|Page (1) of 1 - 12/09/09||email article||print page|
Check Point Endpoint Security Adds Full Disk Encryption for Apple's Macintosh OS X Snow Leopard PlatformCheck Point Full Disk Encryption for Macintosh OS X Snow Leopard Allows Businesses to Secure Data in Mixed Platform Environments (December 09, 2009)
REDWOOD CITY, CA -- (Marketwire) -- 12/09/09 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, announced the release of Check Point Full Disk Encryption(TM) for Mac OS X 10.6 Snow Leopard -- an industry-leading full-disk encryption solution with pre-boot authentication to support Mac operating systems. Check Point Full Disk Encryption enhances data security and supports more end-user platforms than any other solution on the market, from Mac OS X, Windows, Linux, and VMware based systems to Symbian, Windows Mobile, and Palm based smartphones and PDAs.
Check Point Full Disk Encryption simplifies the deployment and management of endpoint security by automatically encrypting all hard drive contents, including the operating system and existing, temporary and erased system files. This new level of protection secures enterprises from unauthorized access to corporate information or network attacks, even if the hard drive is physically transferred to another computer. Now with support for Snow Leopard, Check Point enables customers to secure diverse operating systems, significantly improving the implementation and use of full-disk encryption in mixed environments. Check Point Full Disk Encryption also offers centralized deployment, management and logging capabilities to simplify policy administration, streamline compliance and reduce total cost of ownership.
"Enterprises need to ensure the same level of endpoint security is met throughout the organization," said Ben Khoushy, vice president endpoint security products. "Now with support for Snow Leopard, Check Point Full Disk Encryption offers customers one solution for all operating system types that is easy to deploy and manage, improving overall endpoint security."
Check Point Full Disk Encryption scales to any organization and is proven in major industry and government agency deployments around the world. In addition, Check Point Full Disk Encryption has been awarded the highest security certifications -- including International Common Criteria EAL4, FIPS-140-2 and BITS -- thereby enabling fast compliance with global data privacy rules and regulations. Regardless of operating systems in use across their network, customers benefit from powerful encryption technology and market-leading data security from Check Point, recognized as a leader in the Gartner Magic Quadrant for Mobile Data Protection nine years in row.
"More than 85 percent of our employees use Mac OS X as their primary desktop and notebook platform," said Allen Hancock, president of the Mac Consulting Group, Inc. "The stability and flexibility of Check Point Full Disk Encryption have been key benefits in easily managing our work environment without compromising the level of endpoint security for any operating system in place. We can now share information seamlessly, knowing our clients' data is safe."
Check Point's award-winning Full Disk Encryption solution provides enterprises with features and benefits including:
- Pre-boot Authentication requires username and password before the operating systems loads, increasing security. Check Point Full Disk Encryption also supports multi-factor authentication options such as certificate-based Smart Cards or tokens.
- Secure Remote Help provides users with remote help options and web-based remote support for lost access tokens or passwords.
- Single User Interface simplifies setup, administration and ease of integration, and supports multiple languages for global deployments. Automatic and transparent operation has minimal effect on end users' productivity.
- Central Management and Logging enables central policy enforcement and logging to meet growing compliance needs. Central configuration management lowers total cost of ownership.
More information on Check Point endpoint security solutions can be found at: visit: www.checkpoint.com/products/endpoint_security/index.html.
"Check Point Full Disk Encryption provides a simple and complementary security solution that offers the same level of data protection throughout the organization, regardless of multiple and existing operating systems in place," concluded Khoushy.
Pricing and Availability
Check Point Full Disk Encryption for the Mac is available immediately and can be purchased through the Check Point worldwide network of value-added resellers. For Check Point Full Disk Encryption pricing, visit https://pricelist.checkpoint.com. To find a Check Point partner, visit http://partners.us.checkpoint.com/partnerlocator.
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point provides customers uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to innovate with the development of the Software Blade architecture. The dynamic Software Blade architecture delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment. Check Point customers include tens of thousands of businesses and organizations of all sizes including all Fortune 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.
©2009 Check Point Software Technologies Ltd. All rights reserved.
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=1133194
Copyright @ Marketwire
Related Keywords: Check Point Software Technologies Ltd., Computers/Peripherals,Internet,Computer,Notebook/Laptop,OS (Operating System),Digital Media Software,Computers/Home Office,Communications,Web,Notebooks,Apple,Networks,Security,Hard Drives & Storage,Smart Phone,Security,Unix,Mac,Linux,OS9,OSX,Marketwire, Inc.,IT (Information Technology),Security,Internet Technology,Computer Science,Internet,Other,