端點管理

端點軟體能透過單一控制,讓不管是MAC或是PC,都能輕易駕馭。

儀表板介面簡易好操作,讓使用者能監控,同時管理執行,只需要滑鼠點擊即可輕鬆完成。

優勢

統一的端點安全管理能安全的降低漏洞發生
・單一控制台

・專注於業務的作業方式,簡易的文字介面
・全方面可預先配置的安全策略
・集成到Check Point軟體架構中實現按需安全

安全性和概覽儀表板的最大可見度和控制
・管理整個組織,團體,用戶及其設備的安全
・在登入網絡之前強制並修復端點遵從性
・跨網絡和端點搜索安全事件
・從一個管理設備管理端點和網絡安全

政策管理和用戶安全,而不僅僅是機器
・深入了解用戶和所有關聯的計算機以調查狀態
・將安全策略應用於用戶,無論他們登錄哪台機器
・修改,跟踪和報告組織各級的政策變更
・使用AD或自定義您自己的組織結構以實施策略

特性

Unified Endpoint Security Management

A full suite of Endpoint Security Software Blades are managed under one console and server by the Endpoint Policy Management Software Blade, providing:

  • Full Disk Encryption: Combines pre-boot protection, boot authentication and strong encryption to make sure that only authorized users are given access to information stored on desktops and laptops.

  • Media Encryption and Port Protection: Protects data stored on the computers by encrypting removable media devices and allowing tight control over computers’ ports (USB, Bluetooth and so on).

  • Capsule Docs: Capsule Docs is a secure mobile document management system that follows your documents wherever they go, making sure you have complete control over who is accessing sensitive data and what they can do with it.

  • Remote Access VPN: Provide secure, seamless access to corporate networks remotely

  • Anti-Malware: Protect endpoints from unknown viruses, worms, and Trojan horse malware.

  • Firewall and Compliance Check: Stop unwanted traffic, prevent malware and block targeted attacks and ensuring that protected computers comply with your organization’s security requirements and assign different security levels according to the compliance state of the endpoint computer.

  • SandBlast Agent: SandBlast Agent defends endpoints with a complete set of real-time advanced protection technologies, including Threat Emulation, Threat Extraction, Anti-Ransomware, Anti-Bot, Zero Phishing and Automated Incident Analysis.

 


Granular User Security

The Endpoint Policy Management Software Blade provides granular user security, in addition to associated machines, from a single console.

With an Active Directory-based structure, search or drill down from the console within a few clicks to view:

  • Organizations

  • Groups

  • Specific users

  • User’s associated machines

In addition:

  • All policies and exceptions are viewable and editable from one screen

  • Policies can be changed for groups or individuals

  • Unique ‘sliders’ make setting policy easy

  • Fine-grained policy settings can be customized for exceptions


Free Compliance Analysis Tool

This free tool provides an immediate visibility to your current endpoint security posture and potential risks. This tool will analyze your security posture and provide with a report including 3 categories: Data Loss risks, Intrusion Risks and Malware Risks.


Integrated into Check Point Software Blade Architecture

The Endpoint Policy Management Software Blade is fully integrated into the Software Blade architecture, saving time and reducing costs by allowing customers to quickly expand security protections to meet changing requirements.

Single Console and Customizable At-a-Glance Dashboard

The Endpoint Policy Management Software Blade enables central policy management, enforcement and logging from a single, user-friendly console. Centralized management offers unmatched leverage and control of security policies and multiple deployment options offer easy installation and minimize user impact, for a reduced overall cost of operations.

Compliance Check

The Endpoint Policy Management Software Blade allows you to enforce endpoint compliance on multiple checks before users log into the network.

You can check that the:

  • appropriate endpoint security software blades are installed

  • correct OS service pack are installed on the endpoint

  • only approved applications are able to run on the endpoint

  • appropriate anti-malware product and version is running on the endpoint.

Plus, set users to Observe, Warn, or Restrict access to the network if they are not compliant with the policy. Also, allows for automatic or user-based remediation.


Integrated with Check Point Management Architecture

Manage Endpoint and Network Security from one management appliance with capabilities such as performing security forensics, security analysis, and search security events.

Downloads

創泓科技股份有限公司  台北總公司

Uniforce Technology Corporation

台北市內湖區洲子街77號10樓

電話 +886-2-2658-3077 

傳真 +886-2-2658-3097

服務專線 0809-085-580

技 術 客 服    0809-085-580

業 務 部 門    台北 - 222 / 221 / 205 / 226 / 288

技 術 部 門    台北 - 301 / 302 / 303 / 308 / 309

Copyrights © 2019 uniforce Technology Co., Ltd.