Check Point Capsule Software [EOL] Valuable Features

Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

All the functions that this technology brings us are very valuable in the protection of the organization. With these functions, we can keep our confidential data well protected. 

The antivirus is great since it helps us with the real-time protection of all devices.

The firewall is useful. With its characteristics, we were able to control access to the network such as web filtering, port denial, and black or white listing, among other capabilities.

The VPN helped us a lot since it was possible to allow access from remote locations or users with permissions.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

Among the most outstanding features is being able to access our data in a secure, encrypted way and use it under the same license for up to a maximum of three devices per user. This gives great value to the application. Another of the features that I see very that stands out is that Check Point Capsule can use SSO so that we can use a single identity for all our users and tasks in the organization. We are going to mention that it is not to forget the compatibility for iOS and Android devices that are the most common, and the tool is available for use. 

View full review »
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro

We're taking advantage of the computing power that the cloud has made. Also, Infinity has been evolving, giving us the possibility of integrating real-time viewing and analysis of threats in all the gateways. Connections services are available to users who were outside the organization by using a web-based and very intuitive user interface that makes the use of any browser easy for users. 

Something that is important to emphasize is that the solution can be installed on Windows or Mac operating systems. It is easy to run on any computer, which today is the most common thing used in the market.

View full review »
Buyer's Guide
Mobile Data Protection
April 2024
Find out what your peers are saying about Check Point Software Technologies, Microsoft, Secude and others in Mobile Data Protection. Updated: April 2024.
769,599 professionals have used our research since 2012.
VN
System and Network Administrator at Auriga - The banking e-volution

The most valuable feature is how easy it is to deploy. You will not believe it but I bring you my real experience. At first, we were very hesitant of this application because we didn't want to engage in managing additional software. Then, a colleague installed it independently and began to use the company management system from a smartphone instead of a laptop, without any intervention necessary on our part.

The colleague downloaded this application from the store himself and used the same credentials and the same links that he used on his company laptop. This surprised us a lot and we were able to introduce this new product without lifting a finger. We simply told our employees to download it and use the credentials they already have. This was fantastic!

View full review »
Buyer's Guide
Mobile Data Protection
April 2024
Find out what your peers are saying about Check Point Software Technologies, Microsoft, Secude and others in Mobile Data Protection. Updated: April 2024.
769,599 professionals have used our research since 2012.