Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Check point endpoint security r60 in Title/Summary

Check Point Endpoint Security

Check Point Endpoint Security

Check Point endpoint security solutions provide data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. Check Point Anti-Malware and Application Control further help to efficiently detect malware with a single scan and make sure only approved software programs are running on end-user systems.

  • Publisher: Checkpoint Software Inc.
  • Home page: www.checkpoint.com
  • Last updated: June 14th, 2016
Check Point SmartConsole NGX R60

Check Point SmartConsole NGX R60

Check Point SmartConsole NGX R60 5.0

  • Publisher: Check Point Software Technologies Ltd.
  • Home page: www.checkpoint.com
  • Last updated: April 18th, 2008
Check Point VPN-1 SecuRemote/SecureClient NGX R60 HFA1

Check Point VPN-1 SecuRemote/SecureClient NGX R60 HFA1

Check Point recommends that customers remain up-to-date with the latest HFAs, as they contain security enhancements and protection against new and evolving.rnThis HFA is a recommended update that resolves various issues and contains improvements for SecureClient and other Check Point products on a variety of platforms.

  • Publisher: Check Point Software Technologies
  • Last updated: March 2nd, 2008

Check point endpoint security r60 in Description

Pointsec for PC

Pointsec for PC

The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.

Symantec Network Access Control

Symantec Network Access Control

Symantec Network Access Control is a network security solution that controls access to corporate networks, enforces endpoint security policy and easily integrates with existing network infrastructures. Regardless of how endpoints connect to the network, Symantec's award-winning network security solution discovers and evaluates endpoint compliance status.

  • Publisher: Symantec Corporation
  • Last updated: October 13th, 2011
Check Point R70

Check Point R70

Software Blades enable users to efficiently and quickly tailor Security Gateway and Management functionality to specific and changing needs. When running on multi-core platforms and appliances, Check Point CoreXL technology delivers near linear performance scalability for many of the Software Blades.

  • Publisher: CheckPoint
  • Last updated: May 23rd, 2012
USB Blocker

USB Blocker

The freeware NetWrix USB Blocker centrally disables USB devices to prevent unauthorized use of removable media that connects to computer USB ports, for example, memory sticks, removable hard disks, iPods, and more. Works without agents!

  • Publisher: USB Blocker
  • Home page: www.netwrix.com
  • Last updated: September 30th, 2012
Cisco Security Conversion Tool

Cisco Security Conversion Tool

Cisco Security Conversion Tool (SCT) is a software program to assist in converting a Check Point Firewall configuration into a Cisco ASA, PIX, or FWSM configuration. Converts one Check Point configuration at a time with a simple wizard-based GUI. Converts from Check Point 4.x and NG Firewalls

  • Publisher: Cisco Systems
  • Home page: www.cisco.com
  • Last updated: May 28th, 2010

Additional Check point endpoint security r60 selection

Kaspersky Endpoint Security for Windows

Kaspersky Endpoint Security for Windows

Kaspersky Endpoint Security for Windows is a software solution developed to help users to keep their personal devices safe from nowadays threats. It is best suited for owners of small to medium businesses because it allows them to secure the internal IT infrastructure easily.

  • Publisher: Kaspersky Lab
  • Home page: www.kaspersky.com
  • Last updated: January 30th, 2024
ESET Endpoint Security

ESET Endpoint Security

Powerful multilayered protection that leverages ESET's unique global threat detection network, machine learning capabilities and human expertise. A single layer of defense is not enough. Detect malware pre-execution, during execution and post-execution of the lifecycle to provide the highest level of protection possible.

  • Publisher: ESET, spol. s r.o.
  • Home page: www.eset.com
  • Last updated: July 30th, 2024
Seqrite Endpoint Security

Seqrite Endpoint Security

Seqrite Endpoint Security (SEPS) is designed to provide complete security solutions to small and enterprise-level networks against various kinds of malicious threats such as viruses, Trojans, worms, backdoors, spyware, riskware, adult content, and hackers.

  • Publisher: Quick Heal Technologies Pvt. Ltd.
  • Last updated: May 6th, 2015
Check Point SSL Network Extender

Check Point SSL Network Extender

SSL connections are a great remote access solution because they do not require IT departments to upgrade and manage client software. All a user needs is a Web browser. However, remote users still need to access network applications. SSL Network Extender is a browser plug-in that provides clientless remote access, while delivering full network connectivity for any IP-based application.

Lumension Endpoint Security Client

Lumension Endpoint Security Client

Lumension Endpoint Security Client 4.5.2710

  • Publisher: Lumension Security, Inc.
  • Home page: www.lumension.com
  • Last updated: May 21st, 2015
Check Point VPN-1 SecuRemote/SecureClient NGX R60 HFA3

Check Point VPN-1 SecuRemote/SecureClient NGX R60 HFA3

The SecureClient allows you to connect to your organization in a secure manner, while at the same time protecting your machine from attacks that originate on the Internet. You can access private files over the Internet knowing that unauthorized persons cannot view the same file or alter it.

  • Publisher: Check Point
  • Last updated: December 18th, 2009
Check Point SmartConsole R70

Check Point SmartConsole R70

SmartDashboard is a single, comprehensive user interface for defining and managing multiple elements of a security policy: firewall security, VPNs, network address translation, web security, desktop security, anti-virus security, SmartDefense threat defense protections, QoS and VPN client security.

  • Publisher: Check Point Software Technologies Ltd.
  • Home page: www.checkpoint.com
  • Last updated: March 13th, 2009
Check Point SmartConsole R75

Check Point SmartConsole R75

In the face of increasingly sophisticated attacks, it takes multiple layers of security to be protected today - at the perimeter, inside the network, at all user endpoints. How can you manage the growing complexity? Check Point's Network Policy Management Software Blade gives you control over configuring and managing even the most complex security deployments

Endpoint Security MI Device Agent

Endpoint Security MI Device Agent

Device Agent will not install, and any component extension fails. The following InstallShield Device Agent Module error is displayed: "Could not find framework for Endpoint Security MI Database - Device Agent Module. Check that the extension matches the framework and that the framework has been installed."

ZoneAlarm Security Suite

ZoneAlarm Security Suite

An integral security solution for PC systems. It offers safe firewall, parental control, instant message control, antivirus, antikeyloggers, antispam and identity theft protection, and remote control monitoring, with several options to set for a personal use of the application. The AntiSpyware protection can be turned on/off manually, scan the system anytime, update the spyware database, etc.

  • Publisher: Check Point, Inc
  • Home page: www.zonealarm.com
  • Last updated: May 4th, 2011