Comprehensive data protection for endpoint hard drive
Trusted and proven security for highly-scalable deployments
Integrated into Check Point Software Blade Architecture
Confidentiality is absolutely essential in our business—our clients and applicants depend on it. With the Check Point solutions, the security is always on and data encrypted on the fly, keeping confidential records safe.
Head of IT Security
Michael Page International
Automatically encrypts all information on the hard drive—including user data, the operating system, temporary files and erased files, for maximum data protection. Logical partitions are boot-protected and encrypted sector-by-sector. Attempts to copy individual files or to introduce rogue programs are blocked, even when the hard drive is removed and slaved to a different computer.
The Full Disk Encryption Endpoint Software Blade provides an intuitive user interface for centralized management and easy viewing of security status and log files or making basic configuration changes. Multiple client languages are for supported for global deployments.
Centralized management with single console
The Full Disk Encryption Software Blade is centrally managed by the Endpoint Policy Management Software Blade, enabling central policy administration, enforcement and logging from a single, user-friendly console. Centralized management offers unmatched leverage and control of security policies and multiple deployment options offer easy installation and minimize user impact, for a reduced overall cost of operations.
Ensures that only authorized users are allowed to access the endpoint. All valid credentials must be provided before the operating system will boot. Multi-factor authentication options, such as certificate-based Smartcards and dynamic tokens, are supported. Multiple pre-boot authentication languages are supported for global deployments.
Remote Password Change and One-Time Login remote help options are available for users who may have forgotten their passwords or lost access tokens. Web-based remote help options are available.
The Full Disk Encryption Software Blade is integrated into the Software Blade Architecture. Endpoint Security Software Blades from Check Point bring unprecedented flexibility, control and efficiency to the management and deployment of endpoint security. Choose from a variety of Software Blades to deploy only the protection you need, with the freedom to increase security at any time from a single central management console.
|Client Platform Support|
|Operating Systems||Microsoft Windows 8.1 32/64-bit, with or without Update 1 Microsoft Windows 8 32/64-bit Microsoft Windows 7 Enterprise, Professional, Ultimate editions 32/64-bit, with or without SP1 Microsoft Windows XP Professional 32-bit, SP3 Mac OS X 10.8, 10.9, and 10.10|
|Client Language Support|
|Languages||English French German Japanese Russian Czech|
|Pre-Boot Authentication Language Support|
|All Client Languages Plus:||Chinese (Taiwan/Traditional) Chinese (Simplified) Spanish Italian French (Canadian) Hungarian Korean Polish Portuguese Portuguese (Brazilian) Thai|
|Full Disk Encryption||Common Criteria EAL4 FIPS 140-2|
|See Endpoint Policy ManagementEndpoint Policy Management Software Blade|