Check Point Endpoint Security

Powered by SC Magazine
 

Endpoint Security from Check Point offers up a lot of functionality that can be customized for the needs of the environment.

 

This product is comprised of a base system, which can be supplemented with various components to suit a customer's needs. These add-ons are referred to by Check Point as Software Blades and they include Full Disk Encryption, Media Security, Remote Access, Anti-Malware and Program Control, WebCheck, and Firewall and Compliance Check. Each one of these modules can be purchased separately or the entire set can be purchased as a full suite.

Installation and deployment was quite easy, but it did require quite a few steps. The initial deployment is comprised of deploying the Endpoint Security Server and management console and then deploying the Endpoint Security clients to all the machines on the network. We found the initial deployment to be simple and straightforward. We noticed that if other Check Point products already were running in the environment - such as a security gateway VPN, a DLP product or a Document Security product, among others - this offering can work alongside them and be managed directly using the Check Point Smart Console.

As for functionality, this product has a lot of features and functions. When fully loaded, Check Point Endpoint Security can fully control endpoints to ensure security compliance. Some of the available functions include encryption enforcement of both hard disks and removable media, firewall policy enforcement, malware detection and removal, application control to ensure unauthorized applications are not running in the environment, and web security, which allows for protection against web-based threats.

Documentation included a full administrator guide. This featured all information for the product from initial installation and deployment to configuration and use of features. We found this to be well-organized and to include many clear, step-by-step instructions, but there was a lack of screen shots and diagrams. We would like to see more visual illustrations throughout the manual as these can be helpful when learning how to use a new product.

Check Point offers a first year of full support as part of the initial purchase prices of its product. After the first year, customers can purchase additional support at various levels on an annual basis. Basic support offered includes nine-hours-a-day/five-days-a-week phone and email technical support, as well as access to online chat and remote support. Customers also can access a support page via the website that offers many support resources. Customers wanting 24/7 support can upgrade to a higher level.

We found the pricing structure for this product to be quite reasonable. The initial cost starts out at $60 per seat for the base system, but based on volume this price can drop down to around $10. After the base, the various blades can be added at a cost of between $6 and $20 per seat per blade. However, there is also an option to buy all of the blades at a package price of $30 per seat - bringing the total package cost to a starting price of $90 per seat for the whole suite. While this may sound pricey, we find that there is a lot of functionality in the full suite and volume discounts are available.

 

Copyright © SC Magazine, US edition


Check Point Endpoint Security
 
Overall Rating
Verdict:
A strong, versatile product that could use a bit more attention to improving documentation, but don’t let that stop you from looking this one over.
Product Info
Supplier:
 
 
 
 
Top Stories
Westpac committed to core banking plan
[Blog post] Now with leadership.
 
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Photos: Unboxing the Magnus supercomputer
Pawsey's biggest beast slots into place.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1139

Vote