How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
We use this solution for endpoint protection in our office.
We use it primarily for mobile phones. That is it. We really aren't using it in depth at all. We're using it just with basic configuration.
The primary use case for this solution is security.
We primarily use the solution to prevent and detect the abnormalities and viruses on endpoints. It's also to monitor endpoints and the use of endpoints when it comes to identifying items like USB sticks, etc. because it's not really in our company policy to allow the use of a USB at work stations.
We have implemented Check Point for endpoint protection.
We primarily use this solution as the main firewall for the perimeter of the hospital. We use the firewall itself for URL filtering, application filtering, and identity awareness.
We use it for government utility billing, with all of our systems located in different places, working remotely as well. We also have an on-prem data center here in India. We have Check Point to cover all these things.
We use it to help clients solve their security problems.
The primary use case is VPN.
We are an international systems integrator company for Check Point Endpoint Security software solutions.