Check Point Full Disk Encryption simplifies deployment and management of endpoint security by automatically encrypting all hard drive contents

December 12, 2009

3 Min Read

PRESS RELEASE

December 9, 2009: Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, announced the release of Check Point Full Disk Encryption for Mac OS X 10.6 Snow Leopard " an industry-leading full-disk encryption solution with pre-boot authentication to support Mac operating systems.

Check Point Full Disk Encryption enhances data security and supports more end-user platforms than any other solution on the market, from Mac OS X, Windows, Linux, and VMware based systems to Symbian, Windows Mobile, and Palm based smartphones and PDAs.

Check Point Full Disk Encryption simplifies the deployment and management of endpoint security by automatically encrypting all hard drive contents, including the operating system and existing, temporary and erased system files. This new level of protection secures enterprises from unauthorized access to corporate information or network attacks, even if the hard drive is physically transferred to another computer. Now with support for Snow Leopard, Check Point enables customers to secure diverse operating systems, significantly improving the implementation and use of full-disk encryption in mixed environments. Check Point Full Disk Encryption also offers centralized deployment, management and logging capabilities to simplify policy administration, streamline compliance and reduce total cost of ownership.

"Enterprises need to ensure the same level of endpoint security is met throughout the organization," said Ben Khoushy, vice president endpoint security products. "Now with support for Snow Leopard, Check Point Full Disk Encryption offers customers one solution for all operating system types that is easy to deploy and manage, improving overall endpoint security."

Check Point Full Disk Encryption scales to any organization and is proven in major industry and government agency deployments around the world. In addition, Check Point Full Disk Encryption has been awarded the highest security certifications -- including International Common Criteria EAL4, FIPS-140-2 and BITS -- thereby enabling fast compliance with global data privacy rules and regulations. Regardless of operating systems in use across their network, customers benefit from powerful encryption technology and market-leading data security from Check Point, recognized as a leader in the Gartner Magic Quadrant for Mobile Data Protection nine years in row.

"More than 85% of our employees use Mac OS X as their primary desktop and notebook platform," said Allen Hancock, president of the Mac Consulting Group, Inc. "The stability and flexibility of Check Point Full Disk Encryption have been key benefits in easily managing our work environment without compromising the level of endpoint security for any operating system in place. We can now share information seamlessly, knowing our clients' data is safe."

Check Point's award-winning Full Disk Encryption solution provides enterprises with features and benefits including:

Pre-boot Authentication requires username and password before the operating systems loads, increasing security. Check Point Full Disk Encryption also supports multi-factor authentication options such as certificate-based Smart Cards or tokens.

Secure Remote Help provides users with remote help options and web-based remote support for lost access tokens or passwords.

Single User Interface simplifies setup, administration and ease of integration, and supports multiple languages for global deployments. Automatic and transparent operation has minimal effect on end users' productivity.

Central Management and Logging enables central policy enforcement and logging to meet growing compliance needs. Central configuration management lowers total cost of ownership.

More information on Check Point endpoint security solutions can be found at: www.checkpoint.com/products/endpoint_security/index.html

"Check Point Full Disk Encryption provides a simple and complementary security solution that offers the same level of data protection throughout the organization, regardless of multiple and existing operating systems in place," concluded Khoushy.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights