Endpoint Security Management

Check Point Endpoint Policy Management simplifies endpoint security management by unifying all endpoint security capabilities in a single console. Monitor, manage and enforce policy, from an at-a-glance dashboard down to user and machine details, all with a few clicks.

Tab 1

Endpoint Security Management Benefits

Unified endpoint security management reduces security gaps

  • Unify all endpoint security protection in a single management console
  • Comprehensive, immediate security with preconfigured, customizable policies
  • Integrated into Check Point Software Blade Architecture for on-demand security

Maximum visibility and control of security and at-a-glance dashboard

  • Quickly deploy the right level of protection for the right group of user
  • Manage security for entire organizations, groups, users and their devices
  • Enforce and remediate endpoint compliance before accessing network

Policy management and security for users, not just machines

  • Drill-down on users and all their associated machines to investigate status
  • Apply security policy to users, no matter what machine they log into
  • Modify, track and report policy changes at all levels of the organization

Tab 2

Unified Endpoint Security Management Features

The full suite of Endpoint Security Software Blades are managed under one console and server by the Endpoint Policy Management Software Blade, protecting information and endpoints from malicious and targeted attacks, providing:

  • Full Disk Encryption: Automatically and transparently secure all information on endpoint hard drives
  • Media Encryption and Port Protection: Centrally enforce encryption of removable media and port control
  • Remote Access VPN: Provide secure, seamless access to corporate networks remotely
  • Anti-Malware and Program Control: Protect endpoints from unsecure, malicious and unwanted applications
  • WebCheck: Protect against drive-by-downloads, phishing sites and zero-day attacks
  • Firewall and Compliance Check: Stop unwanted traffic, prevent malware and block targeted attacks

Tab 3

Unified Endpoint Security Management Specifications

Endpoint Security Client

Windows

Windows XP SP3 and Higher
Windows 7 (32 & 64-bit)

Endpoint Security Management

Windows

Windows XP SP3 & Higher
Windows 2003 Server
Windows 2008 Server 32bit

Endpoint Security Management Hardware

CPU Intel Pentium Processor E2140 or 2GHz equivalent processor
Memory 2 Gigabytes
Disk 4 Gigabytes
Network LAN

 

Tab 4

Endpoint Products

1 to 100
101 to 1000
1001 to 2500
2500 +
Endpoint Container

Endpoint Software Blades

 

Perpetual Licence

Annual Licence

Courseware

Anti-Malware and Program Control

N/A

CPSB-EP-AM

N/A

Firewall

Ships with Endpoint Container

N/A

N/A

Full Disk Encryption

CPSB-EP-FDE-P

CPSB-EP-FDE

CPTS-ESFDE-R70

Media Encryption

CPSB-EP-ME-P

CPSB-EP-ME

CPTS-ESME-R70

Remote Access

CPSB-EP-VPN-P

CPSB-EP-VPN

N/A

Webcheck

CPSB-EP-WEBC-P

CPSB-EP-WEBC

N/A

Total Endpoint Security

CPSB-EP-TS-P

CPSB-EP-TS

CPTS-ES-STUDENT-KIT