“The technology is first and foremost, but it’s really about the people and the relationship. That’s where the rubber meets the road for our team.”
“With Check Point, what you can achieve and how you can manage the security gateways is much better when compared to other technologies.”
"Because of our prior knowledge of Check Point products, it was an easy decision to make [selecting Check Point security]. We looked at VPN-1 VSX and saw the benefits of consolidating on its platform."
“SecureConnect is sized for noncritical or semicritical situations in SMEs or for the needs of telecommuters and remote offices. It provides total security and availability for their data and communications, whether within the company, between sites, or with their own customers and partners.”
"We have peace of mind now with Check Point Full Disk Encryption, and we know that the information on our laptops is safe and protected."
"We chose Check Point for integration and ease of management through SmartCenter Pro. I don’t need more than one piece of software to manage network security."
"The Check Point User Center is a very effective tool for managing licenses. Check Point is really a leader in best practices for managing software."
“The market for managed services is flowering in Sweden now. Check Point is a major vendor for us as we establish ourselves as the managed-services leader."
"Check Point has everything we need to extend our network, equip branch offices, and keep up with business demand."
"The use of Pointsec Protector has significantly reduced the burden on the IT department at Shepherd and Wedderburn."
"There simply isn’t another product on the market that offers the same level of security and manageability as Pointsec Protector."
"Check Point Endpoint Security provides a solution that is secure for us and, at the same time, transparent to the users. Check Point has been great. We couldn’t dream of moving to any other solutions provider."
"We focused on enhancing levels of patient privacy with an approach that was more manageable and, as a result, would help lower the overall costs. Then we would have what I believe to be an optimal security solution."
"One of the requirements that we have built into our 2005 security policy manual is that all vendors accessing our network will also need to have some type of Integrity client."
"We were impressed by the technology. It works immediately after the devices are switched on, i.e. even before they actually boot up."