Check Point Endpoint Security Secure Access - license - 1 endpoint

Mfg.Part: CPEP-SA-1100TO4999 | CDW Part: 1434842 | UNSPSC: 43233203
Availability: In Stock
Warranties
$42.99 Advertised Price
Advertised Price
Product Details
  • License
  • 1 endpoint
  • volume
  • 100-4999 licenses
  • Win
View Full Product Details
Better Together
Check Point Endpoint Security Secure Access - license - 1 endpoint
Quick View
Total Price:

Product Overview

Main Features
  • License
  • 1 endpoint
  • volume
  • 100-4999 licenses
  • Win
Check Point Endpoint Security is the first single agent for total endpoint security that combines the highest-rated firewall, network access control (NAC), program control, antivirus, anti-spyware, data security, and remote access.

Check Point Endpoint Security protects PCs and eliminates the need to deploy and manage multiple agents, reducing total cost of ownership.

Check Point Endpoint Security Secure Access - license - 1 endpoint is rated 4.0 out of 5 by 4.
Rated 4 out of 5 by from Automatically Deletes Ransomware and Restores the Encrypted Files What is our primary use case?We have implemented Check Point for endpoint protection.How has it helped my organization?We had a ransomware attack and the SandBlast agent automatically picked up the ransomware. It automatically deleted the ransomware and restored the encrypted files.What is most valuable?The most valuable feature of Check Point Endpoint Security is the SandBlast Agent.What needs improvement?One area of this product that has room for improvement is the disc encryption.I'd like to see a patch management solution like Kaspersky has. That's the only feature that's missing.For how long have I used the solution?We've been using Check Point Endpoint Security for about a year now.What do I think about the stability of the solution?Check Point Endpoint Security is very stable.What do I think about the scalability of the solution?Check Point Endpoint Security is very scalable. There are 11 of us. You need a central management station with one person. Everybody here is using it already.How are customer service and technical support?The technical support is good. If you log calls, they're very quick to respond.If you previously used a different solution, which one did you use and why did you switch?We used Kaspersky. The Check Point Endpoint was new. We wanted to roll it out to our clients. We wanted to first try it in-house.How was the initial setup?The initial setup is straightforward. It was very quick. It was probably, in total, about 40 minutes.What about the implementation team?We are Check Point partners. We did it ourselves, in-house.What's my experience with pricing, setup cost, and licensing?Our license is on a yearly basis. It just includes the licensing fee.Which other solutions did I evaluate?We did have a look at some other options like Symantec and McAfee. We found that the anti-ransomware component on the Check Point was better than the competitors.What other advice do I have?My advice to others that are looking to implement Check Point Endpoint Security is that it's very secure. The only issue is that the disc encryption is bound to the hardware in the machine that it's in. It takes a bit long to decrypt the hard drive. That's the only issue.I'd give Check Point Endpoint Security about a nine out of ten.Disclaimer: My company has a business relationship with this vendor other than being a customer:Partner.
Date published: 2019-06-07
Rated 4 out of 5 by from Guarantees the security and stability of your network What is our primary use case?We primarily use this solution as the main firewall for the perimeter of the hospital. We use the firewall itself for URL filtering, application filtering, and identity awareness.How has it helped my organization?Before we used this solution, our mail used to have a lot of spam and most of the time our main email account was blacklisted. Now it works well; we are whitelisted by all organizations, including Google. Also, the security of our institution has really improved.What needs improvement?They should provide bandwidth regulation so we can monitor and regulate bandwidth.For how long have I used the solution?We've been using Check Point for five or six years.What do I think about the stability of the solution?It's 100% stable. It has never failed me in all the years I've used it.What do I think about the scalability of the solution?I do not think I have had any higher scale than now. Initially, we used the R77.3, but I have just upgraded to the Gaia R80 operating system. For the amount of user we need, it usually works well. We have 5,000 users on it and it is still running okay.Actually, we have already ordered two more boxes. We are waiting for them to arrive in the hospital. They are both from the 15400 series.How are customer service and technical support?The technical support is fine. We've got a good relationship with the company. If there is any problem, they respond very well and fast.For maintenance, we have a service agreement with the vendor who brought it to our institution.If you previously used a different solution, which one did you use and why did you switch?We had SonicWall, but it was not stable. With the number of users we needed, SonicWall became a bit overwhelmed.How was the initial setup?When we started it the initial setup was very complex. I have never been given any training on Check Point. I had to learn on the job.What about the implementation team?The deployment did not take long, the guys who came to the place from Check Point did it very fast, it was a fast thing, within a day or two.What was our ROI?Return on investment was the first thing we checked. We are okay in that regard. We are not complaining.What's my experience with pricing, setup cost, and licensing?We pay on an annual basis. There are no additional fees, they mostly tell us what we have to pay. We have budgeted for it.Which other solutions did I evaluate?We looked at firewalls from Fortinet and Barracuda. We even brought guys here to test their solutions, but they were no match for Check Point. We are comfortable now with Check Point.What other advice do I have?My advice is to get Check Point, even without trying it first. Use it, and you will be very, very secure. Check Point guarantees the security and stability of your network.I would rate this solution as nine out of ten.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2019-05-30
Rated 4 out of 5 by from The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date. Valuable Features:Pro-active prevention techniques mean that files sent to my endpoint are automatically cleansed and filtered for malicious content without a delay. The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date. Independent tests have verified that Check Point Threat Prevention has the highest catch rate in the industry. Working for a Check Point partner we utilise Check Point's endpoint solution in our day to day work and the most valuable benefit is knowing I am being protected from email, endpoint and removable media attacks and when attacks occur I am likely to weather the storm better than other users.Improvements to My Organization:When files are sent they are automatically sandboxed and cleansed in real time meaning we don't need to wait for our filters to do their work before we see the output. I know my laptop is safe.Room for Improvement:The day to day files like doc, xls, pdf, zip and rar can be scanned and cleaned by threat extraction in real time but there are still some file types which require further inspection. With the machine learning capabilities of sandblast there should be scope for more coverage, butI would like to feel certain 'no' file type is left uncovered. Any vendor that can find a way to do this is on to a winner!Disclaimer: My company has a business relationship with this vendor other than being a customer:Pentesec are 4 star Check Point partners and one of 2 companies with End Point Collaborative Support certifications, making us the most qualified Check Point End Point partners in the United Kingdom. We are vendor agnostic by default, so by choosing to utilise Check Point's End Point solution over alternatives is an endorsement in itself.
Date published: 2016-11-23
Rated 4 out of 5 by from The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date. Valuable Features:Pro-active prevention techniques mean that files sent to my endpoint are automatically cleansed and filtered for malicious content without a delay. The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date. Independent tests have verified that Check Point Threat Prevention has the highest catch rate in the industry. Working for a Check Point partner we utilise Check Point's endpoint solution in our day to day work and the most valuable benefit is knowing I am being protected from email, endpoint and removable media attacks and when attacks occur I am likely to weather the storm better than other users.Improvements to My Organization:When files are sent they are automatically sandboxed and cleansed in real time meaning we don't need to wait for our filters to do their work before we see the output. I know my laptop is safe.Room for Improvement:The day to day files like doc, xls, pdf, zip and rar can be scanned and cleaned by threat extraction in real time but there are still some file types which require further inspection. With the machine learning capabilities of sandblast there should be scope for more coverage, butI would like to feel certain 'no' file type is left uncovered. Any vendor that can find a way to do this is on to a winner!Disclaimer: My company has a business relationship with this vendor other than being a customer:Pentesec are 4 star Check Point partners and one of 2 companies with End Point Collaborative Support certifications, making us the most qualified Check Point End Point partners in the United Kingdom. We are vendor agnostic by default, so by choosing to utilise Check Point's End Point solution over alternatives is an endorsement in itself.
Date published: 2016-04-20
  • y_2019, m_7, d_19, h_16
  • bvseo_bulk, prod_bvrr, vn_bulk_2.0.12
  • cp_1, bvpage1
  • co_hasreviews, tv_0, tr_4
  • loc_en_US, sid_1434842, prod, sort_[SortEntry(order=SUBMISSION_TIME, direction=DESCENDING), SortEntry(order=FEATURED, direction=DESCENDING)]
  • clientName_cdw