In the Deployment tab, under Mac Client, click Download. In the window that opens, select which components to include in the package and click Download. If more than one version is in the Package repository, select a client to download. Optional: If Endpoint Connect VPN is part of the package, you can configure a VPN site.
- Endpoint Security Homepage E80.90 includes stability and quality fixes. It supports all features of previous releases. Enterprise Endpoint Security E80.90 for: Windows Clients Mac Clients (E80.89) New Features Windows 10 October 2018 Update Support. Enhanced Fileless and Malicious Powershell D.
- Sk112793 - Enterprise Endpoint Security R77.30.02 Server and E80.64 Client; sk121595 - Enterprise Endpoint Security E80.71 Mac Clients; sk131152 - Enterprise Endpoint Security E80.89 Mac Clients; sk158913 - Enterprise Endpoint Security E82.00 macOS Clients (General Availability).
Check Point Endpoint Security
Check Point endpoint security solutions provide data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. Check Point Anti-Malware and Application Control further help to efficiently detect malware with a single scan and make sure only approved software programs are running on end-user systems.
- Publisher: Checkpoint Software Inc.
- Home page:www.checkpoint.com
- Last updated: June 14th, 2016
Check Point R70
Software Blades enable users to efficiently and quickly tailor Security Gateway and Management functionality to specific and changing needs. When running on multi-core platforms and appliances, Check Point CoreXL technology delivers near linear performance scalability for many of the Software Blades.
- Publisher: CheckPoint
- Home page:supportcenter.checkpoint.com
- Last updated: May 23rd, 2012
Check Point Capsule Docs
Check Point Capsule Docs is a secure mobile document management system that follows your documents wherever they go, making sure you have complete control over who is accessing sensitive data and what they can do with it. It secures all documents by default so they cannot be unintentionally shared.
- Publisher: Check Point Software Technologies Ltd.
- Home page:www.checkpoint.com
- Last updated: March 29th, 2016
Pointsec for PC
The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
- Publisher: Check Point Software
- Home page:supportcenter.checkpoint.com
- Last updated: August 21st, 2008
Check Point SmartConsole R75.10
This release, E75.10 Remote Access Clients, adds new features and two additional VPN Clients: Check Point Mobile for Windows and SecuRemote.This Software Download Agreement (“Agreement”) is between you (either as an individual or company) and Check Point Software Technologies Ltd. ('Check Point'), for the software and documentation provided by this Agreement (“Software”).
- Publisher: Check Point Software Technologies Ltd.
- Home page:supportcenter.checkpoint.com
- Last updated: May 26th, 2011
Cisco Security Conversion Tool
Cisco Security Conversion Tool (SCT) is a software program to assist in converting a Check Point Firewall configuration into a Cisco ASA, PIX, or FWSM configuration. Converts one Check Point configuration at a time with a simple wizard-based GUI. Converts from Check Point 4.x and NG Firewalls
- Publisher: Cisco Systems
- Last updated: May 28th, 2010
Check Point SmartConsole R71.30
This version contains new features and resolvesvarious issues for Check Point Software Blades.Check Point SmartConsole R71.30 features:- Check Point Mobile for iPhone and iPad- Access to Web applications- Access to email, calendar, and contacts- Two-factor authentication with client certificate and username/password
- Publisher: CheckPoint
- Home page:supportcenter.checkpoint.com
- Last updated: March 21st, 2012
GeoMetis SPSCheck
SPSCheck allows the user to check the SPS data filefor format compliance and to view the data in a number of ways which will allow evaluation of the data.Features:Easily check SPS files as both raw data and graphicallyManage and interact with files from a whole project.Check files for format complianceView header attributesMap individual file points, swaths or the entire survey
- Publisher: Quest Geo Solutions Limited
- Last updated: November 30th, 2011
Check Point SSL Network Extender
SSL connections are a great remote access solution because they do not require IT departments to upgrade and manage client software. All a user needs is a Web browser. However, remote users still need to access network applications. SSL Network Extender is a browser plug-in that provides clientless remote access, while delivering full network connectivity for any IP-based application.
- Publisher: CheckPoint
- Home page:www.checkpoint.com
- Last updated: March 15th, 2008
Check Point VPN-1 SecuRemote/SecureClient NGX R60 HFA3
The SecureClient allows you to connect to your organization in a secure manner, while at the same time protecting your machine from attacks that originate on the Internet. You can access private files over the Internet knowing that unauthorized persons cannot view the same file or alter it.
- Publisher: Check Point
- Home page:supportcenter.checkpoint.com
- Last updated: December 18th, 2009
Check Point SmartConsole R70
SmartDashboard is a single, comprehensive user interface for defining and managing multiple elements of a security policy: firewall security, VPNs, network address translation, web security, desktop security, anti-virus security, SmartDefense threat defense protections, QoS and VPN client security.
- Publisher: Check Point Software Technologies Ltd.
- Home page:www.checkpoint.com
- Last updated: March 13th, 2009
Check Point SmartConsole R75
In the face of increasingly sophisticated attacks, it takes multiple layers of security to be protected today - at the perimeter, inside the network, at all user endpoints. How can you manage the growing complexity? Check Point's Network Policy Management Software Blade gives you control over configuring and managing even the most complex security deployments
- Publisher: CheckPoint
- Home page:supportcenter.checkpoint.com
- Last updated: January 11th, 2011
Check Point - Full Disk Encryption Dynamic Mount Utility
Full Disk Encryption’s Dynamic Mount Utility is used you need to access information on the hard disk of a Full Disk Encryption - protected machine and do not want to access this information by performing a recovery, for example, if you need to access a disk for forensic reasons or because a failure of the operating system makes it impossible to retrieve data on a disk.
- Publisher: Check Point Software Technologies LTD
- Home page:supportcenter.checkpoint.com
- Last updated: May 11th, 2010
Check Point VPN-1 SecuRemote/SecureClient NGX R60 HFA1
Check Point recommends that customers remain up-to-date with the latest HFAs, as they contain security enhancements and protection against new and evolving.rnThis HFA is a recommended update that resolves various issues and contains improvements for SecureClient and other Check Point products on a variety of platforms.
- Publisher: Check Point Software Technologies
- Home page:www.checkpoint.com
- Last updated: March 2nd, 2008
Check Point SmartConsole NGX R60
Check Point SmartConsole NGX R60 5.0
- Publisher: Check Point Software Technologies Ltd.
- Home page:www.checkpoint.com
- Last updated: April 18th, 2008
OverDrive Media Console
OverDrive Media Console is an eBook and audio book reader for PCs and portable devices. It can run on iPhone/iPad, Android, and even on the high-end versions of Kindle and Nook. The built-in browser can be used to find, check out and download digital titles and read/listen to them using the application.
- Publisher: OverDrive Media, Inc.
- Home page:omc.overdrive.com
- Last updated: May 8th, 2012
CuteFTP
CuteFTP helps you automate file transfer and synchronization operations using scripts. You can write scripts to regularly back up or synchronize your sites, and monitor local folders for changes. You can also do file transfers manually by simply dragging and dropping to its interface.
- Publisher: GlobalSCAPE, Inc.
- Home page:www.cuteftp.com
- Last updated: August 15th, 2018
ZoneAlarm Free Antivirus + Firewall
ZoneAlarm Free Antivirus+Firewall is a security solution for users who want their computers to be protected by viruses, spyware, Trojan horses, malware, worms and other threats that can harm their systems. In order to start enjoying its features, you need to complete a simple installation process.
- Publisher: Check Point Software Technologies Ltd.
- Home page:www.zonealarm.com
- Last updated: August 19th, 2020
Client packages for Mac clients must be distributed manually and do not use Deployment.
To get the mac client package:
Endpoint Checkpoint Vpn Download
In the Deployment tab, under Mac Client, click Download.
In the window that opens, select which components to include in the package and click Download.
If more than one version is in the Package repository, select a client to download.
Optional: If Remote Access VPN is part of the package, you can configure a VPN site.
Select the location to save the package.
The package starts to download.
The package, Endpoint_Security_Installer.zip shows in the configured location. This is the file that you distribute to endpoint users.
Checkpoint Endpoint Security Download Mac 10.15
To distribute the Mac client package:
Use a third party distribution method to distribute the Endpoint_Security_Installer.zip file to endpoint users.
To install the Mac client package on client computers:
Double-click the ZIP file to expand it.
Click the APP file that shows next to the zip file.
The Check PointEndpoint Security Installer opens.
Click Install.
Enter a Name and Password to authorize the installation.
Click OK.
Wait while package installs.
A message shows that the package installed successfully or failed for a specified reason. Click Close.
If the installation was successful, the Endpoint Security icon shows in the menu bar.
Uninstalling the Client on Mac
To uninstall the Endpoint Security client on Mac computers:
Open a terminal window.
Run:
sudo '/Library/Application Support/Checkpoint/Endpoint Security/uninstall.sh'
If the Endpoint Security client was encrypted, the uninstall script first prompts for a reboot so that the volumes can be decrypted. After decryption, the script continues to uninstall the client.
After you uninstall the Endpoint Security client, the administrator must reset the computer through SmartEndpoint on the Security Management Server. See Resetting a Computer.