Download our in-depth report: The Ultimate Guide to IT Security Vendors
See our complete list of top 10 enterprise encryption solutions.
Check Point Software began in 1993 with a firewall offering and has since expanded to cover more security territory. It focuses on network cybersecurity and endpoint protection. It is publicly traded.
The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft. It protects from unauthorized access when laptops are lost or stolen, and provides support for Windows and Mac OS X. This product automatically encrypts all information on the hard drive. Logical partitions are boot-protected and encrypted sector-by-sector. Attempts to copy individual files or to introduce rogue programs are blocked, even when the hard drive is removed and slaved to a different computer.
Agents are used.
Markets and Use Cases
Check Point protects more than 100,000 organizations of all sizes.
It has been successfully used in data security deployments of more than 200,000 seats, and boasts a deployment rate of up to 50,000 seats per month.
Encryption algorithm standards, including XTS-AES and AES-CBC, are employed. Its CryptoCore encryption engine is certified to be compliant with FIPS 140-2 guidelines. It is compliant with Common Criteria and BITS. Trusted Platform Module and Network Authorized Preboot Bypass (Unlock On LAN) are also supported.
Standalone or Suite
Users deploy Check Point blades and can choose between encryption alone, or in most cases, include encryption as part of a larger endpoint security suite.
The encryption software is packaged inside a Check Point Software Blade. Users choose from a variety of blades to deploy the protection they need.
Check Point pricing is based around the sale of hardware blades, which contain various software features according to user need. The Check Point 4800 Data Protection Appliance with eight blades, for example, provides a data protection suite with a list price of $31,000. Pricing varies according to the software included.https://o1.qnsr.com/log/p.gif?;n=203;c=204650406;s=9477;x=7936;f=201801171513530;u=j;z=TIMESTAMP;a=20392955;e=i