Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

12/11/2009
03:15 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Check Point: Adds Full Disk Encryption For Apple's Macintosh OS X Snow Leopard Platform

Check Point Full Disk Encryption simplifies deployment and management of endpoint security by automatically encrypting all hard drive contents

December 9, 2009: Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, announced the release of Check Point Full Disk Encryption for Mac OS X 10.6 Snow Leopard " an industry-leading full-disk encryption solution with pre-boot authentication to support Mac operating systems.

Check Point Full Disk Encryption enhances data security and supports more end-user platforms than any other solution on the market, from Mac OS X, Windows, Linux, and VMware based systems to Symbian, Windows Mobile, and Palm based smartphones and PDAs.

Check Point Full Disk Encryption simplifies the deployment and management of endpoint security by automatically encrypting all hard drive contents, including the operating system and existing, temporary and erased system files. This new level of protection secures enterprises from unauthorized access to corporate information or network attacks, even if the hard drive is physically transferred to another computer. Now with support for Snow Leopard, Check Point enables customers to secure diverse operating systems, significantly improving the implementation and use of full-disk encryption in mixed environments. Check Point Full Disk Encryption also offers centralized deployment, management and logging capabilities to simplify policy administration, streamline compliance and reduce total cost of ownership.

"Enterprises need to ensure the same level of endpoint security is met throughout the organization," said Ben Khoushy, vice president endpoint security products. "Now with support for Snow Leopard, Check Point Full Disk Encryption offers customers one solution for all operating system types that is easy to deploy and manage, improving overall endpoint security."

Check Point Full Disk Encryption scales to any organization and is proven in major industry and government agency deployments around the world. In addition, Check Point Full Disk Encryption has been awarded the highest security certifications -- including International Common Criteria EAL4, FIPS-140-2 and BITS -- thereby enabling fast compliance with global data privacy rules and regulations. Regardless of operating systems in use across their network, customers benefit from powerful encryption technology and market-leading data security from Check Point, recognized as a leader in the Gartner Magic Quadrant for Mobile Data Protection nine years in row.

"More than 85% of our employees use Mac OS X as their primary desktop and notebook platform," said Allen Hancock, president of the Mac Consulting Group, Inc. "The stability and flexibility of Check Point Full Disk Encryption have been key benefits in easily managing our work environment without compromising the level of endpoint security for any operating system in place. We can now share information seamlessly, knowing our clients' data is safe."

Check Point's award-winning Full Disk Encryption solution provides enterprises with features and benefits including:

Pre-boot Authentication requires username and password before the operating systems loads, increasing security. Check Point Full Disk Encryption also supports multi-factor authentication options such as certificate-based Smart Cards or tokens.

Secure Remote Help provides users with remote help options and web-based remote support for lost access tokens or passwords.

Single User Interface simplifies setup, administration and ease of integration, and supports multiple languages for global deployments. Automatic and transparent operation has minimal effect on end users' productivity.

Central Management and Logging enables central policy enforcement and logging to meet growing compliance needs. Central configuration management lowers total cost of ownership.

More information on Check Point endpoint security solutions can be found at: www.checkpoint.com/products/endpoint_security/index.html

"Check Point Full Disk Encryption provides a simple and complementary security solution that offers the same level of data protection throughout the organization, regardless of multiple and existing operating systems in place," concluded Khoushy.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.