Introduction
Document Objective
This document outlines the process of setting up the Proof of Concept (POC) evaluation for the Check Point Endpoint Security Zero-Day Solution, an Endpoint protection product. It also provides resources for each stage of the evaluation. While Endpoint Security also supports macOS and Linux, this guide focuses solely on the Windows client for POC evaluation.
Solution Overview
Endpoint Security is a comprehensive and unified endpoint security solution engineered to safeguard the workforce against today’s intricate threat landscape. It delivers 360 degree endpoint protection by consolidating traditional endpoint security controls, advanced Endpoint Prevention (EPP), Endpoint Detection and Response (EDR), and Extended Detection and Response (XDR) capabilities into a singular client. Its prevention-first approach ensures your organization remains unexposed to attacks while simultaneously streamlining security operations, reducing both costs and operational overheads.
-
Ransomware & Malware Protection:
Fortifying organization data against sophisticated ransomware attacks.
-
Posture Management:
Reduces the attack surface with automated Vulnerability and Patch Management.
-
Zero-day Phishing and Browser Protection:
Blocks the most sophisticated phishing attacks with zero impact on end users.
-
Data Protection and GenAI Security:
Safeguards against sensitive data loss with Full Disk Encryption
A component on Endpoint Security Windows clients. This component combines Pre-boot protection, boot authentication, and strong encryption to make sure that only authorized users are given access to information stored on desktops and laptops. Acronym: FDE. (FDE), advanced DLP capabilities, and innovative GenAI security to protect valuable data.

