Call a Specialist Today! 877-352-0547 | Free Shipping! Free Shipping!


Check Point Capsule Cloud
A cloud based mobile security container to enforce your in-network security policy on laptops used outside of the corporate network


Check Point DDoS Protector Appliance

Your employees expect to do their work whenever and wherever it’s convenient, but their use of laptops and online behaviors can put your corporate network at risk. Check Point Capsule Cloud solves this security dilemma by using a cloud based mobile security container to enforce your in-network security policy on laptops used outside of the corporate network.


Sorry, this product is no longer available, please contact us for a replacement.


Overview:

Historically, organizations enforced corporate security policies to protect all devices and data within the traditional corporate network from being exposed to threats. Over the last several years, the traditional network has disappeared. Organizations have evolved, and are confronting a situation where business data is accessed from everywhere, and travels outside the network. The increased need for business continuity and the associated risks posed by laptops create a huge challenge for security professionals.

As more and more workers access corporate and business data remotely, new gaps are opened within the organization’s infrastructure. Laptops can expose users and organizations to new sources of attacks. Without knowing it, you may have accessed a malicious site, or downloaded a virus unintentionally.

Security “blind-spots” like these expand as employees use laptops to consume business data from anywhere and everywhere they go. Organizations need to provide the same level of protection for laptops and remote offices as they provide for the devices within the confines of the corporate network perimeter.

Solution

Check Point Capsule enables organizations to provide security continuity across their business operations, providing always-on, always up-to-date protection for users outside the organization’s security perimeter.

With Check Point Capsule, organizations are able to leverage protections from all Check Point Software Blades as a cloud-based service, protecting the network and their users from threats everywhere they go; preventing suspicious file downloads, blocking malicious websites, and stopping bots before they have a chance to cause damage.

Check Point Capsule offers real-time protections by directing all traffic from laptops through a secure tunnel to the cloud where corporate policies are enforced. A single policy can be applied for both on premise and off premise laptops that is centrally managed through SmartDashboard or remotely through an intuitive web user interface for pure cloud deployments.

With 24/7/365 coverage by Check Point experts, and datacenters located around the globe, organizations can truly provide always on and always up-to-date protection for their entire network and users. Whether on premise or outside the enterprise security perimeter, organizations can ensure their assets, data, and devices are protected.

Key Features

  • Includes IPS, Application Control, URL Filtering, Antivirus, Anti-Bot, and Threat Emulation
  • Data centers located across the globe
  • Supported on Windows & Mac platforms
  • Single Sign-On (SSO)
  • Logs can be pushed and stored locally or viewed online
  • Active Directory integration for identity awareness

Key Benefits

  • Extend corporate security policy to Windows and Mac laptops
  • Prevent download of suspicious files, access to malicious websites, and bot damages on laptops.
  • Protect users outside the enterprise security perimeter
  • Extend Check Point security to remote offices without security appliances
  • Real-time protection against web threats
  • Apply a single security policy for both on and off premise laptops
  • Deliver the protection of Check Point Software Blades via a cloud-based service
  • Always up to date and fully tuned software

Pricing Notes: