Check Point Endpoint Security is the first and only single agent that combines all the critical components for total security on the endpoint. Check Point delivers higher levels of security while providing a transparent end user experience. Unique to endpoint security, the Check Point WebCheck secures the endpoint against the rising number of web based threats and Check Point OneCheck unlocks all security systems on the PC with a single easy login. Check Point Endpoint Security is also the only single agent to include Data Security and Remote Access VPN.
First and only single agent for total endpoint security
Check Point Endpoint Security is the first and only single agent that combines all the critical components for total security on the endpoint. For the end user this simplifies security by reducing the number of security applications and eliminating multiple logins, updates and patches. For the administrator a single agent reduces cost and complexity with a single install and a single integrated patching and updating process.
Remote Access VPN
Enables secure remote access to corporate resources by encrypting and authenticating data transmitted during remote access sessions. The VPN Auto-Connect capability maintains connectivity while roaming between LAN, Wi-Fi and GPRS networks and automatically configures the VPN session when accessing from remote networks.
Highest-rated, award-winning firewall
The industry-leading Check Point firewall blocks unwanted traffic, prevent malware from infecting endpoint systems, and make them invisible to hackers.
Program Control with Program Advisor
Program Control ensures that only legitimate and approved programs are allowed to run on the endpoint. Program Advisor is a real-time Check Point knowledge base of over a million trustworthy applications and suspected malware used to automatically set the Program Control configuration.
Anti-virus/Anti-spyware detects and removes viruses, spyware, keystroke loggers, Trojans, rootkits and other malware based on a combination of signatures, behavior blockers, and heuristic analysis, featuring the highest detection rates and hourly signature updates.
Full Disk Encryption
Full Disk Encryption provides the highest level of data security for data stored on laptops and desktops through a combination of pre-boot authentication and strong encryption algorithms.
Media Encryption and Port Protection
Media Encryption secures sensitive corporate data and protects from incoming malware by encrypting removable media such as USB storage devices, CDs and DVDs and controlling activity (read, write and execute) on ports and devices.
Network Access Control (NAC)
NAC enforces a comprehensive NAC policy controlling network access and ensuring that each endpoint is current with the latest antivirus, critical patches, service packs, and applications such as browsers and VPN agents.
The Check Point Endpoint Security management console provides central configuration, policy administration, reporting, and analysis of endpoint security.