Jump to content
Compatible Support Forums
Sign in to follow this  
news

Check Point adds Full Disk Encryption for the Mac Platform

Recommended Posts

Check Point adds Full Disk Encryption for the Mac Platform - Published on 05/28/08

 

Check Point Software Technologies Ltd. today announced the release of Check Point Full Disk Encryption for Mac OS X, the industry's first full-disk encryption solution with pre-boot authentication to support the Mac OS. Check Point Full Disk Encryption now supports all major laptop and desktop operating systems, including Mac OS X version 10.4.5 Tiger through Mac OS X version 10.5 Leopard.

 

Redwood City, California - Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced the release of Check Point Full Disk Encryption for Mac OS X, the industry's first full-disk encryption solution with pre-boot authentication to support the Mac OS. Check Point Full Disk Encryption now supports all major laptop and desktop operating systems, including Mac OS X version 10.4.5 "Tiger" through Mac OS X version 10.5 "Leopard."

 

Check Point encryption products support more end-user platforms than any other solutions in the industry, from Windows, Linux and Mac OS based laptops to Symbian, Windows Mobile, Palm and PocketPC based smartphones and PDAs. Today, regardless of the operating systems, customers receive encryption technology from Check Point that is recognized as a data security leader in the latest Gartner Mobile Data Protection Magic Quadrant.

 

"Enterprises and organizations have to secure 100 percent of their laptops and desktops to be fully protected," said Bob Egner vice president of product management at Check Point. "Check Point recognizes that Mac OS has an important and growing place in the enterprise and is proud to offer enterprise customers endpoint solutions that cover all platforms and work in mixed environments."

 

"We're delighted that Mac users in industries like government and healthcare who value high-quality encryption technologies have a strong solution that supports Leopard, the world's most advanced operating system," said Ron Okamoto, Apple's vice president of Worldwide Developer Relations. "Leopard is Apple's most secure OS release ever, and Check Point's encryption solution nicely complements features already present in Mac OS X."

 

Check Point Full Disk Encryption is quick and easy to deploy, scales to any size organization and is proven in every type of industry and government agency around the world. Customers benefit from easy to use features and centralized management across diverse operating systems, significantly simplifying the implementation and use of full-disk encryption in mixed environments.

 

"Rarely will large-scale businesses and organizations have just one endpoint operating system," said Steve Snider, president at Cadre Computer Resources Co. "Security solutions, like Check Point Full Disk Encryption, that support multiple platforms not only are easier to deploy and manage, but improve the level of end point security throughout the organization."

 

Features and benefits of Check Point Full Disk Encryption include:

* Industry-leading full-disk encryption protects lost or stolen data

* Pre-boot authentication requires username and password before the operating system loads, increasing security

* Automatic and transparent operation has minimal effect on end users' productivity

* Centralized management simplifies setup and administration, providing lowest total cost of ownership

* Multi-certified cryptography engine addresses adherence to state and federal privacy laws

* Scalable deployment meets the needs of any size enterprise, business or government agency

 

"Whether a mixed environment consisting of Windows, Linux and Mac based computers or a network comprised of a single OS, Check Point Full Disk Encryption provides total security to customers with the industry's leading encryption technology," concluded Egner. More information on Check Point data security solutions can be found at their website.

 

Pricing and Availability:

Check Point Full Disk Encryption for the Mac is available immediately and can be purchased through the Check Point worldwide network of value-added resellers. For Check Point Full Disk Encryption pricing, visit https://pricelist.checkpoint.com. To find a Check Point partner, visit their website.

 

Check Point's pure focus is on information security. Through its NGX platform, Check Point delivers a unified security architecture to protect business communications and resources, including corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market-leading endpoint and data security solutions with Check Point Endpoint Security products, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices.

 

Check Point's award-winning ZoneAlarm solutions protect millions of consumer PCs from hackers, spyware and identity theft. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organizations of all sizes.

 

Check Point: http://www.checkpoint.com

Full Disk Encryption: http://www.checkpoint.com/products/datasecurity/index.html

Purchase Link: http://partners.us.checkpoint.com/partnerlocator/

Check Point Partners: http://partners.us.checkpoint.com/partnerlocator/

 

 

Check Point Software Technologies Ltd. is the leader in securing the Internet. Check Point offers total security solutions featuring a unified gateway, single endpoint agent and single management architecture, customized to fit customers' dynamic business needs. This combination is unique and is a result of our leadership and innovation in the enterprise firewall, personal firewall/endpoint, data security and VPN markets. ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

 

###

 

Greg Kunkel

PR Manager

650-628-2326

 

gkunkel ( -at -) us.checkpoint.com

 

*******

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×