שיחת ייעוץ חינם: 1-800-800-570

Check Point Total Endpoint Security
Prevents data leakage and encrypts removable media

Endpoint Security Software Blades

Account Number

Endpoint Security Software Blades:

Check Point Endpoint Security
Check Point Total Endpoint Security
Total Endpoint Security
*The purchase of an Endpoint container is required per user
*Includes 1 year Standard Support. Includes all Endpoint Security blades: Full Disk Encryption, Media Encryption, VPN, and WebCheck. Antimalware blade is NOT included in the annual Total Security Blade.
#CPSB-EP-TS-P
המחיר שלנו: הצעת מחיר
Check Point Endpoint Containers
Check Point Endpoint container for 1 to 100 endpoints
#CPEP-C1-1TO100
המחיר שלנו: הצעת מחיר
Check Point Endpoint container for 101 to 1,000 endpoints
#CPEP-C1-101TO1000
המחיר שלנו: הצעת מחיר
Check Point Endpoint container for 1,001 to 2,500 endpoints
#CPEP-C1-1001TO2500
המחיר שלנו: הצעת מחיר
Check Point Endpoint container for 2,500 endpoints and above
#CPEP-C1-2501TOU
המחיר שלנו: הצעת מחיר

מחירים נוספים מופיעים למטה, או לחצו כאן!

שימו לב: כל המחירים באתר כוללים מע"מ. החיוב יבוצע על פי שער "העברות והמחאות מכירה" של המטבע (דולר אמריקאי) ביום אישור ההזמנה.

Check Point Full Disk Encryption Overview:

The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.

Comprehensive data protection for endpoint hard drive

Trusted and proven security for highly-scalable deployments

Integrated into Check Point Software Blade Architecture

Media Encryption Software Blade Overview:

The Check Point Media Encryption Software Blade provides centrally-enforceable encryption of removable storage media such as USB flash drives, backup hard drives, CDs and DVDs, for maximum data protection. Port control enables management of all endpoint ports, plus centralized logging of port activity for auditing and compliance.

Comprehensive data protection and control for endpoint removable media

Maximize operational efficiency with industry-leading performance

Easy-to-use, transparent centralized management from a single console

Remote Access VPN Software Blade Overview:

The Check Point Remote Access VPN Software Blade provides users with secure, seamless access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.

Secure access to corporate resources while traveling or working remotely

Simple user experience

Integrated into Check Point Software Blade Architecture

Anti-Malware & Program Control Software Blade Overview:

The Check Point Anti-Malware & Program Control Software Blade efficiently detects and removes malware from endpoints with a single scan. Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behavior blockers and heuristic analysis. Program control allows only approved programs to run on the endpoint. This software blade is easily managed by unified Endpoint Security Management.

Improves user productivity and frees up system resources

Prevents malware from accessing endpoints with a single scan

Integrated into Check Point Software Blade Architecture

WebCheck Endpoint Software Blade Overview:

The Check Point WebCheck Endpoint Software Blade protects the enterprise against the rising number of web-based threats. Known and unknown web threats, such as drive-by downloads, phishing sites and zero-day attacks, are isolated with browser virtualization technology, while advanced heuristics stop users from going to dangerous sites. This software blade is easily managed by unified Endpoint Security Management.

Comprehensive web and browser security for endpoints

Integrated into Check Point Software Blade Architecture

Centrally Managed

Firewall & Compliance Check Overview:

The Check Point Firewall & Compliance Check Software Blade protects endpoints by controlling inbound and outbound traffic and ensuring policy compliance, with centralized management from a single console. Definable zones and security levels protect endpoint systems from unauthorized access. Integrated stealth technology makes endpoints invisible to attackers. This software blade is easily managed by unified Endpoint Security Management.

Comprehensive endpoint security and policy compliance

Integrated into Check Point Software Blade Architecture

Centrally Managed

Documentation:

Download the Check Point Software Blade Architecture Brochure (PDF).

הערות תמחור:

Check Point Endpoint Security
Check Point Total Endpoint Security
Total Endpoint Security
*The purchase of an Endpoint container is required per user
*Includes 1 year Standard Support. Includes all Endpoint Security blades: Full Disk Encryption, Media Encryption, VPN, and WebCheck. Antimalware blade is NOT included in the annual Total Security Blade.
#CPSB-EP-TS-P
המחיר שלנו: הצעת מחיר
Check Point Endpoint Containers
Check Point Endpoint container for 1 to 100 endpoints
#CPEP-C1-1TO100
המחיר שלנו: הצעת מחיר
Check Point Endpoint container for 101 to 1,000 endpoints
#CPEP-C1-101TO1000
המחיר שלנו: הצעת מחיר
Check Point Endpoint container for 1,001 to 2,500 endpoints
#CPEP-C1-1001TO2500
המחיר שלנו: הצעת מחיר
Check Point Endpoint container for 2,500 endpoints and above
#CPEP-C1-2501TOU
המחיר שלנו: הצעת מחיר