Check Point Pointsec [EOL] Primary Use Case

AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS

The tool was implemented in the company to provide computer security for the encryption of disks to protect information stored in electronic devices such as computers, mobile phones, laptops, and smartphones. Its characteristics and functionalities were presented in their proper form and were able to guarantee that all our regulations were completely protected and insured in case of theft or loss of equipment. In cases where they were lost or stolen, strangers could not obtain any sensitive information.

It's an excellent solution in the security market.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

Check Point Pointsec was one of the solutions we used when we were on-premise; it is an endpoint encryption solution that we used to protect confidential data on laptops, desktops, and removable media. With this, we were able to secure many devices and safeguard information. When we did the migration to the Azure cloud we had to make changes in our security tools, and one that we changed was this one for one of the same brand (since we had used it for many years and we already had the experience and support with Check Point). This is why, in the end, we acquired Check Point Full Disk Encryption Software.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

We had the need to provide our users with a secure organizational browsing experience based on the fact that in the past, we had attacks by more inexperienced users browsing the network without the relevant security. 

The initiative to implement a Check Point solution was encouraged due to the fact that we already have a relationship with the brand, and it was where we adopted the Check Point Secure Web Gateway, which was mainly to help filter the URLs that each user tried to access and block some categories so that they are not reachable.

View full review »
Buyer's Guide
Endpoint Encryption
April 2024
Find out what your peers are saying about Check Point Software Technologies, Microsoft, Broadcom and others in Endpoint Encryption. Updated: April 2024.
768,415 professionals have used our research since 2012.
it_user1260429 - PeerSpot reviewer
Network Security Architect at a financial services firm with 10,001+ employees

Check Point GAiA was part of our firewall and security solution.

View full review »
Buyer's Guide
Endpoint Encryption
April 2024
Find out what your peers are saying about Check Point Software Technologies, Microsoft, Broadcom and others in Endpoint Encryption. Updated: April 2024.
768,415 professionals have used our research since 2012.