The Check Point Endpoint Policy Management Software Blade simplifies endpoint security management by unifying all endpoint security capabilities for PC & Mac in a single console. Monitor, manage, educate and enforce policy, from an at-a-glance dashboard down to user and machine details, all with a few clicks.
Unified endpoint security management reduces security gaps
Maximum visibility and control of security and at-a-glance dashboard
Policy management and security for users, not just machines
A full suite of Endpoint Security Software Blades are managed under one console and server by the Endpoint Policy Management Software Blade, providing:
The Endpoint Policy Management Software Blade provides granular user security, in addition to associated machines, from a single console.
With an Active Directory-based structure, search or drill down from the console within a few clicks to view:
This free tool provides an immediate visibility to your current endpoint security posture and potential risks. This tool will analyze your security posture and provide with a report including 3 categories: Data Loss risks, Intrusion Risks and Malware Risks.
The Endpoint Policy Management Software Blade is fully integrated into the Software Blade architecture, saving time and reducing costs by allowing customers to quickly expand security protections to meet changing requirements.
The Endpoint Policy Management Software Blade enables central policy management, enforcement and logging from a single, user-friendly console. Centralized management offers unmatched leverage and control of security policies and multiple deployment options offer easy installation and minimize user impact, for a reduced overall cost of operations.
The Endpoint Policy Management Software Blade allows you to enforce endpoint compliance on multiple checks before users log into the network.
You can check that the:
Plus, set users to Observe, Warn, or Restrict access to the network if they are not compliant with the policy. Also, allows for automatic or user-based remediation.
Manage Endpoint and Network Security from one management appliance with capabilities such as performing security forensics, security analysis, and search security events.
|Operating System||Microsoft Windows 10 32/64-bitMicrosoft Windows 8.1 32/64-bitMicrosoft Windows 8 32/64-bitMicrosoft Windows 7 32/64-bitMac OS X 10.8, 10.9, 10.10, 10.11, 10.12 (Firewall/Compliance/VPN/Full Disk Encryption)
|Smart-1 205, 210, 225, 3050 and 3150 Appliances, Open Servers|