Check point endpoint security r60 in Title/Summary
Check Point Endpoint Security
Check Point endpoint security solutions provide data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. Check Point Anti-Malware and Application Control further help to efficiently detect malware with a single scan and make sure only approved software programs are running on end-user systems.
- Publisher: Checkpoint Software Inc.
- Home page: www.checkpoint.com
- Last updated: June 14th, 2016
- Publisher: Check Point Software Technologies Ltd.
- Home page: www.checkpoint.com
- Last updated: April 18th, 2008
Check Point VPN-1 SecuRemote/SecureClient NGX R60 HFA1
Check Point recommends that customers remain up-to-date with the latest HFAs, as they contain security enhancements and protection against new and evolving.rnThis HFA is a recommended update that resolves various issues and contains improvements for SecureClient and other Check Point products on a variety of platforms.
- Publisher: Check Point Software Technologies
- Last updated: March 2nd, 2008
Check point endpoint security r60 in Description
Pointsec for PC
The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
- Publisher: Check Point Software
- Last updated: August 21st, 2008
Symantec Network Access Control
Symantec Network Access Control is a network security solution that controls access to corporate networks, enforces endpoint security policy and easily integrates with existing network infrastructures. Regardless of how endpoints connect to the network, Symantec's award-winning network security solution discovers and evaluates endpoint compliance status.
- Publisher: Symantec Corporation
- Last updated: October 13th, 2011
Check Point R70
Software Blades enable users to efficiently and quickly tailor Security Gateway and Management functionality to specific and changing needs. When running on multi-core platforms and appliances, Check Point CoreXL technology delivers near linear performance scalability for many of the Software Blades.
- Publisher: CheckPoint
- Home page: supportcenter.checkpoint.com
- Last updated: May 23rd, 2012
USB Blocker
The freeware NetWrix USB Blocker centrally disables USB devices to prevent unauthorized use of removable media that connects to computer USB ports, for example, memory sticks, removable hard disks, iPods, and more. Works without agents!
- Publisher: USB Blocker
- Home page: www.netwrix.com
- Last updated: September 30th, 2012
Cisco Security Conversion Tool
Cisco Security Conversion Tool (SCT) is a software program to assist in converting a Check Point Firewall configuration into a Cisco ASA, PIX, or FWSM configuration. Converts one Check Point configuration at a time with a simple wizard-based GUI. Converts from Check Point 4.x and NG Firewalls
- Publisher: Cisco Systems
- Home page: www.cisco.com
- Last updated: May 28th, 2010
Additional Check point endpoint security r60 selection
Kaspersky Endpoint Security for Windows
Kaspersky Endpoint Security for Windows is a software solution developed to help users to keep their personal devices safe from nowadays threats. It is best suited for owners of small to medium businesses because it allows them to secure the internal IT infrastructure easily.
- Publisher: Kaspersky Lab
- Home page: www.kaspersky.com
- Last updated: January 30th, 2024
ESET Endpoint Security
Powerful multilayered protection that leverages ESET's unique global threat detection network, machine learning capabilities and human expertise. A single layer of defense is not enough. Detect malware pre-execution, during execution and post-execution of the lifecycle to provide the highest level of protection possible.
- Publisher: ESET, spol. s r.o.
- Home page: www.eset.com
- Last updated: July 30th, 2024
Seqrite Endpoint Security
Seqrite Endpoint Security (SEPS) is designed to provide complete security solutions to small and enterprise-level networks against various kinds of malicious threats such as viruses, Trojans, worms, backdoors, spyware, riskware, adult content, and hackers.
- Publisher: Quick Heal Technologies Pvt. Ltd.
- Last updated: May 6th, 2015
Check Point SSL Network Extender
SSL connections are a great remote access solution because they do not require IT departments to upgrade and manage client software. All a user needs is a Web browser. However, remote users still need to access network applications. SSL Network Extender is a browser plug-in that provides clientless remote access, while delivering full network connectivity for any IP-based application.
- Publisher: CheckPoint
- Home page: www.checkpoint.com
- Last updated: March 15th, 2008
- Publisher: Lumension Security, Inc.
- Home page: www.lumension.com
- Last updated: May 21st, 2015
Check Point VPN-1 SecuRemote/SecureClient NGX R60 HFA3
The SecureClient allows you to connect to your organization in a secure manner, while at the same time protecting your machine from attacks that originate on the Internet. You can access private files over the Internet knowing that unauthorized persons cannot view the same file or alter it.
- Publisher: Check Point
- Last updated: December 18th, 2009
Check Point SmartConsole R70
SmartDashboard is a single, comprehensive user interface for defining and managing multiple elements of a security policy: firewall security, VPNs, network address translation, web security, desktop security, anti-virus security, SmartDefense threat defense protections, QoS and VPN client security.
- Publisher: Check Point Software Technologies Ltd.
- Home page: www.checkpoint.com
- Last updated: March 13th, 2009
Check Point SmartConsole R75
In the face of increasingly sophisticated attacks, it takes multiple layers of security to be protected today - at the perimeter, inside the network, at all user endpoints. How can you manage the growing complexity? Check Point's Network Policy Management Software Blade gives you control over configuring and managing even the most complex security deployments
- Publisher: CheckPoint
- Home page: supportcenter.checkpoint.com
- Last updated: January 11th, 2011
Endpoint Security MI Device Agent
Device Agent will not install, and any component extension fails. The following InstallShield Device Agent Module error is displayed: "Could not find framework for Endpoint Security MI Database - Device Agent Module. Check that the extension matches the framework and that the framework has been installed."
- Publisher: Check Point Software Technologies Ltd.
- Home page: supportcenter.checkpoint.com
- Last updated: December 26th, 2012
ZoneAlarm Security Suite
An integral security solution for PC systems. It offers safe firewall, parental control, instant message control, antivirus, antikeyloggers, antispam and identity theft protection, and remote control monitoring, with several options to set for a personal use of the application. The AntiSpyware protection can be turned on/off manually, scan the system anytime, update the spyware database, etc.
- Publisher: Check Point, Inc
- Home page: www.zonealarm.com
- Last updated: May 4th, 2011