"Check Point secures our ‘last mile’ of file delivery. We gained end-to-end infrastructure protection with the ability to see what SandBlast blocks. It’s highly effective."
"Check Point Endpoint Security allowed us to integrate all environments and it provides, frankly what I think, is the best level of total end-to-end security of any solution that’s out there."
“Check Point offers centralized management to the administrators, giving them the ability to identify blocked traffic and investigate suspicious events."
"We have peace of mind now with Check Point Full Disk Encryption, and we know that the information on our laptops is safe and protected."
"We chose Check Point for integration and ease of management through SmartCenter Pro. I don’t need more than one piece of software to manage network security."
"The Check Point User Center is a very effective tool for managing licenses. Check Point is really a leader in best practices for managing software."
“The market for managed services is flowering in Sweden now. Check Point is a major vendor for us as we establish ourselves as the managed-services leader."
"Because of our prior knowledge of Check Point products, it was an easy decision to make [selecting Check Point security]. We looked at VPN-1 VSX and saw the benefits of consolidating on its platform."
"Check Point has everything we need to extend our network, equip branch offices, and keep up with business demand."
"The use of Pointsec Protector has significantly reduced the burden on the IT department at Shepherd and Wedderburn."
"There simply isn’t another product on the market that offers the same level of security and manageability as Pointsec Protector."
"Check Point Endpoint Security provides a solution that is secure for us and, at the same time, transparent to the users. Check Point has been great. We couldn’t dream of moving to any other solutions provider."
"We focused on enhancing levels of patient privacy with an approach that was more manageable and, as a result, would help lower the overall costs. Then we would have what I believe to be an optimal security solution."
"One of the requirements that we have built into our 2005 security policy manual is that all vendors accessing our network will also need to have some type of Integrity client."
"We were impressed by the technology. It works immediately after the devices are switched on, i.e. even before they actually boot up."