041
CHECK POINT 2013 SECURITY REPORT
06
_ SUMMARY AND SECURITY STRATEGY
Check Point Endpoint Security
Check Point Endpoint Security Software Blades bring
unprecedented flexibility, control and efficiency to the
management and deployment of endpoint security. IT
managers can choose from six Endpoint Software Blades
to deploy only the protection needed, with the freedom
to increase security at any time.
Full Disk Encryption
Software Blade
automatically and transparently
secures all information on endpoint hard drives. Multi-
factor pre-boot authentication ensures user identity.
Media Encryption Software Blade
provides centrally
enforceable encryption of removable storage media,
with the granularity to encrypt only business related
data while engaging and educating the end user.
Remote
Access VPN Software Blade
provides users with secure,
seamless access to corporate networks and resources
when traveling or working remotely.
Anti-Malware and
Program Control Software Blade
efficiently detects
and removes malware from endpoints with a single
scan. Program Control assures that only legitimate and
approved programs run on endpoints.
Firewall and
Security Compliance Verification Software Blade
proactive protection for inbound and outbound traffic
prevent malware from infecting endpoint systems, block
targeted attacks and stop unwanted traffic. The Security
Compliance Verification assures that your endpoints will
always meet the organizational security policy required.
WebCheck Secure Browsing Software Blade
protects
against the latest web-based threats including drive-by
downloads, phishing sites and zero-day attacks. Browser
sessions run in a secure virtual environment.
Check Point Endpoint Security client
1...,30,31,32,33,34,35,36,37,38,39 41,42,43,44,45,46,47,48,49,...50