TECHNOLOGIES

Host security

Endpoint security

Workstation protection from maximum number of threats, user work security precautions and data control.

Workstation complex protection includes the following:

malicious software protection;

malicious local network activity protection;

malicious web activity protection;

removable devices threats protection.

Modern solutions additionally provide all products centralized management, a flexible and granular workstation policy assignment, depending on eligibility, informative reports creation and flexible scalability.

PRODUCTS

Check Point Software Technologies

Endpoint Security

Endpoint Security

All endpoint security functions in a single agent, delivering total security with a simple user experience

DeviceLock

DeviceLock Endpoint DLP Suite

DeviceLock Endpoint DLP Suite

Prevent devastating data leaks by securing the endpoints of network.

Intel Security

Application Control

Application Control

Provides an effective way to block unauthorized applications and code on servers, corporate desktops, and fixed-function devices.

Change Control

Change Control

Eliminates change activity in server environments that can lead to security breaches, data loss, and outages.

Endpoint Protection Suite

Endpoint Protection Suite

Offers essential protection in an integrated solution that secures Windows systems against malware and unauthorized devices.

elements: 1-5

all elements: 5

15.11.2017 9:00 | News

26.10.2017 16:57 |

25.10.2017 16:56 |

Locky1024 attack analysis

17.10.2017 18:19 | News

13.10.2017 0:00 | News

CASE STUDIES

More case studies

NEXT STEPS

Send a request

NEWSLETTER SUBSCRIBTION

Enter a valid email address
that can be used to receive newsletters