Information Security Matters!
September 02, 2016

Information Security Matters!

David Hundley | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source

Overall Satisfaction with Check Point Endpoint Security

Check Point Endpoint Security is used across our whole company to prevent risk of compromised customer information by ensuring that only authorized users are able to access our secure networks and computer systems.
  • Requires authorized passwords and logins from end users.
  • Utilizes voiceprint recognition to validate users.
  • Allows for a one time login from end users working remotely away from their desks.
  • The prompts for one time logins are rather lengthy and it takes around five minutes to go through all of the authentication required. I believe this could be improved upon.
  • It has enabled us to maintain privacy which has enhanced our highly rated brand standard. While basically it is a team member specific, behind the scenes program that protects systems from being used by unauthorized individuals, it contributes to the overall integrity of the organization which results in increased market share and return on investment for shareholders.
It is one of the most highly rated systems in use and has superior security features that make it desirable for usage.
Check Point Endpoint Security is well suited for businesses where confidentiality must be maintained in order to mitigate risk and compromise of customer information.