Check Point Endpoint Policy Management Software Blade for Encryption and Po

Mfg.Part: CPSB-EP-ME | CDW Part: 2031146 | UNSPSC: 43233204
Availability: In Stock
Warranties
Request Pricing
Product Details
  • License
View Full Product Details
Better Together
Quick View
Total Price:

Product Overview

Main Features
  • License
Enterprises have typically deployed some standalone point solutions for endpoint security such as a personal firewall or antivirus software. This approach quickly becomes a management nightmare in organizations with hundreds or thousands of PCs. For example, each time a software update is available for individual endpoint agents, IT must execute a rigorous engineering test cycle to qualify the release for performance and compatibility before pushing the update out to endpoints. Because it is uncommon for enterprises to have three or more endpoint security agents on each device, implementation can become very time consuming and costly.

A strategy is to unify endpoint security with functionality on each PC that is centrally deployed and managed by IT security specialists on a single console. Unification of security functionality allows for simplified deployment and management, which lowers the overall cost of operations. With a unified agent approach, IT will only have to run test cycles for one agent and will have the assurance that each function within that agent is compatible. However, to achieve strong endpoint security, an enterprise should carefully consider functions in a particular unified endpoint solution.

The Endpoint Policy Management Software Blade enables you to centrally manage the security products you use on your organization's end-user devices. This means that you can take and keep control of computing devices and the sensitive information they contain.

Check Point Endpoint Policy Management Software Blade for Encryption and Po is rated 4.0 out of 5 by 2.
Rated 4 out of 5 by from The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date. Valuable Features:Pro-active prevention techniques mean that files sent to my endpoint are automatically cleansed and filtered for malicious content without a delay. The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date. Independent tests have verified that Check Point Threat Prevention has the highest catch rate in the industry. Working for a Check Point partner we utilise Check Point's endpoint solution in our day to day work and the most valuable benefit is knowing I am being protected from email, endpoint and removable media attacks and when attacks occur I am likely to weather the storm better than other users.Improvements to My Organization:When files are sent they are automatically sandboxed and cleansed in real time meaning we don't need to wait for our filters to do their work before we see the output. I know my laptop is safe.Room for Improvement:The day to day files like doc, xls, pdf, zip and rar can be scanned and cleaned by threat extraction in real time but there are still some file types which require further inspection. With the machine learning capabilities of sandblast there should be scope for more coverage, butI would like to feel certain 'no' file type is left uncovered. Any vendor that can find a way to do this is on to a winner!Disclaimer: My company has a business relationship with this vendor other than being a customer:Pentesec are 4 star Check Point partners and one of 2 companies with End Point Collaborative Support certifications, making us the most qualified Check Point End Point partners in the United Kingdom. We are vendor agnostic by default, so by choosing to utilise Check Point's End Point solution over alternatives is an endorsement in itself.
Date published: 2016-11-23
Rated 4 out of 5 by from The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date. Valuable Features:Pro-active prevention techniques mean that files sent to my endpoint are automatically cleansed and filtered for malicious content without a delay. The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date. Independent tests have verified that Check Point Threat Prevention has the highest catch rate in the industry. Working for a Check Point partner we utilise Check Point's endpoint solution in our day to day work and the most valuable benefit is knowing I am being protected from email, endpoint and removable media attacks and when attacks occur I am likely to weather the storm better than other users.Improvements to My Organization:When files are sent they are automatically sandboxed and cleansed in real time meaning we don't need to wait for our filters to do their work before we see the output. I know my laptop is safe.Room for Improvement:The day to day files like doc, xls, pdf, zip and rar can be scanned and cleaned by threat extraction in real time but there are still some file types which require further inspection. With the machine learning capabilities of sandblast there should be scope for more coverage, butI would like to feel certain 'no' file type is left uncovered. Any vendor that can find a way to do this is on to a winner!Disclaimer: My company has a business relationship with this vendor other than being a customer:Pentesec are 4 star Check Point partners and one of 2 companies with End Point Collaborative Support certifications, making us the most qualified Check Point End Point partners in the United Kingdom. We are vendor agnostic by default, so by choosing to utilise Check Point's End Point solution over alternatives is an endorsement in itself.
Date published: 2016-04-20
  • y_2018, m_8, d_17, h_14
  • bvseo_bulk, prod_bvrr, vn_bulk_2.0.8
  • cp_1, bvpage1
  • co_hasreviews, tv_0, tr_2
  • loc_en_US, sid_2031146, prod, sort_[SortEntry(order=SUBMISSION_TIME, direction=DESCENDING), SortEntry(order=FEATURED, direction=DESCENDING)]
  • clientName_cdwg