Check Point Endpoint Security

Powered by SC Magazine
 

Endpoint Security from Check Point offers up a lot of functionality that can be customized for the needs of the environment.

 

This product is comprised of a base system, which can be supplemented with various components to suit a customer's needs. These add-ons are referred to by Check Point as Software Blades and they include Full Disk Encryption, Media Security, Remote Access, Anti-Malware and Program Control, WebCheck, and Firewall and Compliance Check. Each one of these modules can be purchased separately or the entire set can be purchased as a full suite.

Installation and deployment was quite easy, but it did require quite a few steps. The initial deployment is comprised of deploying the Endpoint Security Server and management console and then deploying the Endpoint Security clients to all the machines on the network. We found the initial deployment to be simple and straightforward. We noticed that if other Check Point products already were running in the environment - such as a security gateway VPN, a DLP product or a Document Security product, among others - this offering can work alongside them and be managed directly using the Check Point Smart Console.

As for functionality, this product has a lot of features and functions. When fully loaded, Check Point Endpoint Security can fully control endpoints to ensure security compliance. Some of the available functions include encryption enforcement of both hard disks and removable media, firewall policy enforcement, malware detection and removal, application control to ensure unauthorized applications are not running in the environment, and web security, which allows for protection against web-based threats.

Documentation included a full administrator guide. This featured all information for the product from initial installation and deployment to configuration and use of features. We found this to be well-organized and to include many clear, step-by-step instructions, but there was a lack of screen shots and diagrams. We would like to see more visual illustrations throughout the manual as these can be helpful when learning how to use a new product.

Check Point offers a first year of full support as part of the initial purchase prices of its product. After the first year, customers can purchase additional support at various levels on an annual basis. Basic support offered includes nine-hours-a-day/five-days-a-week phone and email technical support, as well as access to online chat and remote support. Customers also can access a support page via the website that offers many support resources. Customers wanting 24/7 support can upgrade to a higher level.

We found the pricing structure for this product to be quite reasonable. The initial cost starts out at $60 per seat for the base system, but based on volume this price can drop down to around $10. After the base, the various blades can be added at a cost of between $6 and $20 per seat per blade. However, there is also an option to buy all of the blades at a package price of $30 per seat - bringing the total package cost to a starting price of $90 per seat for the whole suite. While this may sound pricey, we find that there is a lot of functionality in the full suite and volume discounts are available.

 

Copyright © SC Magazine, US edition


Check Point Endpoint Security
 
Overall Rating
Verdict:
A strong, versatile product that could use a bit more attention to improving documentation, but don’t let that stop you from looking this one over.
Product Info
Supplier:
 
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 756

Vote