資安常用軟體‎ > ‎加密解密‎ > ‎

Check Point Full Disk Encryption

張貼者:2010年10月15日 上午1:07未知的使用者   [ eddie liu 已於 2012年8月7日 下午11:16 更新 ]
Check Point Full Disk Encryption自動加密的筆記本電腦和台式機硬盤保護企業的關鍵信息,並防止數據破壞。 檢查點整盤加密提供了最高級別的數據安全與多因素開機前驗證和最強大的加密算法。整個硬盤驅動器的內容 - 包括作業系統,甚至臨時文件 - 自動加密一個完全透明的最終用戶體驗。 更何況,集中部署,管理和記錄簡化政策管理,簡化遵從性,降低了TCO。 現在支持Windows 7。






----------------------------------------------

開發商:Check Point Software Technologies Ltd.
原廠網址:http://www.checkpoint.com/products/datasecurity/pc/
更新日期:2011/05/09
採購正式版、大量授權報價、技術支援、軟體諮詢、委託採購、詢問報價請來電 02-29299388 分機16 , 
來信service@orderble.com,或點我
------------------------------------------------------------------------------







特點

全磁盤加密
自動加密硬盤上的所有內容,包括操作系統,系統文件和臨時文件和刪除。 所有的邏輯分區的引導保護和加密,逐個部門。 因此,試圖複製單個文件,或引入流氓方案蠻力攻擊,都是由不可能的 - 即使是身體上的硬盤驅動器傳輸到另一台計算機。而且,透明的加密和單一用戶界面提供了簡單和無縫的用戶體驗。 檢查站的全磁盤加密已被授予最高安全認證 - 包括通用標準 EAL4和FIPS - 140 - 2和位 - 從而使遵守全球數據隱私規則和條例。

預啟動認證
防止未經授權的用戶訪問或處理信息存儲在受保護的計算機。 用戶必須提供一切所需的憑據 - 用戶名,密碼,證書,令牌等 - 之前,操作系統啟動過程甚至會開始。 對於強大的安全,檢查站的全磁盤加密支持多因素身份驗證選項,如基於證書的智能卡和動態令牌。


單一的用戶界面
無論是部署一整套Check Point端點安全保護或只檢查點整盤加密,用戶將始終有一個單一的接口通過一條單一的托盤圖標。 該接口允許用戶查看安全狀態和日誌文件,以及進行基本的配置更改為允許。 支持多種語言的全球部署。

中央管理和日誌記錄
檢查站的全磁盤加密是從一個中央管理控制台使中央政策的執行和記錄,便於遵守和簡單的管理。 中央配置,並支持多種部署選項簡化了初始安裝的最低用戶的影響。

安全的遠程幫助
遠程密碼更改和一次性登錄遠程幫助選項可供用戶誰可能忘記了自己的密碼或無法訪問令牌。 此外,基於 Web的遠程協助方案是支持的。














Features

Full Disk Encryption
Automatic encryption of all hard drive contents, including the operating system, system files and temporary and erased files. All logical partitions are boot-protected and encrypted, sector-by-sector. As a result, attempts to copy individual files, or introduce rogue programs for brute force attacks, are made impossible - even if the hard drive is physically transferred to another computer. And, transparent encryption and a single user interface provide a simple and seamless user experience. Check Point Full Disk Encryption has been awarded the highest security certifications - including Common Criteria EAL4, FIPS-140-2 and BITS – thereby enabling compliance with global data privacy rules and regulations.

Pre-boot Authentication
Prevents unauthorized users from accessing or manipulating information stored on a protected computer. Users must provide all required credentials – username, password, certificate, token, etc. – before the operating system boot process will even begin. For the strongest security, Check Point Full Disk Encryption supports multi-factor authentication options such as certificate-based SmartCards and dynamic tokens.


Single User Interface
Whether deploying the full suite of Check Point Endpoint Security protections or only Check Point Full Disk Encryption, users will always have a single interface accessed via a single tray icon. The interface enables a user to view security status and log files, as well as make basic configuration changes as allowed. Supports multiple languages for global deployments.

Central Management and Logging
Check Point Full Disk Encryption is centrally managed from a single console enabling central policy enforcement and logging for easy compliance and simple administration. Central configuration and support for multiple deployment options streamlines initial installation for the lowest user impact.

Secure Remote Help
Remote Password Change and One-Time Logon remote help options are available for users who may have forgotten their passwords or lost access tokens. In addition, web-based remote help scenarios are supported.