Check Point Virtualization Security Solutions: Check Point GO

Check Point GO instantly transforms any PC into a corporate desktop, enabling users to access files and applications from anywhere at any time. This plug-and-play USB solution creates a secure virtual workspace that segregates mobile data from the host PC, maintaining robust security. Users can operate offline from the encrypted USB drive or online via the integrated VPN client of Check Point GO.

Features

Secure Virtual Workspace for Strong Endpoint Security

  • 1
    Isolation and Segregation: Check Point GO technology enforces isolation between the secure workspace and the host PC, ensuring no session traces or data remain on the host.

  • 2
    Standard Windows Environment: Utilizes the familiar Windows interface, facilitating easy navigation and user adoption.

Integrated VPN Connectivity

  • 1
    Secure Access: Connect to corporate networks and secure resources anywhere with the advanced VPN client.

  • 2
    Host PC Compliance: Scans host PCs for acceptable antivirus software before connecting.

Always-on Encryption

  • 1
    Data Protection: Employs AES 256-bit hardware encryption for data at rest and software encryption for data in use.

Portable Applications

  • 1
    Virtualized Programs: Run virtualized Windows applications within the Check Point GO secure workspace.

Your Vision, Our Expertise

Elevating Your Software Product Engineering Journey with Vast Edge

Customization Tool

  • 1
    Pre-configuration: Allows security administrators to pre-configure policies and user profiles, and burn them onto Check Point GO devices.

  • 2
    Personalization: Customize with corporate wallpaper and pre-configured VPN settings.

Remote Device Lock

  • 1
    Security: Configure devices to lock after a specified time or a certain number of VPN authentication failures.

File Transfer and Application Control

  • 1
    Controlled Transfers: Security policies strictly manage file transfers between personal and corporate environments.

  • 2
    Application Restrictions: Only pre-approved applications can run within the secure workspace, blocking malware and unauthorized installations. Print attempts from protected applications can also be blocked.

Strong User Authentication

  • 1
    Multi-factor Authentication: Supports password strength enforcement, certificates, tokens, and virtual keyboards to prevent keylogger attacks.

Central Management

  • 1
    SmartDashboard Integration: Provides central policy administration and updates through Check Point gateways, managing authentication, compliance scanning, VPN settings, software updates, and password recovery.

Benefits

  • 1
    Instant Corporate Desktop: Instant Corporate Desktop: Convert any PC into a personal corporate desktop instantly.

  • 2
    Enhanced Productivity: Stay productive both online and offline with a simple, encrypted USB stick.

  • 3
    Mobility: Access files and applications from anywhere without the need for carrying laptops or physical files.

  • 4
    Secure Mobile Data: The virtual workspace ensures mobile data security with both software and hardware encryption.

  • 5
    Controlled Environment: Segregates virtual workspace from the host PC, controlling applications and data.

  • 6
    Ideal for Various Scenarios:
    Mobile Workers: Perfect for workers on the go, allowing secure access from any PC.
    Contractors: Contractors can securely access corporate files and applications from their own PCs.
    Disaster Recovery: Enables rapid recovery and productivity from remote locations during a disaster.
Copyrights © 30 December 2024 All Rights Reserved by Vast Edge Inc.