Enterprise businesses and government agencies around the world face the certainty of losing sensitive data from a lost laptop, removable media or other plug-and-play storage device. This drives the need for a complete data protection solution that secures data on all common platforms, deploys easily, scales to any size organization and meets strict compliance requirements related to privacy laws and regulations.
Check Point Endpoint Security solutions provide data protection for laptops, PCs, removable media and mobile devices. Our independently certified data security products ensure that our enterprise, government and law enforcement customers remain in compliance with regulatory standards. By leveraging a strong and efficient blend of full disk encryption, access control, removable media encryption and port management, Check Point Endpoint Security solutions deliver comprehensive data security.
The dramatic proliferation of laptops means your mobile workforce exposes large amounts of company data outside the secure perimeter of your office each day. Based on market-leading Pointsec® technologies, Check Point Endpoint Security Full Disk Encryption™ is proven in enterprises, businesses and government agencies around the world, providing the highest level of data security for laptops and PCs through a combination of pre-boot authentication and strong encryption algorithms.
Centralized management ensures fast deployment, ease of administration and fully enforceable user compliance. Check Point Full Disk Encryption also operates completely transparent to the end-user providing a seamless introduction. Supporting all common smartcards / tokens and providing a rich feature set that includes Single Sign-On (SSO) and Windows Integrated Login (WIL), Check Point Full Disk Encryption can be easily configured to meet the needs of any organization.
Check Point Media Encryption
Recent proliferation of USB ports and CD/DVD writers on laptops and PCs has dramatically increased the occurrence of data leak events within enterprises. USB flash drives, iPods, Bluetooth devices and removable media allow users to extract data in an instant —making all enterprise computers vulnerable. The ability to copy or move sensitive data onto these personal devices undetected places your organization at serious risk of untraceable dataleaks.
Check Point Media Encryption prevents unauthorized copying of sensitive data by combining port and device management, content filtering and centralized auditing with robust media encryption. Based on market-leading Pointsec technologies, Check Point Media Encryption plugs potential leak points and logs data movement to and from any plug and play devices, providing comprehensive control of security policies.
Common Criteria and FIPS certifications
Check Point Endpoint Security solutions are Common Criteria and FIPS 140-2 certified among a longer list of certifications. Check Point was also the first security software vendor to achieve Evaluation Assurance Level 4 in Common Criteria quality certification (CC EAL4). And Pointsec Mobile was the first data encryption system to achieve FIPS 140-2 for Microsoft Windows Mobile 2003. Check Point will provide all certifications upon request.
Data Security Made Easy
Data Security Solutions That Can Be Trusted, Deployed and Used—Easily
Check Point Full Disk Encryption, Pointsec Mobile and Check Point Media Encryption can secure all the devices that an enterprise uses for financial services. Yet these solutions are quick and easy to deploy. In fact, they’re guaranteed. They’re also very easy for end users to work with—the only change that they will experience is a different log-in screen.
Mobility is Necessary, Compliance is Mandatory
In fact, having a suite of Check Point Endpoint Security products shows everyone that an enterprise is serious about data security—customers, shareholders and even courts of law.
Protect Data, Reputations, Jobs
Don’t wait any longer. Choose the data security software thousands of financial institutions use worldwide. Choose Check Point Endpoint Security solutions.
Check Point Full Disk Encryption, Check Point Media Encryption and Pointsec Mobile—Ideal Protection for Today's Mobile Medicine
Ironically, these tough privacy regulations come just as doctors, nurses and hospitals need more and faster wireless information sharing to improve care and cut costs.
That's why data encryption delivered by Check Point Full Disk Encryption, Check Point Media Encryption and Pointsec Mobile from Check Point are ideal. All three solutions provide strong encryption that works in the background and is completely transparent to the user. The user need only enter a password in the pre-boot window, and the system starts right up.
The encryption performed by Check Point Full Disk Encryption and Pointsec Mobile meets both FIPS and Common Criteria standards. And it’s guaranteed that Check Point Endpoint Security solutions can be deployed in any size business or government agency.
Powerful Encryption Made Easy
The full disk encryption solution provided by Check Point begins immediately at startup. Users need only enter their passwords in a pre-boot window and their systems will start up. After that, the encryption process runs transparently, so users won’t even notice it. Check Point Full Disk Encryption can be customized for specific security needs so that it can work with all common smart cards, tokens, Single Sign-On, and Windows Integrated Login—as well as other data security solutions such as Check Point Media Encryption for flash drives and removable media and Pointsec Mobile for PDAs and smart phones—providing a number of easy-to-use options. And it’s guaranteed that Check Point Full Disk Encryption can be deployed in any size business or government agency.
Common Criteria and FIPS certified
Check Point Data Security Solutions are the Most Widely Deployed—for Good Reason
Because Check Point Full Disk Encryption, Pointsec Mobile and Check Point Media Encryption are highly scalable, quick to deploy and easy to operate with centralized management, they have become the most widely deployed full-disk encryption products throughout the U.S. government. Well in excess of 100,000 PCs and laptops are protected at more than 100 U.S. government agencies, departments and facilities. Those organizations have already done the research and comparisons—take advantage of their analysis and go with the solution that fellow government officials have already successfully deployed.
Meet Directive Requirements and More
|Compartilhe esta página nas redes sociais!|
Veja abaixo nossos prazos de entrega:
1 DIA ÚTIL: ESPÍRITO SANTO: Vitória, Cachoeiro de Itapemirim, Vila Velha, Guarapari, Serra, Cariacica, Linhares, Colatina, Aracruz, Viana, Itapemirim, Afonso Cláudio, Venda Nova do Imigrante, São Mateus e Viana. MINAS GERAIS: Araxá, Barbacena, Belo Horizonte, Betim, Carangola, Conselheiro Lafaiete, Contagem, Divinópolis, Governador Valadares, Ipatinga, Januária, João Monlevade, Juiz de Fora, Lavras, Manhuaçu, Montes Claros, Patos de Minas, Poços de Caldas, Pouso Alegre, Sete Lagoas, Teófilo Otoni, Timóteo, Uberaba, Uberlândia, Varginha e Viçosa. RIO DE JANEIRO: Rio de Janeiro, Campos dos Goitacazes, Duque de Caxias, Nova Iguaçu, Petrópolis, São Gonçalo, SÃO PAULO: Americana, Araraquara, Bauru, Campinas, Diadema, Guarulhos, Idaiatuba, Jundiaí, Limeira, Mauá, Mogi das Cruzes, Osasco, Paulínia, Piracicaba, Ribeirão Preto, Santo André, Santos, São Bernardo do Campo, São Caetano do Sul, São Carlos, São José do Rio Preto, São José dos Campos, Sorocaba, Taubaté, Barueri, Carapicuíba, Franca, Hortolândia, Itaquaquecetuba, Marília, Presidente Prudente, São Paulo, São Vicente, Suzano e Taboão da Serra.
2 DIAS ÚTEIS: ALAGOAS: Maceió, BAHIA: Salvador, DISTRITO FEDERAL: Brasília, GOIÁS: Goiânia, Anápolis, MATO GROSSO: Cuiabá, Rondonópolis, MATO GROSSO DO SUL: Campo Grande, Corumbá, Dourados, MARANHÃO: São Luís, Imperatriz, PARAÍBA: João Pessoa, PARANÁ: Curitiba, Londrina, Maringá, PERNAMBUCO: Recife, PIAUÍ: Teresina, Parnaíba, RIO GRANDE DO NORTE: Natal, Mossoró, RIO GRANDE DO SUL: Porto Alegre, Canoas, Passo Fundo, Pelotas, SANTA CATARINA: Florianópolis, Blumenau, Itajaí, Joinville, SERGIPE: Aracaju.
3 DIAS ÚTEIS: ACRE: Rio Branco, AMAZONAS: Manaus, AMAPÁ: Macapá, BAHIA: Feira de Santana,Ilhéus, Juazeiro, Vitória da Conquista, CEARÁ: Juazeiro do Norte, PARÁ: Belém, Ananindeua, Santarém, PARAÍBA: Campina Grande, PERNAMBUCO: Caruaru, Jaboatão dos Guararapes, Olinda, RONDÔNIA: Porto Velho, RORAIMA: Boa Vista, TOCANTINS: Palmas.
* Prazo válido para entrega por SEDEX e / ou transporte aéreo. Para transporte rodoviário Consulte-nos.