10 things we like and don't like about Check Point's R80 endpoint security product

Check Point's Unified Endpoint Security Management tool offers powerful single client for comprehensive endpoint security

A major advantage of the R80 is its extensive reporting module, which can be customized and then exported to a file.

Here you see both the power and pain of the full disk encryption setup. There are five basic menu groups on the left hand pane, and numerous parameters to adjust to set up the policy.

The R80 can automatically sync with your Active Directory users and groups assignments, and report on the status of each protective element that is relevant to that specific user.

Each group can have a very extensive collection of policies covering a variety of circumstances, which is one of R80's major benefits. Policies can pertain to connected or disconnected states as well.

This is the main menu for the software deployment section, where you can configure particular policies and see at a glance the status of your endpoints.

The R80 does a good job issuing a warning message on the client side, but doesn't take the next step and offer up a way to resolve it easily.

The client side status summary, showing you what protective feature "blades" are active, and whether you are operating connected to the CheckPoint server or not.

The firewall rules section is similar and familiar, showing rules with typical ports and protocols layout.

The client-side log viewer is searchable by different event types, but is still something that no actual end user should ever have to see.

This is the main dashboard for R80, showing you at a glance what is in compliance, any alerts and infections, and a summary of what policies are in use for across your network.

CheckPoint stories:

Check Point's new security blades cut both ways

Check Point expands security blade platform, intros best-practices program