A major advantage of the R80 is its extensive reporting module, which can be customised and then exported to a file.
Here you see both the power and pain of the full disk encryption setup. There are five basic menu groups on the left hand pane, and numerous parameters to adjust to set up the policy.
The R80 can automatically sync with your Active Directory users and groups assignments, and report on the status of each protective element that is relevant to that specific user.
Each group can have a very extensive collection of policies covering a variety of circumstances, which is one of R80's major benefits. Policies can pertain to connected or disconnected states as well.
This is the main menu for the software deployment section, where you can configure particular policies and see at a glance the status of your endpoints.
The R80 does a good job issuing a warning message on the client side, but doesn't take the next step and offer up a way to resolve it easily.
The client side status summary, showing you what protective feature "blades" are active, and whether you are operating connected to the CheckPoint server or not.
The firewall rules section is similar and familiar, showing rules with typical ports and protocols layout.
The client-side log viewer is searchable by different event types, but is still something that no actual end user should ever have to see.
This is the main dashboard for R80, showing you at a glance what is in compliance, any alerts and infections and a summary of what policies are in use for across your network.
ShareTwitter Facebook Google Plus Email this article
Recommended for youFirst look: Cisco Identity Services Engine HP unveils new products at Global Influencer Summit 2012
Latest UK Updated 3:26pm
Apple, Google, Facebook and friends have been busy preying on some of the UK's hottest tech startups
Google puts privacy and security settings in one hub, publishes data policies on a new website after pressure from UK
The Newcastle firm said it will dedicate time and money to non-profits, while also giving them access to its technology