Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.
Do You Manage Peer Insights at Check Point Software Technologies?
Access Vendor Portal to update and manage your profile.
Check Point Full Disk Encryption Software has Pre-Boot Authentication which requires users to authenticate before the operating system loads. Thus unauthorized users cannot access the login screen. The centralized management console allows IT administrators to manage different encryption policies, monitor compliance and deploy updates to all endpoints. The software can encrypt all files on the drive - system files, temporary files, OS files, without requiring user intervention.
Ease of use. Information is displayed. Performance reasonable.
Robust full-disk encryption with minimal performance impact. Centralized management and policy control for all endpoints. seamless integration with the Checkpoint Endpoint Security Suite.
IT teams need to know the Check Point's ecosystem well to effectively deploy and implement the Check Point Full Disk Encryption Software. Deployment and integration with existing infrastructure can sometimes be time-consuming and technically demanding. Another disadvantage is that older devices with limited processing power have slower boot times and reduced performance during encryption tasks. The software also does not always provide real-time visibility into the encryption process or the health of individual endpoints.
Setting up can be faster. Need some time to learn to use. But after that it is fine. Would be good if performance can be even speed up further.
initial deployment and key recovery can be complex. limited user self-service options for password recovery. occasional compatibility issues with older hardware or OS versions.