Check Point Always Delivers
Pros
- Protection from phishing.
- protection from malware.
- protection from ransomware.
- General protection against zero-day attack vectors.
Cons
- When inspecting traffic there can be a some performance degradation.
- We have had a few instances of protections interfering with legitimate traffic. Worth the trade-off though.
Most Important Features
- Malware protection
- Ransomware protection
- Phishing protection
Return on Investment
- Improved security posture overall with reduced risk.
- Relatively low cost and easy implementation easily recouped by allowing us to shift resources to other priorities and away from manual monitoring tasks.
- Peace of mind for our users knowing they have a safety net in place.
Other Software Used
Check Point Harmony Endpoint Security (formerly Sandblast Agent), Totango
