Check Point Full Disk Encryption
Check Point Full Disk Encryption has two main components:
-
Disk encryption ensures that all volumes of the hard drive and hidden volumes are automatically fully encrypted. This includes system files, temporary files, and even deleted files. There is no user downtime because encryption occurs in the background without noticeable performance loss. The encrypted disk is inaccessible to all unauthorized people.
-
Pre-boot Protection requires users to authenticate to their computers before the computer boots. This prevents unauthorized access to the operating system using authentication bypass tools at the operating system level or alternative boot media to bypass boot protection.
Configure the settings for Check Point Full Disk Encryption in SmartEndpoint in the Policy tab > Full Disk Encryption rules.