Check Point Media Encryption

FREE Compliance Analysis Tool
Comprehensive data protection and control for endpoint removable media
- Encrypt data stored on removable devices; track and manage removable devices individually
- Automatic transparent encryption for DVDs and CDs burned with endpoint PCs
- Allow secure mix of personal data and encrypted business data
- Actively engages and educates users for Media Encryption policies for business continuity
Maximize operational efficiency with industry-leading performance
- Fast initial and recurring scan times
- Minimal memory usage
Easy-to-use, transparent centralized management from a single console
- Central policy enforcement of removable media and port usage policies
- Central log of media usage and data movement for compliance, forensic analysis
Set Encryption from Centralized Security Management
The centralized endpoint security manager allows administrators to set and enforce encryption policy for removable media and devices using algorithms such as AES 256-bit, for maximum data protection. Unique to Check Point, users can securely access encrypted media from unmanaged computers, with no client installation.
Set and enforce encryption policy
Device Access Settings
The device access settings control access to removable media, devices and ports. Devices can be defined at a granular level by type, brand, size or ID, for maximum data protection. Access to endpoint ports such as USB, FireWire, Bluetooth, WiFi, printer, etc., can be centrally managed.
Control access to removable media, devices and ports
Removable Media Enforcement
Removable media enforcement maximizes data security by placing a unique digital signature on each encrypted device, informing the user of any unauthorized changes made to stored information. Should any changes be detected, the device will need to be re-authorized before it can be used in the protected environment again.
Granular Control of Data
Engage and Educate Users with Integrated Check Point UserCheck
Use Check Point UserCheck™ to actively engage and educate users as they access portable media to identify potential policy incidents as they occur and remediate them immediately.

Logging and Alerts
Central Management
Integrated into Check Point Software Blade Architecture
Specifications
| Client Platform Support | |
|---|---|
| Operating Systems |
Windows 8 Enterprise and Professional editions 32/64-bit |
| CD/DVD Burning Application Integration | |
| Applications | Windows CD/DVD wizard Nero 9 Multimedia Software |
| Client Language Support | |
| Languages |
English |
| Certifications | |
| Media Encryption Certificates | Common Criteria EAL4 FIPS 140-2 CCTM CESG |
| Ports Controlled | |
| Port Types | USB, WiFi, Fire Wire, IDE, Bluetooth, PS/2, PCMCIA, SATA, IrDA and SCSI |
| Devices Controlled | |
| Device Types | USB flash drives, floppy drives, external hard drives, tape drives, Windows Mobile Smartphones, PDAs, imaging devices, scanners, iPhones, Blackberrys, modems, other network access devices, iPods, other digital music devices, printers, CD/DVD drives, keyboard, mouse, digital cameras, wireless network interface cards, biometric devices and smart cardreaders |
| Management Platform | |
| See Endpoint Policy Management Software Blade | |
- Products A-Z
- Appliances
- Appliances Overview
- 2200 Appliances
- 4000 Appliances
- 12000 Appliances
- 21000 Appliance
- 61000 Security System
- DDoS Protector Appliances
- SecurityPower
- Secure Web Gateway Appliance
- Threat Prevention Appliance
- Series 80
- UTM-1 Edge
- IP Appliances
- Virtual Systems
- Safe@Office
- Smart-1
- Smart-1 SmartEvent
- Integrated Appliance Solution
- IAS Bladed Hardware
- Software Blades
- Software Blades Overview
- Security Gateway
- Firewall
- IPSec VPN
- IPS
- Mobile Access
- Application Control
- Identity Awareness
- DLP
- Web Security
- URL Filtering
- Anti-Bot
- Antivirus
- Anti-Spam & Email Security
- Advanced Networking & Clustering
- Voice over IP (VoIP)
- Threat Prevention
- ThreatCloud™
- Security Management
- Compliance
- Network Policy Management
- Endpoint Policy Management
- Logging & Status
- SmartWorkflow
- Monitoring
- Management Portal
- User Directory
- SmartProvisioning
- SmartReporter
- SmartEvent
- Multi-Domain Security Management
- Virtualization Security
- Security Gateway Virtual Edition
- Cloud Security
- Virtual Appliance for Amazon Web Services
- Security Systems
- Security Systems Overview
- Endpoint Security
- Endpoint Security
- Full Disk Encryption
- Media Encryption
- Anti-Malware & Program Control
- Remote Access VPN
- Firewall & Compliance
- Check Point WebCheck
- Check Point GO
- Solutions
- Remote Access
- Consumer Products
- ZoneAlarm Antivirus
- ZoneAlarm ForceField
- ZoneAlarm Internet Security Suite



