Full Disk Encryption with pre-boot authentication ensures that only authorized users can access data on your computers.
A user must provide a valid ID and password before the operating system will boot.
The encryption is certified to the highest standards and Alertsec helpdesk provides users with 24/7 assistance to access locked computers.
Media Encryption provides encryption of removable storage media such as USB sticks, external hard drives, CDs and DVDs.
Port Control enables control of the activity on all computer ports. Access to endpoint ports such as USB, FireWire, Bluetooth, WiFi, etc. can be centrally managed.
Endpoints are scanned for compliance with pre-defined security policies and non-compliance is reported back to the administrator.
Endpoint Security Client software is up-to-date
Latest authorized OS Service Packs are installed
Check for missing or non authorized applications
Efficiently detects and removes malware from the computer with a single scan. Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behavior blockers and heuristic analysis.
Program Control ensures that only legitimate and approved programs are executed, and terminates non-approved or untrusted programs.
Proactive protection for inbound and outbound traffic prevents malware from infecting your computers.
The firewall blocks targeted attacks and stops unwanted traffic.
How to subscribe?
1. Choose service
2. Add users
3. Choose policy and deploy
Powered by Check Point
Alertsec is powered by Check Point Endpoint Security software, the market leader in the field of mobile data protection.
Check Point software provides trusted and proven security, used by tens of thousands of organizations around the world.
Computer security as a software service
Alertsec's cloud-based information security service provides an easy and convenient way to protect information on your organization's laptops. No server, IT knowledge or training is needed as everything is included in the subscription. Alertsec helps you comply with HIPAA, PCI and SOX requirements. The implemented encryption has the highest security certifications - FIPS, Common Criteria, and BITS.