Check Point Media Encryption
Check Point Media Encryption secures sensitive corporate data and blocks incoming malware by encrypting removable media such as USB storage devices, CDs and DVDs and controlling activity (read, write and execute) on ports and devices. All device content is automatically encrypted in the background for a transparent end-user experience. Unique to Check Point, users can access encrypted media securely on unmanaged computers with no client installation. As the only device and port control solution integrated with a single endpoint security agent, Check Point Media Encryption simplifies compliance and reduces administrative overhead. Now supports Windows 7. Key Benefits - Comprehensive control of endpoint ports and protection of corporate data stored on removable media and devices - Transparent end-user experience with automatic data encryption and seamless integration with Windows CD/DVD wizard and Nero 9 - Simplified administration and operation with single agent installation, centralized management, and central policy enforcement - Integrated endpoint and network security capabilities including centralized logging of data movement and media usage for streamlined compliance and forensic analysis

Check Point Full Disk Encryption
Automatic encryption of laptop and desktop hard drives protects critical information and prevents corporate data breaches. Check Point Full Disk Encryption provides the highest level of data security with multi-factor pre-boot authentication and the strongest encryption algorithms. The entire hard drive contents - including the operating system and even temporary files - are automatically encrypted for a completely transparent end-user experience. What’s more, centralized deployment, management and logging simplify policy administration, streamline compliance and reduce TCO. Now supports Windows 7. Key Benefits - Protects corporate information from unauthorized access and prevents costly data breaches when laptops are lost or stolen - Fast compliance with the highest security certifications - FIPS 140-2, Common Criteria EAL4 and BITS - Comprehensive platform support—including Windows 7, Mac OS X 10.6 (Snow Leopard) and Linux - Highly scalable—proven in data security deployments of more than 200,000 seats - Rapid deployment—as fast as 50,000 seats per month - Trusted, market-leading data security—9 years in a row in the Leaders Quadrant of the Gartner Magic Quadrant for Mobile Data Protection

Scroll To Top