
With compliance scanning, endpoints are automatically scanned for malware and
suspicious activity to ensure compliance with corporate security policies.
Failing endpoints can be directed to remediation.
As an example, administrators can ensure that endpoints are free of malware and
have the latest service packs installed before granting access to corporate
resources.
Central Management
The Endpoint Remote Access VPN Software Blade is centrally managed by the
Endpoint Policy Management Software Blade, enabling central policy
administration, enforcement and logging from a single, user-friendly console.
Centralized management offers unmatched leverage and control of security
policies and multiple deployment options offer easy installation and minimize
user impact, for a reduced overa
Check Point Capsule Docs
Document sharing is a frequent source of business data loss, especially when
mobile users are involved. Check Point Capsule Docs is a secure mobile document
management system that follows your documents wherever they go, making sure you
have complete control over who is accessing sensitive data and what they can do
with it.
Benefits
Secures documents from the moment of creation
Secure all documents by default so they cannot be unintentionally shared
Provides access only to authorized individuals or groups
Specifies how documents can be used by authorized recipients
Protects documents everywhere they go
Allows seamless access by authorized users, without the need for passwords
Encrypts documents to protect sensitive business data
Enables sharing and uploads without risk of data loss
Protects a wide range of file types including Microsoft Office suite, Adobe
Acrobat Reader and Pro
Features
Stop data leaks at the source
When it comes to your most sensitive business data, device-level security may
not provide enough protection. Check Point Capsule Docs is a secure mobile
document management system that lets you secure the document itself, creating
access and usage controls that follow the document wherever it goes, for the
entirety of its lifecycle.
Restricts access to authorized users
Prevents unintentional data sharing and leaks
Enables protections including watermarking, print restrictions and screen
capture restrictions
Allows tiered user permissions for functions such as editing, copy/paste, and
change classifications
Protects documents accessed on iOS or Android devices, as well as Mac and
Windows-based systems
Endpoint Media Encryption
The Check Point Media Encryption Software Blade provides centrally-enforceable
encryption of removable storage media such as USB flash drives, backup hard
drives, CDs and DVDs, for maximum data protection. Educating users on when to
share and not share corporate data via UserCheck prevents future data sharing
mistakes. Port control enables management of all endpoint ports, plus
centralized logging of port activity for auditing and compliance.
Benefits
Comprehensive data protection and control for endpoint removable media
Encrypt data stored on removable devices; track and manage removable devices
individually
Automatic transparent encryption for DVDs and CDs burned with endpoint PCs
Allow secure mix of personal data and encrypted business data
Actively engages and educates users for Media Encryption policies for business
continuity
Maximize operational efficiency with industry-leading performance
Fast initial and recurring scan times
Minimal memory usage
Easy-to-use, transparent centralized management from a single console
Central policy enforcement of removable media and port usage policies
Central log of media usage and data movement for compliance, forensic analysis
Confidentiality is absolutely essential in our business—our clients and
applicants depend on it. With the Check Point solutions, the security is always
on and data encrypted on the fly, keeping confidential records safe.
Features
Set Encryption from Centralized Security Management
The centralized endpoint security manager allows administrators to set and
enforce encryption policy for removable media and devices using algorithms such
as AES 256-bit, for maximum data protection. Unique to Check Point, users can
securely access encrypted media from unmanaged computers, with no client
installation.
Removable Media Enforcement
Removable media enforcement maximizes data security by placing a unique digital
signature on each encrypted device, informing the user of any unauthorized
changes made to stored information. Should any changes be detected, the device
will need to be re-authorized before it can be used in the protected environment
again.
Engage and Educate Users with Integrated Check Point UserCheck
Use Check Point UserCheck™ to actively engage and educate users as they access
portable media to identify potential policy incidents as they occur and
remediate them immediately.
Central Management
The Media Encryption Software Blade is centrally managed by the Endpoint Policy
Management Software Blade, enabling central policy administration, enforcement
and logging from a single, user-friendly console. Centralized management offers
unmatched leverage and control of security policies and multiple deployment
options offer easy installation and minimize user impact, for a reduced overall
cost of operations.
Device Access Settings
The device access settings control access to removable media, devices and ports.
Devices can be defined at a granular level by type, brand, size or ID, for
maximum data protection. Access to endpoint ports such as USB, FireWire,
Bluetooth, WiFi, printer, etc., can be centrally managed.
Granular Control of Data
Use Check Point UserCheck™ to actively engage and educate users as they access
portable media to identify potential policy incidents as they occur and
remediate them immediately.
Logging and Alerts
Administrators can store device activity and file movement logs to a central
database, enabling centralized auditing and reporting for easy compliance. Email
alerts can be configured to notify administrators about specific events.
Integrated into Check Point Software Blade Architecture
The Media Encryption Software Blade is integrated into the Software Blade
Architecture. Endpoint Security Software Blades from Check Point bring
unprecedented flexibility, control and efficiency to the management and
deployment of endpoint security. Choose from six Software Blades to deploy only
the protection you need, with the freedom to increase security at any time from
a single central management console.
Advanced auditing and reporting
You will always know who has been accessing your documents so you can easily
track potential data leakage and investigate suspicious user actions.
Offers rich monitoring capabilities with user and document audit trails
Presents all document activity logs in Check Point SmartLog
Endpoint Full Disk Encryption Software
The Check Point Full Disk Encryption Software Blade provides automatic
security for all information on endpoint hard drives, including user data,
operating system files and temporary and erased files. For maximum data
protection, multi-factor pre-boot authentication ensures user identity, while
encryption prevents data loss from theft.
Benefits
Comprehensive data protection for endpoint hard drive
Protects from unauthorized access when laptops are lost or stolen
Highest security certifications for compliance—FIPS, Common Criteria, BITS
Comprehensive platform support—including Windows and Mac OS X
Trusted and proven security for highly-scalable deployments
Proven in data security deployments of more than 200,000 seats
Rapid deployment—as fast as 50,000 seats per month
Leader in Gartner Magic Quadrant for Mobile Data Protection
Integrated into Check Point Software Blade Architecture
Combine endpoint full disk encryption with other Endpoint Security Software
Blades
Single-console, centrally-managed endpoint solution
Confidentiality is absolutely essential in our business—our clients and
applicants depend on it. With the Check Point solutions, the security is always
on and data encrypted on the fly, keeping confidential records safe.
Automatically encrypts all information on the hard drive—including user data,
the operating system, temporary files and erased files, for maximum data
protection. Logical partitions are boot-protected and encrypted
sector-by-sector. Attempts to copy individual files or to introduce rogue
programs are blocked, even when the hard drive is removed and slaved to a
different computer.
Single-console, Intuitive User Interface
The Full Disk Encryption Endpoint Software Blade provides a convenient
centralized management system for easy viewing of security status and for making
basic configuration changes. Multiple client languages are supported for global
deployments
Centralized management with single console
Central Management
The Full Disk Encryption Software Blade is centrally managed by the Endpoint
Policy Management Software Blade, enabling central policy administration,
enforcement and logging from a single, user-friendly console. Centralized
management offers unmatched leverage and control of security policies and
multiple deployment options offer easy installation and minimize user impact,
for a reduced overall cost of operations.
Pre-Boot Authentication
Ensures that only authorized users are allowed to access the endpoint. All valid
credentials must be provided before the operating system will boot. Multi-factor
authentication options, such as certificate-based Smartcards and dynamic tokens,
are supported. Multiple pre-boot authentication languages are supported for
global deployments.
Secure Remote Help
Remote Password Change and One-Time Login remote help options are available for
users who may have forgotten their passwords or lost access tokens. Web-based
remote help options are available.
Integrated into Check Point Software Blade Architecture
The Full Disk Encryption Software Blade is integrated into the Software Blade
Architecture. Endpoint Security Software Blades from Check Point bring
unprecedented flexibility, control and efficiency to the management and
deployment of endpoint security. Choose from a variety of Software Blades to
deploy only the protection you need, with the freedom to increase security at
any time from a single central management console.
Designed & Developed by
Webmaster Abbas Shahid Baqir
Webmaster Feedback: stscomps@yahoo.com
All Rights
Reserved Copyright, 2010-2020 Student Shelter In Computers
®