Preview only show first 10 pages with watermark. For full document please download

Nhs Blood And Transplant Deploys Check Point Endpoint Security

   EMBED


Share

Transcript

“The granular control of Endpoint Security’s port protection function enables us to keep information flow fully traceable and secure, while allowing users to work efficiently.” Adam Ataar Network Security & Operations Consultant NHS Blood and Transplant Customer Name NHS Blood and Transplant Industry Healthcare Check Point Products n Check Point Endpoint Security™ Customer Needs Met n Confidential data secured on all laptops, PCs and USB devices against malware, theft and data loss ensures compliance with latest UK Government directives n Enables secure remote access to corporate networks for employees n Delivers security automatically, and transparently to the end user Quick and easy centralized n deployment, plus ease of administration and management has reduced burden on IT support staff NHS Blood and Transplant Deploys Check Point Endpoint Security for Total Protection of Sensitive Information About NHS Blood and Transplant NHS Blood and Transplant, an integral part of the National Health Service (NHS), is an organization, which collects, processes, stores and issues approximately 2.1 million blood donations per year from its 15 blood centres in England and North Wales. In addition to dealing with blood donations, NHS Blood and Transplant conducts new research into improving the safety of blood and blood products, and the ways they can be used to help save lives. Storing confidential personal data as well as sensitive research data means it is imperative the organization has a fail-safe data security solution in place. The Challenge As an existing Check Point customer, NHS Blood and Transplant already had a robust laptop and PC security solution in place. However they needed to enhance protection for sensitive data on its PCs to comply with the latest UK Government’s directives on data security in the public sector. Adam Ataar, Network Security & Operations Consultant NHS Blood and Transplant said: “Our laptop and PC security was already strong, as we used Check Point’s Integrity 6.5 solution for firewalling, intrusion prevention and endpoint policy compliance. However, we needed to deploy full disk encryption and port protection functions to further enhance security. And with 900 laptops and 500 desktop PCs across the UK, the solution had to be easy to manage, without adding complexity for users or the IT team.” www.nhsbt.nhs.uk A Customer Success Story The Check Point solution Following an evaluation of solutions from several vendors, NHS Blood and Transplant chose to deploy Check Point Endpoint Security™. Check Point Endpoint Security is the first single agent for total endpoint security that combines the highest-rated firewall, network access control, program control, antivirus, anti-spyware, data security and remote access. Designed to protect company laptops and PCs against malware, data loss, and other threats while enabling secure remote access to the corporate network, the solution was chosen for its ability to deliver comprehensive security in a single software agent that is easily deployed and managed from a single console. The Benefits of Check Point Endpoint Security Check Point Endpoint Security has enabled NHS Blood and Transplant to further protect the data on its fleet of laptops, desktop PCs and USB storage devices against malware, data loss and theft. Check Point’s full-disk encryption feature means NHS Blood and Transplant employees don’t have to make any decisions about what data needs protecting. Adam Ataar said: “Users shouldn’t be given the responsibility for deciding what should and should not be encrypted, or to maintain security policies. These policies have to be enforced by solutions, as transparently as possible from the user’s viewpoint. That’s exactly what the Check Point solution does.” Endpoint Security also gives full control over data written to USB devices and removable media, as well as controlling which types of removable storage devices can be used on the organizations network. contact check point “We use the granular control of Endpoint Security’s port protection function. Each member of staff is given their own fully-encrypted 2GB USB drive, and use of all other removable media is blocked. This enables us to keep information flow fully traceable and secure, while enabling users to work efficiently,” continued Ataar. Ataar reports that both deployment and ongoing management have been seamless and easy for users and the IT team. Additionally, by reporting on the security status of each laptop and PC, Check Point Endpoint Security also allows any required upgrades or policy issues to be identified and addressed directly by administrators from the central management console. Another key issue for NHS Blood and Transplant is to protect documents and emails that users are working on when away from the office, without compromising security or usability. Check Point Endpoint Security is unique in that it includes both data security for preventing data loss and theft and a VPN client which provides secure remote access for employees working offsite. This delivers greater flexibility to the organization by allowing employees to work securely online when out of the office; ensuring sensitive data continues to be protected. Looking to the future In the future, NHS Blood and Transplant plans to migrate its secure remote access to the VPN functionality in Check Point Endpoint Security, from the Citrix Access Gateway solution it currently uses. Adam Ataar says this will further simplify security management and deliver long-term savings. Worldwide Headquarters 5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: [email protected] U.S. Headquarters 800 Bridge Parkway, Redwood City, CA 94065 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point Endpoint Security, Check Point Endpoint Security On Demand, Check Point Express, Check Point Express CI, the Check Point logo, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoreXL, CoSa, DefenseNet, Dynamic Shielding Architecture, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Full Disk Encryption, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle Management,Power-1, Provider-1, PureAdvantage, PURE Security, the puresecurity logo, Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Security Management Portal, Sentivist, SiteManager-1, Smart-1, SmartCenter, SmartCenter Express, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartProvisioning, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SMP, SMP On-Demand, SofaWare, SSL Network Extender, Stateful Clustering, Total Security, the totalsecurity logo, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, UTM-1, UTM-1 Edge, UTM-1 Edge Industrial, UTM-1 Total Security, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN-1 Power, VPN-1 Power Multi-core, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VSX, VSX-1, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm ForceField, ZoneAlarm Internet Security Suite, ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, and 7,165,076 and may be protected by other U.S. Patents, foreign patents, or pending applications. HTNRHNNO