Check Point Endpoint Security Primary Use Case

TonyPegrum
Head of IT at a real estate/law firm with 11-50 employees
We use it primarily for mobile phones. That is it. We really aren't using it in depth at all. We're using it just with basic configuration. View full review »
BalaKrishna
Director at eSupport
We are an international systems integrator company for Check Point Endpoint Security software solutions. View full review »
mckenn
Team Lead Implementation Services/Systems Integration Engineer at Trinidad Systems Limited
Our primary use case for this solution is Antivirus capabilities. These include Antimalware, Antibot, Anti-Ransomware, and Threat Emulation and Anti Exploit. We have a mixed environment that includes Windows 2012 R2 Windows 7 Windows 10 and macOS 10.xx. We also use VMware. The client has been installed on all servers, PC,s, laptops and MAC machines. We need all this infrastructure monitored for malicious activity and reporting if something happens in realtime. This solution has worked very well. View full review »
Learn what your peers think about Check Point Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: January 2021.
455,301 professionals have used our research since 2012.
GeraldChege
ICT Officer at Kenyatta National Hospital
We primarily use this solution as the main firewall for the perimeter of the hospital. We use the firewall itself for URL filtering, application filtering, and identity awareness. View full review »
CVSNMurthy
Head of IT at Cosyn Ltd
We use it for government utility billing, with all of our systems located in different places, working remotely as well. We also have an on-prem data center here in India. We have Check Point to cover all these things. View full review »
Jose-Cristovao
Novell, Microsoft, and UNIX Network Administration at GDDC
We use this solution for endpoint protection in our office. View full review »
CTIo67
CIO / CTO at a financial services firm with 51-200 employees
We primarily use the solution to prevent and detect the abnormalities and viruses on endpoints. It's also to monitor endpoints and the use of endpoints when it comes to identifying items like USB sticks, etc. because it's not really in our company policy to allow the use of a USB at work stations. View full review »
Kirtikumar Patel
Network Engineer at LTTS
We are using Check Point Endpoint security to protect our remote users, as well as our roaming users that are accessing our on-premises resources externally. We have come to know that our remote and roaming users are completely secure with Check Point Endpoint Security. With this confidence, we are now planning to roll out this solution for our on-premises resources, including machines and devices, as well. This will give us complete endpoint security. View full review »
seniorse527517
Senior Security Consultant - Checkpoint Technologies at a tech services company with 11-50 employees
We have implemented Check Point for endpoint protection. View full review »
MauricioTorres
Operations Director at a tech services company with 1-10 employees
We use it to help clients solve their security problems. View full review »
reviewer1375017
Senior Solution Architect at a comms service provider with 51-200 employees
We mostly use Check Point Endpoint Security on-premise. But there are instances in which we use it in the cloud as well. It's mostly integrated into Microsoft Windows and that makes it really simple. They have an integration solution for the whole spectrum of endpoint features. For example, their Keystone solution. They also have a lot of other features. You can easily keep track of user access, how their device has been protected, and what software they have. We can see what processes are running and what network connections they have. We used it to control which devices can connect. It's a balance of freedom for the users and confidentiality. View full review »
JaapGiliam
Owner at Giliam Network & System Solutions
The primary use case for this solution is security. View full review »
Lead547e
Lead at a financial services firm with 10,001+ employees
The primary use case is VPN. View full review »
Learn what your peers think about Check Point Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: January 2021.
455,301 professionals have used our research since 2012.