Check Point Endpoint Security

Simply Secure

Check Point Endpoint Security

To defend against the full spectrum of endpoint attacks, Check Point Endpoint Security combines all endpoint security functions into a single, centrally managed agent delivering total security with a simple user experience. Unique to endpoint security, Check Point WebCheck secures endpoints against the rising number of Web-based threats, while Check Point OneCheck unlocks all security systems on the PC with a single easy login. In addition, Check Point Endpoint Security is the only single agent including data security and a remote access VPN.

Check Point R80 Endpoint Security Management

Download datasheet
Software Blades
Security Mgmt
Remote Access
Case Studies

Endpoint Security Software Blades

These software blades is easily managed by unified Endpoint Security Management.

Full Disk Encryption

Automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.

Media Encryption

Provides centrally-enforceable encryption of removable storage media such as USB flash drives, backup hard drives, CDs and DVDs, for maximum data protection. Port control enables management of all endpoint ports, plus centralized logging of port activity for auditing and compliance.

AntiMalware & Program Control

Efficiently detects and removes malware from endpoints with a single scan. Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behavior blockers and heuristic analysis. Program control allows only approved programs to run on the endpoint.

Firewall & Compliance Check

Protects endpoints by controlling inbound and outbound traffic and ensuring policy compliance, with centralized management from a single console. Definable zones and security levels protect endpoint systems from unauthorized access.  Integrated stealth technology makes endpoints invisible to attackers. 

Remote Access VPN

Provides users with secure, seamless access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.


Protects the enterprise against the rising number of web-based threats. Known and unknown web threats, such as drive-by downloads, phishing sites and zero-day attacks, are isolated with browser virtualization technology, while advanced heuristics stop users from going to dangerous sites. 

Check Point GO

Instantly turns any PC into your corporate desktop, allowing users to access files and applications anywhere, anytime. Its plug-and-play USB form factor allows users to easily launch a secure virtual workspace that keeps mobile data secure by segregating the virtual workspace from the host PC. Users can work offline from the encrypted USB drive or online using the Check Point GO integrated VPN client.
Check Point GO Datasheet

Mobile Access Software Blade

Provides simple and secure remote access to corporate applications over the Internet, via smartphones or PCs. The solution provides enterprise-grade remote access via SSL VPN for simple, safe and secure mobile connectivity to email, calendars, contacts and corporate applications.
Mobile Access Software Blade Datasheet

View information about all Security Software Blades

Ladda ned en testversion
Kontakta oss
Namn: *
Telefon: *
E-post: *
Företag: *
Ditt meddelande:
* Obligatoriskt fält
Boka webbintroduktion
Vi ger dig en personlig introduktion till produkten på 30-60 minuter samt att vi besvarar dina frågeställningar.
Namn: *
Telefon: *
E-post: *
Förslag på tid:
* Obligatoriskt fält