A major advantage of the R80 is its extensive reporting module, which can be customised and then exported to a file.
Here you see both the power and pain of the full disk encryption setup. There are five basic menu groups on the left hand pane, and numerous parameters to adjust to set up the policy.
The R80 can automatically sync with your Active Directory users and groups assignments, and report on the status of each protective element that is relevant to that specific user.
Each group can have a very extensive collection of policies covering a variety of circumstances, which is one of R80's major benefits. Policies can pertain to connected or disconnected states as well.
This is the main menu for the software deployment section, where you can configure particular policies and see at a glance the status of your endpoints.
The R80 does a good job issuing a warning message on the client side, but doesn't take the next step and offer up a way to resolve it easily.
The client side status summary, showing you what protective feature "blades" are active, and whether you are operating connected to the CheckPoint server or not.
The firewall rules section is similar and familiar, showing rules with typical ports and protocols layout.
The client-side log viewer is searchable by different event types, but is still something that no actual end user should ever have to see.
This is the main dashboard for R80, showing you at a glance what is in compliance, any alerts and infections and a summary of what policies are in use for across your network.
ShareTwitter Facebook Google Plus Email this article
Recommended for youFirst look: Cisco Identity Services Engine HP unveils new products at Global Influencer Summit 2012
Latest UK Updated 5:04pm
The Silicon Valley entrepreneur claims there’s been no real change in the UK startup scene in the last two years.
Time to make cross border online retail a reality says Commission
What once seemed prudent security had turned into an increasingly irrelevant chore