Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
This product is comprised of a base system, which can be supplemented with various components to suit a customer's needs. These add-ons are referred to by Check Point as Software Blades and they include Full Disk Encryption, Media Security, Remote Access, Anti-Malware and Program Control, WebCheck, and Firewall and Compliance Check. Each one of these modules can be purchased separately or the entire set can be purchased as a full suite.
Installation and deployment was quite easy, but it did require quite a few steps. The initial deployment is comprised of deploying the Endpoint Security Server and management console and then deploying the Endpoint Security clients to all the machines on the network. We found the initial deployment to be simple and straightforward. We noticed that if other Check Point products already were running in the environment - such as a security gateway VPN, a DLP product or a Document Security product, among others - this offering can work alongside them and be managed directly using the Check Point Smart Console.
As for functionality, this product has a lot of features and functions. When fully loaded, Check Point Endpoint Security can fully control endpoints to ensure security compliance. Some of the available functions include encryption enforcement of both hard disks and removable media, firewall policy enforcement, malware detection and removal, application control to ensure unauthorized applications are not running in the environment, and web security, which allows for protection against web-based threats.
Documentation included a full administrator guide. This featured all information for the product from initial installation and deployment to configuration and use of features. We found this to be well-organized and to include many clear, step-by-step instructions, but there was a lack of screen shots and diagrams. We would like to see more visual illustrations throughout the manual as these can be helpful when learning how to use a new product.
Check Point offers a first year of full support as part of the initial purchase prices of its product. After the first year, customers can purchase additional support at various levels on an annual basis. Basic support offered includes nine-hours-a-day/five-days-a-week phone and email technical support, as well as access to online chat and remote support. Customers also can access a support page via the website that offers many support resources. Customers wanting 24/7 support can upgrade to a higher level.
We found the pricing structure for this product to be quite reasonable. The initial cost starts out at $60 per seat for the base system, but based on volume this price can drop down to around $10. After the base, the various blades can be added at a cost of between $6 and $20 per seat per blade. However, there is also an option to buy all of the blades at a package price of $30 per seat - bringing the total package cost to a starting price of $90 per seat for the whole suite. While this may sound pricey, we find that there is a lot of functionality in the full suite and volume discounts are available.
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.