Introduction to Endpoint Security
R81 Harmony Endpoint Server Administration Guide|19
Introduction to Endpoint Security
Check Point endpoint security includes data security, network security, advanced threat
prevention, forensics, and remote access VPN solutions. It offers simple and flexible security
administration: The entire endpoint security suite can be managed centrally using a single
management console.
Managing the Security of Users, Not Just
Machines
One user may have multiple computers and some computers may have multiple users.
Therefore, the Security Policies for some Endpoint Security components are enforced for each
user, and some are enforced on computers.
Organization-Centric model
You can import users and computers to the Endpoint Security Management Server, which
uses your organization's existing hierarchy to provide a graphical tree of endpoints computers.
You then define software deployment and security policies centrally for all nodes and entities,
making the assignments as global or as granular as you need.
Policy-centric Model
You can predefine security policies before setting up the organization. The Endpoint Security
Management Server interface provides a granular view of all the Endpoint Security policies,
grouped by the components they configure.
You create and assign policies to the root node of the organizational tree as a property of each
Endpoint Security component. Policies can be deployed one by one or all together. Because
different groups, networks, OUs, computers, and users have different security needs, you can
configure different components accordingly.
Endpoint Security Client
You can define policies in SmartEndpoint for the Endpoint Security client components. The
Endpoint Security client is available on Windows and Mac.
These are the Endpoint Security components that are available on Windows: