Data Protection from CheckPoint
Who and what is CheckPoint Software?
Checkpoint Software Technologies Ltd. is not only the author of data protection software; they are also the pioneer of Computer Security applications, as well as the integrated Turnkey Security gateway solutions. It offers security from home users to corporate giants, comprehensive data and computer protection applications. They also offer products such as hardware firewalls, gateways, virtual ports and more; including the widest and most secure range of computer protection products. Let’s take a look at the product from Check Point which is called the Pointsec.
What is Pointsec?
Pointsec is a division of Checkpoint Software offering a unique line of software tools. The following endpoint security solutions are:
- Check Point Full Disk Encryption (previously called Pointsec PC)
Pointsec PC is best for protecting your Desktop or Laptop. With the ability to install a central management console on a server, Pointsec PC can be deployed to an entire organization’s network. If the Laptop or Desktop was stolen, the data on the hard drive is protected from unauthorized access. Using a Pre-Boot authentication system, a username and password is required before the operating system boots up. Pointsec PC is also supported by multiple platforms including Microsoft Windows, MAC OSX and even Linux. Boosting some of the highest security certification, including the Federal Information Processing Standard (FIPS), common criteria and bits put Pointsec PC on a highly rated list of encryption utilities available. So if you have a Desktop, Laptop, Apple Mac or MacBook, you should choose to be protected by Pointsec PC.
- Check Point Media Encryption (previously called Pointsec Protector)
Encrypt your files and folders using Pointsec protector. Pointsec protector can track and manage your removable storage devices individually, as well as it automatically adds transparent encryption to any CD’s and DVD’s being created. A device access setting allows the user to define devices to protect by type, brand, size or ID. Access to specified ports, including USB, firewire, Bluetooth, Wi-Fi and LPT ports, can also be centrally managed. A comprehensive list of device types supported includes USB flash drives, FDD drive, External HDD, PDA, Windows Mobile Smartphone, iPhone, iPod, BlackBerry, modems, printers, imaging device, keyboard, mouse, digital camera, smart card readers and even biometric input devices.
- Point sec Mobile
Protect your company’s mobile devices using Pointsec Mobile. Pointsec Mobile encryption secures your company’s data stored on smart phones, whether it may be e-mails or documents, call history or messages. Pointsec mobile also supports a large number of mobile platforms including Symbian, Pocket PC, Windows Mobile and Palm operating systems. Any information that might be stored on either the memory card or the device memory gets automatically protected in the encryption applied by Pointsec Mobile.
When it comes to requiring protection to an extremely sensitive data, the Pointsec range of software applications offered from Check Point Software are definitely worth checking out. Being able to centrally manage security policies across a wide range of devices; remotely assist users and resets passwords from the central management console put these software packages into a league of their own. What can also be expected from software in this range is also a hefty price tag attached. Although, still available as a Free 30-Day trial version which can be tried out to see how well the software actually works.