체크 포인트 대 크라우드스트라이크

Complete Endpoint Protection at the Best TCO
Today more than ever, endpoint security plays a critical role in enabling your remote workforce.

Check Point Endpoint Security provides comprehensive endpoint protection at the highest security level, crucial to avoid security breaches and data compromise.

Discover why businesses choose Check Point.

DOWNLOAD BUYER’S GUIDE TO ENDPOINT SECURITY
무료 평가판 받기

See How Check Point Endpoint Security Stacks Up Against
CrowdStrike Falcon

특징
체크 포인트 엔드포인트 보안
CrowdStrike Falcon
차단을 위해 구축됨
comp round green
Multi-Layered Homogeneous Protection Check Point combines signature-based protection and behavioral machine-learning engines to protect against known & unknown threats, including exploit protection among other engines.
comp round orang
Single Layer Post InfectionCrowdStrike is based on exploit protection only, hence, user will detonate malware on the actual OS and expect CrowdStrike to prevent. In reality a lot is missed and many times show high rate of false-positive.
Web, FRAUD & malicious site protection
comp round green
Prevent unsafe web usageCheck Point Workspace Security protects users from zero-day phishing attacks, Known URLs and malicious sites, covering all known and unknown
comp round red
Missing Key ProtectionsCrowdStrike does not provide such critical protections as they are file-based protection, leaving their customers exposed
선제적 보호
comp round green
Deliver Risk-Free Documents With Check Point Endpoint Security, users get sanitized version of documents for safe work environment. Minimum impact on business continuity
comp round red
Lack the CapabilityCrowdStrike does not support CDR (content disarm & reconstruction). Unable to provide risk-free documents
RANSOMWARE PROTECTION
comp round green
Full Protection With Check Point Endpoint Security, Encrypted files are automatically restored from snapshots to ensure full business continuity based on proprietary capability, which cannot be bypassed
comp round yellow
EvadableCrowdStrike data restoration capability (disaster recovery) is based on Windows Shadowcopy. It can be easily evaded by being disabled by common malwares, which eliminates ability of disaster recovery.
COMMAND & CONTROL ATTACKS
comp round green
ProtectedCheck Point’s Check Point Endpoint Security blocks communication to botnet servers (CnC), resulting in data exfiltration.
comp round red
CompromisedCrowdStrike does’nt provide such protection, hence blind to botnet communication
THREAT VISIBILITY – MITRE ENGINUITY ATT&CK EVALUATION
comp round green
Top RatingMITRE 2022 94.5% Technique coverage
MITRE 2021 91.3%
comp round orange
Low RatingMITRE 2022 – 72.4% Technique coverage
MITRE 2021 – 58.8%
SECURE DATA
comp round green
Protect Company Data from Unauthorized AccessCheck Point Endpoint Security Offers Full Disc Encryption(FDE), Media encryption and port protection
comp round yellow
BasicCrowdStrike offers device control USB/port protection
VALUE FOR MONEY
comp round green
Comprehensive Endpoint ProtectionSingle Bundle for it all
Check Point Endpoint Security offers all-in-one complete solution, including: Endpoint protection(EPP), EDR, URLF & phishing protection & FDE + media encryption
comp round yellow
Pay More, Get LessMultiple Subscriptions
Falcon requires purchasing additional products on-top of the endpoint, for additional cost. cost per seat: $107 for Pro up to $323.88 for Complete bundle and still lacks many unsupported solutions.

체크 포인트 엔드포인트 보안

오늘날의 복잡한 위협 환경으로부터 조직과 원격 근무 환경을 보호하기 위해 구축된 완벽한 엔드포인트 보안 솔루션

icon gradient innovative technology

완벽한 엔드포인트 보호

엔드포인트에 대한 가장 위급한 위협 차단

icon gradient detect response

가장 빠른
복구

공격 탐지, 조사 및 해결 작업의 90%를 자동화

icon gradient TCO

최적의
총 소유 비용

효율적이고 비용 효율적인 단일 솔루션으로, 보안 및 컴플라이언스 요구 사항을 충족할 수 있는 완전한 유연성

엔드포인트 보안 분야를 선도하는 Check Point의 리더십을 인정한 MITRE Engenuity ATT&CK® 평가

Learn How Check Point Endpoint Security Achieved 100% Detection across All Tested Unique ATT&CK Techniques

자세히 알아보기 GET THE ULTIMATE GUIDE

MITER Engenuity - Check Point Endpoint Security

Shipping Logistics Leader IMC Deploys Check Point Endpoint Security to Safeguard Supply Chain Data

“The biggest advantage to using Check Point Endpoint Security is that we don’t need to worry about ransomware attacks on our environment. It provides total peace of mind, and you can’t put a price tag on that. We know it will be there, and that our data will remain safe”

– 데이비드 울로아(David Ulloa), IMC Companies 최고 정보 보안 책임자

TopRx Protects Business Continuity with Check Point Endpoint Security

“I highly recommend Check Point Endpoint Security. It’s very robust and has proven highly effective. TopRx has greatly improved its security posture with far less time invested in maintaining endpoint software”

- Michael Catanzaro(TopRx 수석 정보 보안 엔지니어)

미국 미시시피 주무장관, 주무 부처 데이터 보호를 위한 종단간 지능형 위협 보안 솔루션 확보

“Since we deployed Check Point Endpoint Security, we have not had a single advanced malware or ransomware incident in almost a year.”

– Russell Walker(미국 미시시피 주무장관 오피스 최고기술책임자)

당사 고객은 우리를 사랑합니다

지금 사용해 보기

무료 평가판 받기

전문가와 상담하기

세일즈팀에 문의하기

가격 문의

파트너 찾기