openPR Logo
Press release

Michael Page International Deploys Check Point Data Security Products To Protect Confidential Information

09-25-2008 02:25 PM CET | IT, New Media & Software

Press release from: Check Point

Leading recruitment consultancy uses Check Point media encryption with port protection, and full-disk encryption products to nullify risk of data loss and theft from endpoints

BASINGSTOKE, UK – 23 September, 2008 – Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, today announced that Michael Page International is using Check Point’s Full Disk Encryption and Media Encryption products to secure confidential data on its laptops, PCs and removable devices against theft, data leakage and inadvertant loss.

As a world leading professional recruitment consultancy, Michael Page International wanted to secure confidential data on both office-based PCs and the laptops used by senior management and IT staff.

“Confidentiality is absolutely essential in our business – our clients and applicants depend on it. As part of an ongoing drive to improve security, we identified an opportunity to enhance our data security provision still further through an ‘endpoint security’ solution. With around 300 PCs in 65 offices across the UK, we needed a solution that was easy to deploy and control across a distributed network,” said Graham Taylor, Head of IT security for Michael Page.

Following an evaluation of possible solutions, Check Point Media Encryption was chosen for its full control over USB ports, devices and media drives, its centralised management, and ability to provide complete audits of device usage. Graham Taylor reports that both roll-out and ongoing management have been seamless and easy.

The company also wanted to secure the fleet of around 50 laptops used by directors, senior management and IT personnel against the risks of loss or theft. Graham Taylor’s team chose Check Point Full Disk Encryption.

“Full disk encryption means the user doesn’t have to make any decisions about what data needs protecting – unlike file-based encryption solutions. With the Check Point product, the security is always on and data encrypted on the fly, keeping confidential records safe and removing the responsibility from users. What’s more, users report little or no difference in computer performance,” added Taylor.

“Both Check Point products have been ‘fit and forget’ after initial set-up. We now have complete control over these endpoints, and any changes we need to make, such as giving a member of staff permission to use a USB device, are quickly done.”

Following the successful deployment in the UK, Michael Page is evaluating rolling out the Check Point products to its Asia-Pacific operations. Replacing the security products currently in use, with the Check Point solutions will help it achieve a standardised approach to data security across all regions.

Juliette Sultan, head of Global Marketing for Check Point said: “As data loss incidents increase, Check Point encryption products give businesses complete, automated, industry-proven solutions that deploy quickly and easily to protect all sensitive data.”

Check Point’s Media Encryption prevents unauthorised copying of sensitive data by combining port and device management, content filtering and centralised auditing with robust media encryption. This plugs potential leakage points and logs data movement to and from any plug and play devices, providing comprehensive control of security policies.

Check Point Full Disk Encryption provides automatic real-time encryption of a PC’s entire hard drive, that can be configured to meet any organisation's needs. Pre-boot authentication increases security by requiring username and password before the operating system loads.

Check Point data security products support more end-user platforms than any other solutions in the industry, from Windows, Linux and Mac OS based laptops to Symbian, Windows Mobile, Palm and PocketPC based smartphones and PDAs. Today, regardless of operating system, customers receive encryption technology from Check Point that is recognised as a data security leader in the latest Gartner Mobile Data Protection Magic Quadrant.

www.checkpoint.com

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is the leader in securing the Internet. Check Point offers total security solutions featuring a unified gateway, single endpoint agent and single management architecture, customized to fit customers' dynamic business needs. This combination is unique and is a result of our leadership and innovation in the enterprise firewall, personal firewall/endpoint, data security and VPN markets.

Check Point's pure focus is on information security. Through its NGX platform, Check Point delivers a unified security architecture to protect business communications and resources, including corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market-leading endpoint and data security solutions with Check Point Endpoint Security products, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. Check Point's award-winning ZoneAlarm solutions protect millions of consumer PCs from hackers, spyware and identity theft. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organizations of all sizes.

Press contact
Craig Coward
Context Public Relations
01625 511 966
www.contextpr.co.uk

This release was published on openPR.

Permanent link to this press release:

Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.

You can edit or delete your press release Michael Page International Deploys Check Point Data Security Products To Protect Confidential Information here

News-ID: 54733 • Views:

More Releases from Check Point

CHECK POINT PROVIDES IMMEDIATE PROTECTION AGAINST
CHECK POINT PROVIDES IMMEDIATE PROTECTION AGAINST "FLAME" WORM
Check Point Software Technology- the worldwide leader in securing the Internet, provides innovative security solutions that meet real-time customer needs and help reduce security complexity. The IPS Software Blade stands as a testimony to its speed of resolution and protection from the unforeseen attack of ‘FLAME’. It provides immediate protection by detecting the presence of Flame malware and prevents its propagation. The Flame malware, also known as SkyWiper and Flamer, is
CHECK POINT ENCRYPTION SOLUTIONS SECURE BUSINESS LINK NORTHWEST AGAINST DATA LOS …
Basingstoke, U.K., June 16 2010 – Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced that Business Link Northwest, the UK Government-funded business support and advice service agency, has selected the Check Point Full Disk Encryption and Check Point Media Encryption solutions to secure confidential data on all of its desktop and laptop computers against loss and theft. Business Link Northwest needed
CHECK POINT SHIPS FIRST SINGLE AGENT FOR ENDPOINT SECURITY
Check Point Endpoint Security combines VPN, anti-malware, data security and firewall on a single agent and client interface August 26, 2008 – Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced it has began shipping a new version of Check Point Endpoint Security™, the first single agent for endpoint security to combine the highest-rated firewall, network access control (NAC), program control, remote access, antivirus,
Check Point Recognises Leading European Partners for Their Total Security Soluti …
Customers and partners welcome new ranges of advanced, easy-to-manage enterprise platforms for comprehensive security June 10, 2008 – Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, recognized the success of three of the company’s leading European channel partners at its annual customer and partner conference, Check Point Experience 2008, with its Partner of the Year awards. Over 1000 European channel partners and customers attended the two-day

All 5 Releases


More Releases for Encryption

Email Encryption Market
The global Email Encryption industry research report provides an in-depth and methodical assessment of regional and global markets, as well as the most current service and product innovations and the global market's predicted size. The Email Encryption exploration does a complete request analysis to find the major suppliers by integrating all applicable products and services in order to understand the places of the top industry players in the Email Encryption
Mobile Encryption Market: by Type (Disk Encryption, File/Folder Encryption, Comm …
Mobile encryption is the process of encoding all user data on an android device using symmetric encryption keys. Once the device is encrypted, all user created data would automatically encrypt before committing it to the disk and automatically decrypt data before returning it to the calling process. Encryption process doesn’t allows an unauthorized party to read data. If any organization deals with a lot of mobile devices that carry critical data,
Global Encryption Software Market
Global Encryption Software Market – Global Industry Analysis and Forecast (2018-2026) – By Component, Application, Deployment Type, Organization Size, Vertical, and Geography Market Scenario Global Encryption Software Market was valued US$ 3.45 Bn in 2017 and is expected to reach US$ 9.23 Bn by 2026, at a CAGR of 14% during a forecast period. The global encryption software market based on component, application, deployment type, organization size, vertical, and region. In terms of
Database Encryption Market Report 2018: Segmentation by Types (Transparent Encry …
Global Database Encryption market research report provides company profile for IBM, Symantec, McAfee, Oracle and Others. This market study includes data about consumer perspective, comprehensive analysis, statistics, market share, company performances (Stocks), historical analysis 2012 to 2017, market forecast 2018 to 2025 in terms of volume, revenue, YOY growth rate, and CAGR for the year 2018 to 2025, etc. The report also provides detailed segmentation on the basis of product
Global Mobile Encryption Market | Leading Players, Size, Share, Growth, Trends, …
If your Company involved in the Global Mobile Encryption industry or intend to be, then this study will provide you comprehensive outlook Future Industry by Analysts and know what to expect from this along with analysis By Industry Expert’s. It’s vital you keep your market knowledge up to date segmented by In-Depth Insight of Sales Analysis, Growth Forecast and Upcoming Trends Opportunities by Applications Manufacturing, Product Types By major Manufacturers.
Mobile Encryption Market 2022 by Key Product - Disk Encryption, File/Folder Encr …
Encryption software is software that uses cryptography to make digital information difficult to read. Practically speaking, people use cryptography today to protect the digital information on their Mobile device as well as the digital information that is sent to other device over the Internet. As software that implements secure cryptography is complex to develop and difficult to get right, most computer users make use of the encryption software that already