Check Point Endpoint Security Total Security - license - 1 endpoint

Mfg.Part: CPEP-TS-1-5000TOU | CDW Part: 1582408 | UNSPSC: 43233205
Availability: In Stock
Warranties
$73.99 Advertised Price
Advertised Price
Product Details
  • License
  • 1 endpoint
  • volume
  • 5000+ level
  • Win
View Full Product Details
Better Together
Check Point Endpoint Security Total Security - license - 1 endpoint
Quick View
Total Price:

Product Overview

Main Features
  • License
  • 1 endpoint
  • volume
  • 5000+ level
  • Win
Check Point Endpoint Security is the first single agent for total endpoint security that combines the highest-rated firewall, network access control (NAC), program control, antivirus, anti-spyware, data security, and remote access. It protects PCs and eliminates the need to deploy and manage multiple agents, reducing total cost of ownership.

Check Point Endpoint Security Total Security - license - 1 endpoint is rated 4.0 out of 5 by 3.
Rated 4 out of 5 by from Guarantees the security and stability of your network What is our primary use case?We primarily use this solution as the main firewall for the perimeter of the hospital. We use the firewall itself for URL filtering, application filtering, and identity awareness.How has it helped my organization?Before we used this solution, our mail used to have a lot of spam and most of the time our main email account was blacklisted. Now it works well; we are whitelisted by all organizations, including Google. Also, the security of our institution has really improved.What needs improvement?They should provide bandwidth regulation so we can monitor and regulate bandwidth.For how long have I used the solution?We've been using Check Point for five or six years.What do I think about the stability of the solution?It's 100% stable. It has never failed me in all the years I've used it.What do I think about the scalability of the solution?I do not think I have had any higher scale than now. Initially, we used the R77.3, but I have just upgraded to the Gaia R80 operating system. For the amount of user we need, it usually works well. We have 5,000 users on it and it is still running okay.Actually, we have already ordered two more boxes. We are waiting for them to arrive in the hospital. They are both from the 15400 series.How are customer service and technical support?The technical support is fine. We've got a good relationship with the company. If there is any problem, they respond very well and fast.For maintenance, we have a service agreement with the vendor who brought it to our institution.If you previously used a different solution, which one did you use and why did you switch?We had SonicWall, but it was not stable. With the number of users we needed, SonicWall became a bit overwhelmed.How was the initial setup?When we started it the initial setup was very complex. I have never been given any training on Check Point. I had to learn on the job.What about the implementation team?The deployment did not take long, the guys who came to the place from Check Point did it very fast, it was a fast thing, within a day or two.What was our ROI?Return on investment was the first thing we checked. We are okay in that regard. We are not complaining.What's my experience with pricing, setup cost, and licensing?We pay on an annual basis. There are no additional fees, they mostly tell us what we have to pay. We have budgeted for it.Which other solutions did I evaluate?We looked at firewalls from Fortinet and Barracuda. We even brought guys here to test their solutions, but they were no match for Check Point. We are comfortable now with Check Point.What other advice do I have?My advice is to get Check Point, even without trying it first. Use it, and you will be very, very secure. Check Point guarantees the security and stability of your network.I would rate this solution as nine out of ten.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2019-05-30
Rated 4 out of 5 by from The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date. Valuable Features:Pro-active prevention techniques mean that files sent to my endpoint are automatically cleansed and filtered for malicious content without a delay. The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date. Independent tests have verified that Check Point Threat Prevention has the highest catch rate in the industry. Working for a Check Point partner we utilise Check Point's endpoint solution in our day to day work and the most valuable benefit is knowing I am being protected from email, endpoint and removable media attacks and when attacks occur I am likely to weather the storm better than other users.Improvements to My Organization:When files are sent they are automatically sandboxed and cleansed in real time meaning we don't need to wait for our filters to do their work before we see the output. I know my laptop is safe.Room for Improvement:The day to day files like doc, xls, pdf, zip and rar can be scanned and cleaned by threat extraction in real time but there are still some file types which require further inspection. With the machine learning capabilities of sandblast there should be scope for more coverage, butI would like to feel certain 'no' file type is left uncovered. Any vendor that can find a way to do this is on to a winner!Disclaimer: My company has a business relationship with this vendor other than being a customer:Pentesec are 4 star Check Point partners and one of 2 companies with End Point Collaborative Support certifications, making us the most qualified Check Point End Point partners in the United Kingdom. We are vendor agnostic by default, so by choosing to utilise Check Point's End Point solution over alternatives is an endorsement in itself.
Date published: 2016-11-23
Rated 4 out of 5 by from The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date. Valuable Features:Pro-active prevention techniques mean that files sent to my endpoint are automatically cleansed and filtered for malicious content without a delay. The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date. Independent tests have verified that Check Point Threat Prevention has the highest catch rate in the industry. Working for a Check Point partner we utilise Check Point's endpoint solution in our day to day work and the most valuable benefit is knowing I am being protected from email, endpoint and removable media attacks and when attacks occur I am likely to weather the storm better than other users.Improvements to My Organization:When files are sent they are automatically sandboxed and cleansed in real time meaning we don't need to wait for our filters to do their work before we see the output. I know my laptop is safe.Room for Improvement:The day to day files like doc, xls, pdf, zip and rar can be scanned and cleaned by threat extraction in real time but there are still some file types which require further inspection. With the machine learning capabilities of sandblast there should be scope for more coverage, butI would like to feel certain 'no' file type is left uncovered. Any vendor that can find a way to do this is on to a winner!Disclaimer: My company has a business relationship with this vendor other than being a customer:Pentesec are 4 star Check Point partners and one of 2 companies with End Point Collaborative Support certifications, making us the most qualified Check Point End Point partners in the United Kingdom. We are vendor agnostic by default, so by choosing to utilise Check Point's End Point solution over alternatives is an endorsement in itself.
Date published: 2016-04-20
  • y_2019, m_6, d_18, h_16
  • bvseo_bulk, prod_bvrr, vn_bulk_2.0.12
  • cp_1, bvpage1
  • co_hasreviews, tv_0, tr_3
  • loc_en_US, sid_1582408, prod, sort_[SortEntry(order=SUBMISSION_TIME, direction=DESCENDING), SortEntry(order=FEATURED, direction=DESCENDING)]
  • clientName_cdw