שיחת ייעוץ חינם: 1-800-800-570

Check Point Endpoint Full Disk Encryption
Provides automatic security for all information on endpoint hard drives

Check Point Endpoint Full Disk Encryption

The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.

Benefits:

Comprehensive data protection for endpoint hard drive

  • Protects from unauthorized access when laptops are lost or stolen
  • Highest security certifications for compliance—FIPS, Common Criteria, BITS
  • Comprehensive platform support—including Windows and Mac OS X

Trusted and proven security for highly-scalable deployments

  • Proven in data security deployments of more than 200,000 seats
  • Rapid deployment—as fast as 50,000 seats per month
  • Leader in Gartner Magic Quadrant for Mobile Data Protection

Integrated into Check Point Software Blade Architecture

  • Combine endpoint full disk encryption with other Endpoint Security Software Blades
  • Single-console, centrally-managed endpoint solution

Features:

Full Disk Encryption

Automatically encrypts all information on the hard drive—including user data, the operating system, temporary files and erased files, for maximum data protection. Logical partitions are boot-protected and encrypted sector-by-sector. Attempts to copy individual files or to introduce rogue programs are blocked, even when the hard drive is removed and slaved to a different computer.

Single-console, Intuitive User Interface

The Full Disk Encryption Endpoint Software Blade provides a convenient centralized management system for easy viewing of security status and for making basic configuration changes. Multiple client languages are supported for global deployments

Central Management

The Full Disk Encryption Software Blade is centrally managed by the Endpoint Policy Management Software Blade, enabling central policy administration, enforcement and logging from a single, user-friendly console. Centralized management offers unmatched leverage and control of security policies and multiple deployment options offer easy installation and minimize user impact, for a reduced overall cost of operations.

Pre-Boot Authentication

Ensures that only authorized users are allowed to access the endpoint. All valid credentials must be provided before the operating system will boot. Multi-factor authentication options, such as certificate-based Smartcards and dynamic tokens, are supported. Multiple pre-boot authentication languages are supported for global deployments.

Secure Remote Help

Remote Password Change and One-Time Login remote help options are available for users who may have forgotten their passwords or lost access tokens. Web-based remote help options are available.

Integrated into Check Point Software Blade Architecture

The Full Disk Encryption Software Blade is integrated into the Software Blade Architecture. Endpoint Security Software Blades from Check Point bring unprecedented flexibility, control and efficiency to the management and deployment of endpoint security. Choose from a variety of Software Blades to deploy only the protection you need, with the freedom to increase security at any time from a single central management console.

Specifications:

Client Platform Support
Operating Systems Microsoft Windows 8.1 32/64-bit, with or without Update 1
Microsoft Windows 8 32/64-bit
Microsoft Windows 7 Enterprise, Professional, Ultimate editions 32/64-bit, with or without SP1
Microsoft Windows XP Professional 32-bit, SP3
Mac OS X 10.8, 10.9, and 10.10
Client Language Support
Languages English
French
German
Japanese
Russian
Czech
Pre-Boot Authentication Language Support
All Client Languages Plus: Chinese (Taiwan/Traditional)
Chinese (Simplified)
Spanish
Italian
French (Canadian)
Hungarian
Korean
Polish
Portuguese
Portuguese (Brazilian)
Thai
Certifications
Full Disk Encryption Common Criteria EAL4 FIPS 140-2

 

Documentation:

Download the Check Point Full Disk Encryption Datasheet (PDF).