387 Check Point Software Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "Pointsec Protector was installed to support our strategic security aims."

  • "We’re able to review and monitor our entire threat landscape on a daily basis, creating new rules and removing old rules. We’re always looking for greater protection."

  • “Everyone wins. Our internal users rarely see spam and can work securely from anywhere. Our engineers spend far less time solving endpoint problems. And our affiliates know that their services are always available, safe, and encrypted.”

  • "We have peace of mind now with Check Point Full Disk Encryption, and we know that the information on our laptops is safe and protected."

  • "We chose Check Point for integration and ease of management through SmartCenter Pro. I don’t need more than one piece of software to manage network security."

  • "The Check Point User Center is a very effective tool for managing licenses. Check Point is really a leader in best practices for managing software."

  • “The market for managed services is flowering in Sweden now. Check Point is a major vendor for us as we establish ourselves as the managed-services leader."

  • "Because of our prior knowledge of Check Point products, it was an easy decision to make [selecting Check Point security]. We looked at VPN-1 VSX and saw the benefits of consolidating on its platform."

  • "Check Point has everything we need to extend our network, equip branch offices, and keep up with business demand."

  • "The use of Pointsec Protector has significantly reduced the burden on the IT department at Shepherd and Wedderburn."

  • "There simply isn’t another product on the market that offers the same level of security and manageability as Pointsec Protector."

  • "Check Point Endpoint Security provides a solution that is secure for us and, at the same time, transparent to the users. Check Point has been great. We couldn’t dream of moving to any other solutions provider."

  • "We focused on enhancing levels of patient privacy with an approach that was more manageable and, as a result, would help lower the overall costs. Then we would have what I believe to be an optimal security solution."

  • "One of the requirements that we have built into our 2005 security policy manual is that all vendors accessing our network will also need to have some type of Integrity client."

  • "We were impressed by the technology. It works immediately after the devices are switched on, i.e. even before they actually boot up."