Endpoint Policy Management
FREE Compliance Analysis Tool
Unified endpoint security management reduces security gaps
- Unify all endpoint security protection in a single management console
- Straightforward policy language focused on business processes
- Comprehensive, immediate security with preconfigured, customizable policies
- Integrated into Check Point Software Blade Architecture for on-demand security
Maximum visibility and control of security and at-a-glance dashboard
- Manage security for entire organizations, groups, users and their devices
- Enforce and remediate endpoint compliance before accessing network
- Search for security events across network and endpoints
- Manage endpoint and network security from one management appliance
Policy management and security for users, not just machines
- Drill-down on users and all their associated machines to investigate status
- Apply security policy to users, no matter what machine they log into
- Modify, track and report policy changes at all levels of the organization
- Use AD or customize your own organizational structure for policy enforcement
Unified Endpoint Security Management
A full suite of Endpoint Security Software Blades are managed under one console and server by the Endpoint Policy Management Software Blade, providing:
- Full Disk Encryption: Automatically and transparently secure all information on endpoint hard drives
- Media Encryption and Port Protection: Centrally enforce encryption of removable media and port control
- Remote Access VPN: Provide secure, seamless access to corporate networks remotely
- Anti-Malware and Program Control: Protect endpoints from unsecure, malicious and unwanted applications
- WebCheck: Protect against drive-by-downloads, phishing sites and zero-day attacks
- Firewall and Compliance Check: Stop unwanted traffic, prevent malware and block targeted attacks
Single Console and Customizable At-a-Glance Dashboard
management, enforcement and logging from a single, user-friendly console. Centralized management offers unmatched leverage and control of security policies and multiple deployment options offer easy installation and minimize user impact, for a reduced overall cost of operations.

View and manage overall company status, including:
- Getting started to-do list
- Overall compliance status
- Endpoint connectivity status
- Policies in use
- Anti-malware update status
- Endpoint encryption status
- Endpoint infections summary
Granular User Security
The Endpoint Policy Management Software Blade provides granular user security, in addition to associated machines, from a single console.
With an Active Directory-based structure, search or drill down from the console within a few clicks to view:
- Organizations
- Groups
- Specific users
- User's associated machines
In addition:
- All policies and exceptions are viewable and editable from one screen
- Policies can be changed for groups or individuals
- Unique 'sliders' make setting policy easy
- Fine-grained policy settings can be customized for exceptions
Compliance Check
The Endpoint Policy Management Software Blade allows you to enforce endpoint compliance on multiple checks before users log into the network.
You can check that the:
- appropriate endpoint security software blades are installed
- correct OS service pack are installed on the endpoint
- only approved applications are able to run on the endpoint
- approproate anti-malware product and version is running on the endpoint.
Plus, set users to Observe, Warn, or Restrict access to the network if they are not compliant with the policy. Also, allows for automatic or user-based remediation.
Free Compliance Analysis Tool
This free tool provides an immediate visibility to your current endpoint security posture and potential risks. This tool will analyze your security posture and provide with a report including 3 categories: Data Loss risks, Intrusion Risks and Malware Risks.
Integrated with Check Point Management Architecture
Integrated into Check Point Software Blade Architecture
Endpoint Security Client
|
Platform |
Operating System |
|---|---|
| Windows |
Windows 8 Enterprise, Professional editions 32/64-bit |
| Macintosh |
Mac OS X 10.8, OS X 10.7, OS X 10.6 - Firewall/Compliance/VPN/Full Disk Encryption |
Management Platform Support
| Smart-1 5, 25, and 50 | |
|---|---|
|
GAiA R75.40 |
|
| Open Server | |
|
All editions of Microsoft Windows Server 2003 and 2008 |
|
- Products A-Z
- Appliances
- Appliances Overview
- 2200 Appliances
- 4000 Appliances
- 12000 Appliances
- 21000 Appliance
- 61000 Security System
- DDoS Protector Appliances
- SecurityPower
- Secure Web Gateway Appliance
- Threat Prevention Appliance
- Series 80
- UTM-1 Edge
- IP Appliances
- Virtual Systems
- Safe@Office
- Smart-1
- Smart-1 SmartEvent
- Integrated Appliance Solution
- IAS Bladed Hardware
- Software Blades
- Software Blades Overview
- Security Gateway
- Firewall
- IPSec VPN
- IPS
- Mobile Access
- Application Control
- Identity Awareness
- DLP
- Web Security
- URL Filtering
- Anti-Bot
- Antivirus
- Anti-Spam & Email Security
- Advanced Networking & Clustering
- Voice over IP (VoIP)
- Threat Prevention
- ThreatCloud™
- Security Management
- Compliance
- Network Policy Management
- Endpoint Policy Management
- Logging & Status
- SmartWorkflow
- Monitoring
- Management Portal
- User Directory
- SmartProvisioning
- SmartReporter
- SmartEvent
- Multi-Domain Security Management
- Virtualization Security
- Security Gateway Virtual Edition
- Cloud Security
- Virtual Appliance for Amazon Web Services
- Security Systems
- Security Systems Overview
- Endpoint Security
- Endpoint Security
- Full Disk Encryption
- Media Encryption
- Anti-Malware & Program Control
- Remote Access VPN
- Firewall & Compliance
- Check Point WebCheck
- Check Point GO
- Solutions
- Remote Access
- Consumer Products
- ZoneAlarm Antivirus
- ZoneAlarm ForceField
- ZoneAlarm Internet Security Suite


