Endpoint Security logo
0(0 reviews)
Software Status:N/A

About Endpoint Security

Check Point Endpoint Security is a comprehensive security software from Check Point Software Technologies that focuses on protecting enterprise endpoints in an increasingly connected world. It combines advanced Firewalls, Firewall Cluster, Industrial Firewalls, and SMB Firewalls, along with DDoS Protection, to provide reliable defense against a variety of cyber threats. The solution supports a range of environments, ensuring that both corporate and industrial systems are secured effectively. Additionally, it enables organizations to maintain compliance and safeguard sensitive information. Key capabilities: advanced Firewalls Firewall Cluster Industrial Firewalls SMB Firewalls DDoS Protection Best for: enterprises and organizations that need to secure their endpoints against evolving cyber threats.

Endpoint Security Details

Vendor
Check Point Software Technologies
Year Launched
Location
Check Point Software Technologies 5 Ha'Solelim Street, Tel Aviv, Israel.
Deployment
Training Options
demo, account manager, community
Countries Served
All Countries
Languages
English, Spanish, French, German, Italian, Japanese, Korean, Portuguese, Russian, Simplified Chinese, Traditional Chinese
Users
Administrator, IT Manager, Security Analyst, Network Engineer, System Integrator, Compliance Officer.
Industries Served
Healthcare, Education, Finance, Retail, Government, Manufacturing, Technology
Tags
Endpoint Protection, Security, Network Security, Malware Protection, Data Loss Prevention, Threat Prevention, Firewall, Anti-virus, Anti-malware

Endpoint Security's In-App Market Place

Does Endpoint Security have an in-app market place?

Yes

How many Mini-Apps in the marketplace?

4

Mini Apps

1. SandBlast Agent: Advanced threat prevention solution that protects endpoints from sophisticated attacks.

2. Forensics and Threat Emulation: Conducts thorough forensic investigations and emulates potential threats to identify key indicators of compromise.

3. Behavioral Guard: Uses machine learning algorithms to analyze endpoint behavior and detect and mitigate suspicious activities.

4. Compliance Monitoring: Ensures that endpoints are compliant with security policies and regulations by monitoring configurations and settings.

Pricing Options

Free trial
Free version
Request a quote
Promo Offer

Accepted Payment Currencies

Usd ($), Eur (€), Gbp (£), Jpy (¥), Aud (A$), Cad (C$), Chf (Chf), Cny (¥), Sek (Kr), Nzd (Nz$), Rub (₽), Zar (R), Inr (₹), Brl (R$), Hkd (Hk$), Mxn (Mex$), Ils (₪), Sar (﷼), Sgd (S$), Try (₺)

Pros & Cons

  • Provides real-time threat prevention to protect against advanced attacks
  • Offers complete visibility and control over endpoints
  • Integrates easily with existing security infrastructure
  • Includes endpoint threat forensics for comprehensive incident response
  • Provides advanced anti-ransomware technology to safeguard valuable data
  • Requires additional training for users to fully utilize its features
  • Can be resource-intensive, affecting system performance
  • Limited support for mobile devices compared to other endpoint security solutions
  • High cost may be prohibitive for smaller organizations
  • Integration with other security products may be complex and time-consuming.

Endpoint Security's Support Options

Endpoint Security's Alternatives