2020-02-12T17:16:44Z

What needs improvement with Check Point Pointsec?

Miriam Tover - PeerSpot reviewer
  • 0
  • 2
PeerSpot user
1

1 Answer

it_user1260429 - PeerSpot reviewer
Real User
2020-02-12T17:16:44Z
Feb 12, 2020

The installation, setup, and configuration should be easier to complete. In the next release of this solution, I would like to see application identity support.

Find out what your peers are saying about Check Point Software Technologies, Microsoft, Broadcom and others in Endpoint Encryption. Updated: March 2024.
765,386 professionals have used our research since 2012.
Search for a product comparison
Endpoint Encryption
What is endpoint security? Endpoint security refers to securing entry points or endpoints of user devices to protect them from malicious attacks or cybersecurity threats and other sophisticated malware. An endpoint can be defined as any device that can be connected to a network, which can include laptops, tablets, mobile devices, smart watches, printers, servers, ATM machines, and even medical devices. It is crucial for organizations to use endpoint security in order to secure their...
Download Endpoint Encryption ReportRead more