Check Point Endpoint Security Archived Reviews (More than two years old)

Filter by:
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Vendor
IT Administrator at a healthcare company with 1,001-5,000 employees
Aug 22 2013

What do you think of Check Point Endpoint Security?

We use Checkpoint here, and are currently in the process of planning a major from the standalone client to the full console version. They had some issues in the past with the OS X and Windows versions not being in sync, but with the latest release E80 release, the clients are identical. There are still a few gaps, such as not supporting Fusion drives, but overall, things have been great. Deployment has been simple: We create a composer package that pushes the installer and our installation profile onto the client, and then call a script to run through the pkg installer. It has worked flawlessly for us. As far as management goes, the reason we are moving to the console version is to have better reporting. Currently, the encryption files are written to a File share, and that is…
Vendor
Network Manager at a manufacturing company with 501-1,000 employees
Apr 01 2013

What is most valuable?

Endpoint security is a client-server managed network protection program. It blocks unauthorized software, malware, virus etc from entering the network and each client machine. Can be set up company specific to block specific file extensions or other devices from accessing the network. It provides updates based on server settings, can perform one network scan daily and can be set up to scan per… more »

What needs improvement?

Endpoint security programs can be a bit pricey, but you are receiving basically the same type of protection from each software program. To upgrade from one version to the next can get very costly providing what type of equipment you are running the program on. I did not find that endpoint security was very compatible during the upgrade. I ended up spending a lot more money than budgeted due to… more »

What other advice do I have?

All in all, endpoint security does the basics of blocking unauthorized software, malware, virus, etc. It is client/server based software. Works good unless you need to upgrade then compatibility issues may arise. Would recommend for any user. Runs behind the scenes, and the scans are designed to run without effecting a user ability to work on their pc.
Learn what your peers think about Check Point Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
438,043 professionals have used our research since 2012.
Vendor
Tech Support Staff at a tech company with 1,001-5,000 employees
Jul 01 2012

What is most valuable?

Endpoint security protects networks from unauthorized programs, viruses and malware, and allows you to control the network by blocking devices that you do not want to have access to it, for example by file extensions or using the device’s ID.It also controls access and prevents theft of data by controlling access to storage devices that are portable. USB storage devices are also encrypted for… more »

What needs improvement?

It took me time to learn how to configure endpoint security. Getting one for our Unix-based systems was not easy because most programs available in the market are windows-based. Implementing security on the latest endpoint devices was not easy due to compatibility issues.

What other advice do I have?

Endpoint security is implemented on client-server network model to ensure that end devices in the network are totally secure before having access to the network. Endpoint security can be implemented as a firewall or an anti-virus program that can be configured to include intrusion detection properties. It is also used in cloud computing and can be hosted or used on-site. It is a very flexible and… more »

What is Check Point Endpoint Security?

Check Point SandBlast Agent is a complete endpoint security solution offering a fleet of advanced endpoint threat prevention capabilities so you can safely navigate today’s menacing threat landscape.It provides a comprehensive system to proactively prevent, detect, and remediate evasive malware attacks. SandBlast Agent is a core product of Check Point Infinity, creating a unified security architecture. Learn more about Endpoint Security.

Also known as
Endpoint Security
Check Point Endpoint Security customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners

BUYER'S GUIDE
Download our free Check Point Endpoint Security Report and get advice and tips from experienced pros sharing their opinions.