Endpoint Policy Management

The Check Point Endpoint Policy Management Software Blade simplifies endpoint security management by unifying all endpoint security capabilities for PC & Mac in a single console. Monitor, manage, educate and enforce policy, from an at-a-glance dashboard down to user and machine details, all with a few clicks.


Unified endpoint security management reduces security gaps

  • Unify all endpoint security protection in a single management console
  • Straightforward policy language focused on business processes
  • Comprehensive, immediate security with preconfigured, customizable policies
  • Integrated into Check Point Software Blade Architecture for on-demand security

Maximum visibility and control of security and at-a-glance dashboard

  • Manage security for entire organizations, groups, users and their devices
  • Enforce and remediate endpoint compliance before accessing network
  • Search for security events across network and endpoints
  • Manage endpoint and network security from one management appliance

Policy management and security for users, not just machines

  • Drill-down on users and all their associated machines to investigate status
  • Apply security policy to users, no matter what machine they log into
  • Modify, track and report policy changes at all levels of the organization
  • Use AD or customize your own organizational structure for policy enforcement


Unified Endpoint Security Management

A full suite of Endpoint Security Software Blades are managed under one console and server by the Endpoint Policy Management Software Blade, providing:

  • Full Disk Encryption: Combines pre-boot protection, boot authentication and strong encryption to make sure that only authorized users are given access to information stored on desktops and laptops.
  • Media Encryption and Port Protection: Protects data stored on the computers by encrypting removable media devices and allowing tight control over computers’ ports (USB, Bluetooth and so on).
  • Capsule Docs: Capsule Docs is a secure mobile document management system that follows your documents wherever they go, making sure you have complete control over who is accessing sensitive data and what they can do with it.
  • Remote Access VPN: Provide secure, seamless access to corporate networks remotely
  • Anti-Malware: Protect endpoints from unknown viruses, worms, and Trojan horse malware.
  • Firewall and Compliance Check: Stop unwanted traffic, prevent malware and block targeted attacks and ensuring that protected computers comply with your organization’s security requirements and assign different security levels according to the compliance state of the endpoint computer.
  • SandBlast Agent: SandBlast Agent defends endpoints with a complete set of real-time advanced protection technologies, including Threat Emulation, Threat Extraction, Anti-Ransomware, Anti-Bot, Zero Phishing and Automated Incident Analysis.

Granular User Security

The Endpoint Policy Management Software Blade provides granular user security, in addition to associated machines, from a single console.

With an Active Directory-based structure, search or drill down from the console within a few clicks to view:

  • Organizations
  • Groups
  • Specific users
  • User’s associated machines

In addition:

  • All policies and exceptions are viewable and editable from one screen
  • Policies can be changed for groups or individuals
  • Unique ‘sliders’ make setting policy easy
  • Fine-grained policy settings can be customized for exceptions

Free Compliance Analysis Tool

This free tool provides an immediate visibility to your current endpoint security posture and potential risks. This tool will analyze your security posture and provide with a report including 3 categories: Data Loss risks, Intrusion Risks and Malware Risks.

Integrated into Check Point Software Blade Architecture

The Endpoint Policy Management Software Blade is fully integrated into the Software Blade architecture, saving time and reducing costs by allowing customers to quickly expand security protections to meet changing requirements.

Single Console and Customizable At-a-Glance Dashboard

The Endpoint Policy Management Software Blade enables central policy management, enforcement and logging from a single, user-friendly console. Centralized management offers unmatched leverage and control of security policies and multiple deployment options offer easy installation and minimize user impact, for a reduced overall cost of operations.


Compliance Check

The Endpoint Policy Management Software Blade allows you to enforce endpoint compliance on multiple checks before users log into the network.

You can check that the:

  • appropriate endpoint security software blades are installed
  • correct OS service pack are installed on the endpoint
  • only approved applications are able to run on the endpoint
  • appropriate anti-malware product and version is running on the endpoint.

Plus, set users to Observe, Warn, or Restrict access to the network if they are not compliant with the policy. Also, allows for automatic or user-based remediation.

Integrated with Check Point Management Architecture

Manage Endpoint and Network Security from one management appliance with capabilities such as performing security forensics, security analysis, and search security events.

Learn More


Operating SystemMicrosoft Windows 10 32/64-bit
Microsoft Windows 8.1 32/64-bit
Microsoft Windows 8 32/64-bit
Microsoft Windows 7 32/64-bit
Mac OS X 10.8, 10.9, 10.10, 10.11, 10.12 (Firewall/Compliance/VPN/Full Disk Encryption)
Smart-1 205, 210, 225, 3050 and 3150 Appliances, Open Servers

This website uses cookies to ensure you get the best experience. Got it, Thanks! MORE INFO