Viimeisin kampanjatiedotteemme on ilmestynyt 18.3.24, kts tarkemmat tiedot KAMPANJA-linkistä!

Softa SuperStore

19.03.2024 • • 10:37

Asiakaspalvelu
ark. 10.30 - 16
09 - 3424 370
 

          TUOTEHAKU

 TUOTERYHMÄT

 Muokkaa evästevalintoja
Näytä ostoskori
PÄÄVALIKKO
 
Luotettava Kumppani –yritys
 
Veloitukseton päivitysmuistutuspalvelu!
 
Softa SuperStore - yksi Suomen vahvimmista!

 

Check Point Full Disk Encryption

Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology.

Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs.

Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

Check Point Full Disk Encryption
 
Check Point Full Disk Encryption
The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
Benefits

Comprehensive data protection for endpoint hard drive

  • Protects from unauthorized access when laptops are lost or stolen
  • Highest security certifications for compliance—FIPS, Common Criteria, BITS
  • Comprehensive platform support—including Windows, Mac OS X and Linux

Trusted and proven security for highly-scalable deployments

  • Proven in data security deployments of more than 200,000 seats
  • Rapid deployment—as fast as 50,000 seats per month
  • Leader in Gartner Magic Quadrant for Mobile Data Protection

Integrated into Check Point Software Blade Architecture

  • Combine endpoint full disk encryption with other Endpoint Security Software Blades
  • Single-console, centrally-managed endpoint solution
Features

Full Disk Encryption
Automatically encrypts all information on the hard drive—including user data, the operating system, temporary files and erased files, for maximum data protection. Logical partitions are boot-protected and encrypted sector-by-sector. Attempts to copy individual files or to introduce rogue programs are blocked, even when the hard drive is removed and slaved to a different computer.

Pre-Boot Authentication
Ensures that only authorized users are allowed to access the endpoint. All valid credentials must be provided before the operating system will boot. Multi-factor authentication options, such as certificate-based Smartcards and dynamic tokens, are supported. Multiple pre-boot authentication languages are supported for global deployments.

Single-console, Intuitive User Interface
The Full Disk Encryption Endpoint Software Blade provides an intuitive user interface for centralized management and easy viewing of security status and log files or making basic configuration changes.

Multiple client languages are for supported for global deployments.

 
Centralized management with single console

Secure Remote Help
Remote Password Change and One-Time Login remote help options are available for users who may have forgotten their passwords or lost access tokens. Web-based remote help options are available.

Central Management
The Full Disk Encryption Software Blade is centrally managed by the Endpoint Policy Management Software Blade, enabling central policy administration, enforcement and logging from a single, user-friendly console. Centralized management offers unmatched leverage and control of security policies and multiple deployment options offer easy installation and minimize user impact, for a reduced overall cost of operations.

Integrated into Check Point Software Blade Architecture
The Full Disk Encryption Software Blade is integrated into the Software Blade Architecture. Endpoint Security Software Blades from Check Point bring unprecedented flexibility, control and efficiency to the management and deployment of endpoint security. Choose from six Software Blades to deploy only the protection you need, with the freedom to increase security at any time from a single central management console.  

Specifications

Software Blade Specifications

Client Platform Support
Operating Systems Windows 7 (32 & 64-bit)
Windows Vista (32 & 64-bit)
Windows XP Pro (32-bit, SP2, SP3)
Windows 2000
Mac OS X (10.4.5 – 10.4.11, 10.5.0 - 10.7)
Linux (2.6.4+ kernel, Red Hat, SuSE 9.x, RHEL 4, NLD)
Client Language Support
Languages English
Japanese
French
Italian
German
Chinese (simplified)
Spanish
Russian
Pre-Boot Authentication Language Support
All Client Languages Plus: Chinese (Taiwan)
Czech
French (Canadian)
Hungarian
Korean
Polish
Portuguese
Portuguese (Brazilian)
Thai
Certifications
Full Disk Encryption Common Criteria EAL4
FIPS 140-2
Management Platform
See Endpoint Policy Management Software Blade 

Softa SuperStore
Softa SuperStore
Softa SuperStore