Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor

Recruitment agency to use Check Point encryption for data protection

Check Point : 24 September, 2008  (Application Story)
Full disk encryption and end point protection from Check Point to provide Michael Page recruitment agency with effective security for their database of personnel records
Check Point Software Technologies has announced that Michael Page International is using Check Point's Full Disk Encryption and Media Encryption products to secure confidential data on its laptops, PCs and removable devices against theft, data leakage and inadvertent loss.

As a world leading professional recruitment consultancy, Michael Page International wanted to secure confidential data on both office-based PCs and the laptops used by senior management and IT staff.

"Confidentiality is absolutely essential in our business - our clients and applicants depend on it. As part of an ongoing drive to improve security, we identified an opportunity to enhance our data security provision still further through an 'endpoint security' solution. With around 300 PCs in 65 offices across the UK, we needed a solution that was easy to deploy and control across a distributed network," said Graham Taylor, Head of IT security for Michael Page.

Following an evaluation of possible solutions, Check Point Media Encryption was chosen for its full control over USB ports, devices and media drives, its centralised management, and ability to provide complete audits of device usage. Graham Taylor reports that both roll-out and ongoing management have been seamless and easy.

The company also wanted to secure the fleet of around 50 laptops used by directors, senior management and IT personnel against the risks of loss or theft. Graham Taylor's team chose Check Point Full Disk Encryption.

"Full disk encryption means the user doesn't have to make any decisions about what data needs protecting - unlike file-based encryption solutions. With the Check Point product, the security is always on and data encrypted on the fly, keeping confidential records safe and removing the responsibility from users. What's more, users report little or no difference in computer performance," added Taylor.

"Both Check Point products have been 'fit and forget' after initial set-up. We now have complete control over these endpoints, and any changes we need to make, such as giving a member of staff permission to use a USB device, are quickly done."

Following the successful deployment in the UK, Michael Page is evaluating rolling out the Check Point products to its Asia-Pacific operations. Replacing the security products currently in use, with the Check Point solutions will help it achieve a standardised approach to data security across all regions.

Juliette Sultan, head of Global Marketing for Check Point said: "As data loss incidents increase, Check Point encryption products give businesses complete, automated, industry-proven solutions that deploy quickly and easily to protect all sensitive data."

Check Point's Media Encryption prevents unauthorised copying of sensitive data by combining port and device management, content filtering and centralised auditing with robust media encryption. This plugs potential leakage points and logs data movement to and from any plug and play devices, providing comprehensive control of security policies.

Check Point Full Disk Encryption provides automatic real-time encryption of a PC's entire hard drive, that can be configured to meet any organisation's needs. Pre-boot authentication increases security by requiring username and password before the operating system loads.

Check Point data security products support more end-user platforms than any other solutions in the industry, from Windows, Linux and Mac OS based laptops to Symbian, Windows Mobile, Palm and PocketPC based smartphones and PDAs. Today, regardless of operating system, customers receive encryption technology from Check Point that is recognised as a data security leader in the latest Gartner Mobile Data Protection Magic Quadrant.
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo