"Check Point Endpoint Security allowed us to integrate all environments and it provides, frankly what I think, is the best level of total end-to-end security of any solution that’s out there."
"Check Point CloudGuard™ IaaS automates protection across our dynamic cloud environments while Check Point R80 unifies visibility into threats across the network, enabling us to efficiently address security incidents with less effort.”
“Check Point Maestro allows us to hyperscale. As we start to scale out services and data volumes, I don’t have to keep adding new configurations.”
"We have peace of mind now with Check Point Full Disk Encryption, and we know that the information on our laptops is safe and protected."
"We chose Check Point for integration and ease of management through SmartCenter Pro. I don’t need more than one piece of software to manage network security."
"The Check Point User Center is a very effective tool for managing licenses. Check Point is really a leader in best practices for managing software."
“The market for managed services is flowering in Sweden now. Check Point is a major vendor for us as we establish ourselves as the managed-services leader."
"Because of our prior knowledge of Check Point products, it was an easy decision to make [selecting Check Point security]. We looked at VPN-1 VSX and saw the benefits of consolidating on its platform."
"Check Point has everything we need to extend our network, equip branch offices, and keep up with business demand."
"The use of Pointsec Protector has significantly reduced the burden on the IT department at Shepherd and Wedderburn."
"There simply isn’t another product on the market that offers the same level of security and manageability as Pointsec Protector."
"Check Point Endpoint Security provides a solution that is secure for us and, at the same time, transparent to the users. Check Point has been great. We couldn’t dream of moving to any other solutions provider."
"We focused on enhancing levels of patient privacy with an approach that was more manageable and, as a result, would help lower the overall costs. Then we would have what I believe to be an optimal security solution."
"One of the requirements that we have built into our 2005 security policy manual is that all vendors accessing our network will also need to have some type of Integrity client."
"We were impressed by the technology. It works immediately after the devices are switched on, i.e. even before they actually boot up."