Check Point Endpoint Remote Access VPN Software Blade provides users with secure, seamless access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.

Features

VPN Auto-Connect

VPN auto-connect re-establishes lost connections by automatically switching connection modes. It eliminates need for users to re-authenticate when roaming between different network types (LAN, WiFi, GPRS, etc.), using intermittent networks or resuming work from sleep mode.

IPsec VPN

Check Point Endpoint Remote Access Software Blades support full IPsec VPN connectivity for strong authentication, data integrity and confidentiality. NAT-T standard support enables traversing between static and dynamic Network Address Translation (NAT) devices.

Multi-Factor Authentication Support

Endpoint Remote Access Software Blade offers comprehensive authentication, including: username and passwords, SecureID, challenge/response and CAPI software and hardware tokens.

Compliance Scanning

With compliance scanning, endpoints are automatically scanned for malware and suspicious activity to ensure compliance with corporate security policies. Failing endpoints can be directed to remediation.
Secure Hotspot Registration
With secure hotspot registration, administrators can selectively grant access to hotspot registration sites. Hotspot registration pages are loaded automatically for the user.

Your Vision, Our Expertise

Elevating Your Software Product Engineering Journey with Vast Edge

Central Management

Endpoint Remote Access Software Blade is centrally managed by the Endpoint Policy Management Software Blade enabling central policy administration, enforcement and logging from a single, user-friendly console.

Integrated into Check Point Software Blade Architecture

Endpoint Remote Access Software Blade is fully integrated into the Software Blade architecture, saving time and reducing costs by allowing customers to quickly expand security protections to meet changing requirements.

Benefits

Secure access to corporate resources while traveling or working remotely

  • 1
    Full IPsec VPN connectivity for strong authentication and data integrity.
  • 2
    Endpoint compliance scanning protects from malware and intrusions.

Simple user experience

  • 1
    Seamless roaming between networks and automatic session configuration.
  • 2
    Re-establishes lost connections by automatically switching connection modes.

Integrated into Check Point Software Blade Architecture

  • 1
    Activate endpoint remote access protection on any Check Point gateway
  • 2
    Centrally-managed endpoint solution.
  • 3
    Supported gateways include: UTM-1, Power-1, IP Appliances, and IAS Appliances.
Copyrights © 26 December 2024 All Rights Reserved by Vast Edge Inc.