Check Point Endpoint Security

Powered by SC Magazine
 

Endpoint Security from Check Point offers up a lot of functionality that can be customized for the needs of the environment.

 

This product is comprised of a base system, which can be supplemented with various components to suit a customer's needs. These add-ons are referred to by Check Point as Software Blades and they include Full Disk Encryption, Media Security, Remote Access, Anti-Malware and Program Control, WebCheck, and Firewall and Compliance Check. Each one of these modules can be purchased separately or the entire set can be purchased as a full suite.

Installation and deployment was quite easy, but it did require quite a few steps. The initial deployment is comprised of deploying the Endpoint Security Server and management console and then deploying the Endpoint Security clients to all the machines on the network. We found the initial deployment to be simple and straightforward. We noticed that if other Check Point products already were running in the environment - such as a security gateway VPN, a DLP product or a Document Security product, among others - this offering can work alongside them and be managed directly using the Check Point Smart Console.

As for functionality, this product has a lot of features and functions. When fully loaded, Check Point Endpoint Security can fully control endpoints to ensure security compliance. Some of the available functions include encryption enforcement of both hard disks and removable media, firewall policy enforcement, malware detection and removal, application control to ensure unauthorized applications are not running in the environment, and web security, which allows for protection against web-based threats.

Documentation included a full administrator guide. This featured all information for the product from initial installation and deployment to configuration and use of features. We found this to be well-organized and to include many clear, step-by-step instructions, but there was a lack of screen shots and diagrams. We would like to see more visual illustrations throughout the manual as these can be helpful when learning how to use a new product.

Check Point offers a first year of full support as part of the initial purchase prices of its product. After the first year, customers can purchase additional support at various levels on an annual basis. Basic support offered includes nine-hours-a-day/five-days-a-week phone and email technical support, as well as access to online chat and remote support. Customers also can access a support page via the website that offers many support resources. Customers wanting 24/7 support can upgrade to a higher level.

We found the pricing structure for this product to be quite reasonable. The initial cost starts out at $60 per seat for the base system, but based on volume this price can drop down to around $10. After the base, the various blades can be added at a cost of between $6 and $20 per seat per blade. However, there is also an option to buy all of the blades at a package price of $30 per seat - bringing the total package cost to a starting price of $90 per seat for the whole suite. While this may sound pricey, we find that there is a lot of functionality in the full suite and volume discounts are available.

 

Copyright © SC Magazine, US edition


Check Point Endpoint Security
 
Overall Rating
Verdict:
A strong, versatile product that could use a bit more attention to improving documentation, but don’t let that stop you from looking this one over.
Product Info
Supplier:
 
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 331

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  56%
 
No
  44%
TOTAL VOTES: 137

Vote