Skip to main content
TrustRadius
Check Point Endpoint Media Encryption and Port Protection (Pointsec)

Check Point Endpoint Media Encryption and Port Protection (Pointsec)

Overview

What is Check Point Endpoint Media Encryption and Port Protection (Pointsec)?

Check Point Endpoint Media Encryption and Port Protection solution, based on technology acquired with the former Pointsec, is an endpoint encryption option from Check Point Software Technologies in California.

Read more
Recent Reviews
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Check Point Endpoint Media Encryption and Port Protection (Pointsec)?

Check Point Endpoint Media Encryption and Port Protection solution, based on technology acquired with the former Pointsec, is an endpoint encryption option from Check Point Software Technologies in California.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

3 people also want pricing

Alternatives Pricing

What is BitLocker?

Microsoft's BitLocker is an endpoint encryption option.

What is NordLocker?

NordLocker is an encrypted cloud for files, compatible with all file types and boasting a zero-knowledge architecture with admininstrative access control to protect enterprises from file and data leaks. 3GB is available free. Nordlocker can sync files from endpoints running Windows, macOS, Android,…

Return to navigation

Product Details

What is Check Point Endpoint Media Encryption and Port Protection (Pointsec)?

Check Point Endpoint Media Encryption and Port Protection (Pointsec) Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(7)

Reviews

(1-2 of 2)
Companies can't remove reviews or game the system. Here's why
Raj Kumar Jha | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Check Point Endpoint Media Encryption and Port Protection is deployed and being used in my organization for a department. The best part is it is a cloud based solution and being centrally managed. The policy management for Check Point Endpoint Media Encryption and Port Protection more friendly. It strenthen the Endpoint Security and meet security compliances.
  • It is a centrally enforceable encryption of removable media devices such as flash drives, external drives and CDs/DVDs, for maximum data protection.
  • Port control enables management of all endpoint ports and centralized logging of port activity for auditing and compliance.
  • Mandatory Access Control for removal media devices can be provisioned.
  • Types of devices to control needs to be added like McAfee and GFI Endpoint Security.
  • Device whitelisting needs more granular level like by Vendor ID, Serial Number, Device ID etc.
  • Device Control and Media Protection on MacOS to be added.
Check Point Endpoint Media Encryption and Port Protection (Pointsec) is well suited for Microsoft Windows environment. While, for MacOS it is less appropriate.
  • Removal Media Protection with Encryption
  • Mobile Phones
  • Bluetooth
  • Other Devices control
  • It protects your data to being leaked from Endpoint.
  • It protects the Removal Storage Media unauthorize use on other endpoint
  • The policy management is user freindly and roll out on the endpoint is just a signle click away to protect your sensative data.
Pointsec Policy management is more user friendly and it is excellent solution for Windows machines.
Check Point Harmony Endpoint Security (formerly Sandblast Agent), Check Point CloudGuard Posture Management (formerly Dome9)
Bonn Chavez | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
You would think "no system is 100% secure" when a corporate laptop goes missing and that is a big problem. Pointsec's full disk encryption solution ensures your information isn't exposed.
  • The product works with Windows, Linux, and OS X.
  • The management of Pointsec has really become very simple and centralized for all IT to handle with ease.
  • Preboot encryption keys in the form of a password, by inserting a USB drive containing the key and/or using a one-time password generating device such as an RSA token.
Encryption software applies to all industries, the way you have to see the big picture is asking yourself, "How important is our data?".
  • Decreasing vulnerability to attack is the key, it's the game to play and Pointsec plays it very well.
  • Key management systems and the various recovery options are very well thought out.
  • Full disk encryption vs. file or folder encryption system. With FDE data is encrypted automatically when it's stored on the hard disk making this the best solution.
Symantec Encryption, a few management points led me to evaluate and not go with it.
Return to navigation