Endpoint Security Software Blades FAQ



Similar documents
CHECK POINT. Software Blade Architecture

Worry-Free Business Security 6.0. External FAQ

CHECK POINT. Software Blade Architecture. Secure. Flexible. Simple.

Endpoint Protection Small Business Edition 2013?

Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!

Introducing Symantec Endpoint Protection Small Business Edition 2013 Ashutosh Tamhankar

AlienVault. Unified Security Management 5.x Configuring a VPN Environment

Migrating from Legacy to New Business Solutions

Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops

How do I use Citrix Staff Remote Desktop

How To Industrial Networking

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

vpn.airproducts.com Windows XP Client Configuration

Citrix (SSL) Access Gateway End User Documentation

4cast Server Specification and Installation

Contents. VPN Instructions. VPN Instructions... 1

Chapter 7 Managing Users, Authentication, and Certificates

Installing the software

Cayosoft Administrator. Modern Administration. Cayosoft.com. Unify, Simplify and Secure Microsoft Administration. Features at a Glance

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

Guide to the TCO of Encryption. Deployment of Check Point data security can reduce the total cost of ownership by half

Endpoint Security VPN for Mac

Check Point Software Blade Architecture. Achieving the right balance between security protection and investment

AT&T Global Network Client Client Features Guide. Version 9.6

User Manual. User Manual Version

HTTP Server Setup for McAfee Endpoint Encryption (Formerly SafeBoot) Table of Contents

What Is Ad-Aware Update Server?

2012 Best Practice Seminar. Presented by David Rawle

Endpoint Security VPN for Windows 32-bit/64-bit

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

I.T. System Requirements 2015

RAP Installation - Updated

1 System Center 2012 Licensing Changes In Plain English

Course 20688A: Managing and Maintaining Windows 8

Intune Open FAQ. Overview. What is the Microsoft Open Program?


Junos Pulse VPN Client Installation


Altaro Hyper-V Backup - Offsite Backups & Seeding Guide

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service


Protecting Your Roaming Workforce With Cloud-Based Security

The Attacker s Target: The Small Business

Allworx OfficeSafe Operations Guide Release 6.0

Remote Access Clients for Windows

Mobile Access Software Blade

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

MAPPING THE WEBDRIVE REFERENCE GUIDE

COMLINK Cloud Technical Specification Guide CLOUD DESKTOP

HWS Virtual Private Network Configuration and Setup Mac OS X 12/19/2006

Click to begin. Maitre'D Full System Backup & Restore

Using a VPN with Niagara Systems. v0.3 6, July 2013

Encryption as a Cloud Service provides the lowest TCO

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

McAfee Security Solutions End of Life

Adobe Reader 7.0 Frequently Asked Questions for Digital Edition Users

Configuring IPsec VPN between a FortiGate and Microsoft Azure

The Evolution of IPS. Intrusion Prevention (Protection) Systems aren't what they used to be

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Endpoint Security Client

ACCREDITED SOLUTION. EXPLORER Cisco Systems VPN Client

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

NAS 322 Connecting Your NAS to a VPN

Dell Bring Your Own Device

Licenses are not interchangeable between the ISRs and NGX Series ISRs.

How To Deploy Sangoma Sbc Vm At Amazon Cloud Service (Awes) On A Vpc (Virtual Private Cloud) On An Ec2 Instance (Virtual Cloud)

In this section you will find information on the following services:

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.

Global VPN Client Getting Started Guide

Symantec Mobile Management Suite

FAQ. ImageCast 6 Frequently Asked Questions

Guide: VPN Remote Access from Home PC

Sophos Endpoint Security and Control How to deploy through Citrix Receiver 2.0

Schools Remote Access Server

Parallels Desktop. for Mac. A Framework for Adopting Macs into the Windows Centric Business. Enterprise Edition. White Paper.

Using WebVPN (webvpn.childrens.harvard.edu) to access shared and P drives, access , and use Remote Desktop

Kerala Commercial Taxes Department DIGITAL SIGNATURE -FAQ

Accessing the Media General SSL VPN

The BiGuard SSL VPN Appliances

Re-associating.ica file extension on Vista/Windows 7 machines

Using a VPN with CentraLine AX Systems

Replication with TeraStation 3000/4000/5000/7000. Buffalo Technology

extranet.airproducts.com Windows XP Client Configuration

Spector 360 Deployment Guide. Version 7

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide

Charter Business Desktop Security Administrator's Guide

my.airproducts.com Windows Vista Client Configuration

Enterprise Desktop Solutions: VMware View 4.5

Introduction to Mobile Access Gateway Installation

Edgewater Routers User Guide

MyUSBOnly User Guide Menu

Polycom Networking Solutions Guide

Managing Documents in the Citrix XenApp Remote Desktop

Desktop Virtualization: Best Practice Considerations & Recommendations

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

Check Point Software Blade Architecture. Achieving the right balance between security protection and investment

MobileStatus Server Installation and Configuration Guide

SSL User Authentication with the HTTP Security Server

Tier 1 Discounts: Summary of Changes

Transcription:

FrequentlyAsked Questions Endpoint Security Software Blades FAQ June 2010 2009 Check Point Software Technologies Ltd. All rights reserved. 1

Table of Contents 1 Endpoint Security Software Blades Introduction... 3 2 Pricing and Licensing... 3 3 Features & Functionality... 4 4 Functionality Upgrade to Software Blades... 5 5 Support... 5 6 Further Information... 5 2009 Check Point Software Technologies Ltd. All rights reserved. 2

1 Endpoint Security Software Blades Introduction What is Check Point Endpoint Security? Check Point Endpoint Security brings unprecedented flexibility, control and efficiency to the management and deployment of endpoint security. All Endpoint Security Software Blades are deployed through a single endpoint security client, delivering simple, custom-tailored, and high performance security to the endpoint. What are Endpoint Security Software Blades? Check Point Endpoint Security Software Blades are 6 independent, modular, centrally managed building blocks that can be selected to create a custom endpoint security solution. Featuring Firewall, Anti-malware/Program Control, Remote Access, Browser Security, Full Disk Encryption and Media Encryption enables maximum flexibility at minimum cost modular deployment of required functionality, as low as $6 a year per blade. What is an Endpoint Security Container? Endpoint Security Container is the underlying infrastructure that enables Endpoint Blades. There are 4 different container sizes at different price ranges to meet any enterprise needs. 2 Pricing and Licensing How do I purchase Endpoint Security Software Blades and Containers and what licensing options are available? SKUs and pricing are available on the General Price List. There are 6 Endpoint Security Software Blades with 2 licensing options available; annual or perpetual. Endpoint Security Containers are available in 4 price bands to cover all company sizes. The Firewall Software Blade is included with the Endpoint Security Container. The Anti-Malware / Program Control Software Blade is available only with an annual license. What is the difference between an annual and a perpetual Endpoint Software Blade? A perpetual Endpoint Software Blade requires a support contract, while an annual Endpoint Software Blade already includes services and support. In addition, the annual Total Security blade includes the Anti Malware blade as well and must be renewed every year. Is there an advantage with annual Endpoint Software Blades? Yes. Annual software blades reduce the setup costs of a new project, and allow you to initiate larger projects in a faster manner. This model is based on operational expenses, and gives you the ability to enjoy additional software blades for cost-effective prices of just $6 per year per seat. Can I deploy an Endpoint Software Blade without an Endpoint Security Container? No. Deployment of an Endpoint Security Software Blade requires an Endpoint Security Container. Do I need a separate license for each Endpoint Software Blade? Yes. Every additional blade shall have a license issued. Check Point is striving to cover attachment of blades to a container in the near future. Which discount Category should I use when I place an order for Endpoint Software Blades? All Endpoint containers and Software Blades are sold at Category V. Support (for containers / perpetual blades) is sold at Category S.. 2009 Check Point Software Technologies Ltd. All rights reserved. 3

Which Endpoint Security Container price range should I use when purchasing additional Endpoint Security Software Blades? To secure additional endpoints (under the same User Center account), use the price band that reflects the total number of endpoints secured following the new purchase. For example: A customer with 50 Endpoint Security Container licenses wishes to purchase an additional 60 licenses to secure a total of 110 endpoints. Solution: The 60 additional Endpoint Security Container licenses will be purchased under the 101-1000 price band at $30 each. Note: Please mention the CK of the current container at the user center to allow a faster ordering process. Are customers required to fill Endpoint Security Containers? No. In fact, when purchasing only 800 Endpoint Software Blades, a customer may realize a lower total deployment price by purchasing a 1001-2500 seat Endpoint Security Container vs. a 101-1000 Container. The customer pays LESS, and has a great opportunity to secure MORE endpoints, as needed, for low fees. Note: The CES cost will also be calculated for the 1001-2500 seats Container. Where can I find additional pricing information on Endpoint Security Software Blades? Browse to: https://pricelist.checkpoint.com/pricelist/us/plusswblades/generalpl.jsp#endpointsecurityblades Note: To access perpetual pricing information, click on the Ordering Page link in the left column, then on Click for additional pricing options at the bottom. 3 Features & Functionality What Endpoint Security Software Blades are currently available? Firewall / Compliance Check, Full Disk Encryption, Media Encryption, Remote Access, WebCheck and Anti-Malware / Program Control What software versions are required for endpoint security software blades? Endpoint Software Blades licenses can be assigned to endpoint security server R70 and above, and will also support the unified endpoint security management once available. The VPN blade can be assigned to any supported version of Check Point Security Management I need only VPN functionality. Should I purchase the container and VPN blade? Yes. The container and VPN blade (either perpetual or annual) should be acquired for pure VPN solutions, even if not involved other endpoint security products. 2009 Check Point Software Technologies Ltd. All rights reserved. 4

4 Functionality Upgrade to Software Blades Can I upgrade my current endpoint security licenses into endpoint software blades? Yes. Your current endpoint licenses can be upgraded into an endpoint security container and equivalent endpoint security blades How much it cost to upgrade to endpoint security software blades? Upgrading to the equivalent functionality endpoint security software blades is FREE. The value of the new licenses is equivalent to the value of the original ones. What endpoint security products can be upgraded to endpoint security software blades? You can upgrade the following products: Integrity, Integrity Suite, Integrity SecureClient, Pointsec PC, Pointsec Protector and Check Point Endpoint Security. For more details please review the functionality upgrade matrix for endpoint licenses that can be upgraded to endpoint security software blades. How do I upgrade to endpoint security software blades? Upgrade to endpoint software blades can be done either manually, by ordering a FREE endpoint license (according to the functionality upgrade matrix), or automatically, via the user-center. How can I buy additional endpoint security software blades on top of my legacy licenses? Start by upgrading your legacy licenses into endpoint software blades. Then buy the additional required blades, as needed. 5 Support How are support rates calculated? The support rate for the perpetual Endpoint Software Blades and Containers is calculated according to the regular account s support rate. Support for annual Endpoint Software Blades and Containers is included. For example: A customer purchases an Endpoint Security Container for 101 to 1000 endpoints at $30 per seat. The customer s annual support rate is 18%. The annual support rate will be 30 x 0.18 = $5.40 per seat. Does the support fee change when I purchase additional annual endpoint security software blades? No. The support fee is set by the value of the container, not by the number of blades. Adding endpoint security software blades will not increase support fees. When taking the perpetual route, support is not included and will have to be activated and renewed on an annual basis. 6 Further Information Where can I find partner information on Endpoint Security Software Blades? Browse to: http://www.checkpoint.com/partners/resources/endpoint-security/index.html Where can I find public information on Check Point Endpoint Security products? Browse to: http://www.checkpoint.com/products/endpoint_security/index.html 2009 Check Point Software Technologies Ltd. All rights reserved. 5