395

Check Point Endpoint Policy Management Software Blade for Full Disk Encrypt

Mfg. Part: CPSB-EP-FDE | CDW Part: 2072284 | UNSPSC: 43233204
$20.99Advertised Price
Close

Have leasing questions? Let us know how can we help.

Note: Leasing is available to businesses only. Leasing is not available to individuals.
800.800.4239
Mon-Fri 7am-7:30pm CT
Availability:In Stock
Ships same day if ordered before 4 PM CT
  • License
View More
Product Overview
Main Features
  • License
Enterprises have typically deployed some standalone point solutions for endpoint security such as a personal firewall or antivirus software. This approach quickly becomes a management nightmare in organizations with hundreds or thousands of PCs. For example, each time a software update is available for individual endpoint agents, IT must execute a rigorous engineering test cycle to qualify the release for performance and compatibility before pushing the update out to endpoints. Because it is not uncommon for enterprises to have three or more endpoint security agents on each device, implementation can become very time consuming and costly.

A new strategy is to unify endpoint security with functionality on each PC that is centrally deployed and managed by IT security specialists on a single console. Unification of security functionality allows for simplified deployment and management, which lowers the overall cost of operations. With a unified agent approach, IT will only have to run test cycles for one agent and will have the assurance that each function within that agent is compatible. However, to achieve strong endpoint security, an enterprise should carefully consider functions in a particular unified endpoint solution. Only a comprehensive set of security controls can provide an enterprise with complete endpoint security.

The Endpoint Policy Management Software Blade enables you to centrally manage the security products you use on your organization's end-user devices. This means that you can take and keep control of computing devices and the sensitive information they contain.

Technical Specifications
Specifications are provided by the manufacturer. Refer to the manufacturer for an explanation of the print speed and other ratings.
Software
License Category: License
License Qty: 1 license
License Type: License

Header
Brand: Check Point
Compatibility: PC
Manufacturer: Checkpoint Firewall Hardw
Model: Software Blade for Full Disk Encryption
Packaged Quantity: 1
Product Line: Check Point Endpoint Policy Management

General
Category: Online & appliance based services
Subcategory: Online & appliance based services - appliance software

Product Reviews
Rated 4 out of 5 by 1reviewer.
Rated 4 out of 5 by The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date. Valuable Features:Pro-active prevention techniques mean that files sent to my endpoint are automatically cleansed and filtered for malicious content without a delay. The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date. Independent tests have verified that Check Point Threat Prevention has the highest catch rate in the industry. Working for a Check Point partner we utilise Check Point's endpoint solution in our day to day work and the most valuable benefit is knowing I am being protected from email, endpoint and removable media attacks and when attacks occur I am likely to weather the storm better than other users.Improvements to My Organization:When files are sent they are automatically sandboxed and cleansed in real time meaning we don't need to wait for our filters to do their work before we see the output. I know my laptop is safe.Room for Improvement:The day to day files like doc, xls, pdf, zip and rar can be scanned and cleaned by threat extraction in real time but there are still some file types which require further inspection. With the machine learning capabilities of sandblast there should be scope for more coverage, butI would like to feel certain 'no' file type is left uncovered. Any vendor that can find a way to do this is on to a winner!Disclaimer: My company has a business relationship with this vendor other than being a customer:Pentesec are 4 star Check Point partners and one of 2 companies with End Point Collaborative Support certifications, making us the most qualified Check Point End Point partners in the United Kingdom. We are vendor agnostic by default, so by choosing to utilise Check Point's End Point solution over alternatives is an endorsement in itself. April 20, 2016
  • 2016-10-30 T09:49:32.386-05:00
  • bvseo_lps, prod_bvrr, vn_prr_5.6
  • cp-1, bvpage1
  • co_hasreviews, tv_1, tr_1
  • loc_en_US, sid_2072284, prod, sort_default
1-1 of 1
 
Adding to Cart...
12/7/2016 10:36:15 PM
^ Back to Top

Maximum 300 characters
An account manager will email you within one business day to confirm your request.

Your Quote has been submitted

What Happens Next? A confirmation email is on its way. Within one business day, you will be contacted by an Account Manager to finalize your quote.

Error!

Something went wrong.

Please try again later.

License Selector

    The license selector is not currently available. Please try again later.