Network Security Architect at a financial services firm with 10,001+ employees
Real User
2020-02-12T17:16:44Z
Feb 12, 2020
The installation, setup, and configuration should be easier to complete. In the next release of this solution, I would like to see application identity support.
Find out what your peers are saying about Check Point Software Technologies, Microsoft, Broadcom and others in Endpoint Encryption. Updated: March 2025.
Endpoint Encryption ensures data on devices is secure, protecting sensitive information from unauthorized access. It encrypts files on laptops, desktops, and other devices, making data accessible only to authorized users. As data breaches become more sophisticated, Endpoint Encryption provides a robust method for safeguarding information. This technology encrypts data at rest, ensuring only individuals with decryption keys can access it. This layer of security is vital for organizations...
The installation, setup, and configuration should be easier to complete. In the next release of this solution, I would like to see application identity support.