Check Point Capsule Reviews & Product Details

Check Point Capsule Overview

What is Check Point Capsule?

Check Point Capsule is one seamless solution that addresses all your mobile security needs. Capsule protects your mobile devices from threats, provides a secure business environment for mobile device use and protects business documents wherever they go.

Check Point Capsule Details
Product Description

Check Point Capsule is one seamless solution that addresses all your mobile security needs. Capsule protects your mobile devices from threats, provides a secure business environment for mobile device use and protects business documents wherever they go.


Seller Details
Seller
Check Point Software Technologies
Ownership
NASDAQ:CHKP
Company Website
Year Founded
1993
HQ Location
San Carlos, CA
Total Revenue (USD mm)
$1,994
Twitter
@CheckPointSW
69,796 Twitter followers
LinkedIn® Page
www.linkedin.com
5,796 employees on LinkedIn®

Overview Provided by:
Show More
Answer a few questions to help the Check Point Capsule community
Have you used Check Point Capsule before?
Yes

Check Point Capsule Reviews

Write a Review
Filter reviews
LinkedIn®
Connections
Showing 3 Check Point Capsule reviews
Showing 3 reviews
Filter Reviews
Filter Reviews
Sort by
Ratings
Company Size
User Role
For Category
All Industries
Region
Already have Check Point Capsule?
Write a Review
Validated Reviewer
Review source: Organic
What do you like best?

1. Simple to use app with the modern interface.

2. Variety of client to fit all the user platforms - in our company we use Mac, Android and Windows.

3. The company's data is encrypted on the user devices without affecting the user files.

4. Ability to remotely wipe out the data from the devices if they are stolen or lost. Review collected by and hosted on G2.com.

What do you dislike?

As the end user, it is a little bothering me that I can't control how much space the app may consume on my device. Review collected by and hosted on G2.com.

Recommendations to others considering the product:

Efficient solution for the Bring Your Own Device policy.

May be easily integrated to the existing Check Point security architecture as end-user protection measure. Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

At our company we use the Check Point Capsule in several flavors to provide the employees the ability to access files and documents on their own devices (phones, tablets, laptops etc.). The files are retrieved from served and after that are stored on the user devices in the encrypted way in a special "container". The access to the app itself is secured with the company's employee credentials. For employees' home PCs we use Check Point Capsule Docs software for the purpose - the files can not be printed, the content can not be copy-pasted etc. The only way to stole the data is to make photos of the screen =)

In case the employee lefts the company, we remotely delete all the data from his devices without any trace left, according to the security policy. Review collected by and hosted on G2.com.

Show More
Show Less
Network Engineer
Small-Business(50 or fewer emp.)
Validated Reviewer
Review source: Organic
What do you like best?

With this we can protect the smartphones , tables and laptop from anywhere, out side the perimeter. This is protect our onsites users. Review collected by and hosted on G2.com.

What do you dislike?

As we done the POC we couldnt find any disadvantages on this. Review collected by and hosted on G2.com.

Recommendations to others considering the product:

This is very good solution and if you want to protect your organization outside users protection with checkpoint , this is very good solution. Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

Our Users can easily access there office machine in simple way. Review collected by and hosted on G2.com.

Show More
Show Less
Specialist Systems Analyst
Enterprise(> 1000 emp.)
Validated Reviewer
Verified Current User
Review source: Invitation from G2
What do you like best?

Very easy to add connection and connect.

Stable and no connection timeout. Review collected by and hosted on G2.com.

What do you dislike?

I do not know why, but the connection to the company's VPN was not possible when I tried to enter the domain address. I had to use the IP address and the connection was established quickly. Review collected by and hosted on G2.com.

Recommendations to others considering the product:

Easy to use, practical and stable connection. Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

I can remotely access my work computer to query or perform small activities in a fast, stable, reliable and simple way. Review collected by and hosted on G2.com.

Show More
Show Less

There are not enough reviews of Check Point Capsule for G2 to provide buying insight. Below are some alternatives with more reviews:

1
ESET PROTECT Advanced Logo
ESET PROTECT Advanced
4.6
(415)
Equipped with proactive malware defense and engineered to be light on your systems, endpoint security gives you the protection you need with fewer interruptions and false positives.
2
SonicWall Logo
SonicWall
4.1
(82)
SonicWall real-time breach detection and prevention solutions protect more than one million networks worldwide.
3
FortiGate NGFW Logo
FortiGate NGFW
4.7
(79)
FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.
4
Sophos UTM Logo
Sophos UTM
4.1
(72)
The global network of highly skilled researchers and analysts, protecting businesses from known and emerging malware - viruses, rootkits and spyware.
5
Cisco Meraki Logo
Cisco Meraki
4.6
(56)
Manage your entire network from a centralized dashboard.
6
WatchGuard Network Security Logo
WatchGuard Network Security
4.5
(51)
Network security, email security and data loss prevention appliances
7
Symantec Endpoint Protection Mobile Logo
Symantec Endpoint Protection Mobile
4.1
(42)
Helps predict, detect and prevent physical, malware, network and vulnerability exploits to protect businesses from mobile cyberattacks.
8
Palo Alto Networks GlobalProtect Logo
Palo Alto Networks GlobalProtect
4.5
(24)
GlobalProtect delivers the protection of next-generation security platform to the mobile workforce in order to stop targeted cyberattacks, evasive application traffic, phishing, malicious websites, command-and-control traffic, and known and unknown threats.
9
Barracuda CloudGen Firewall Logo
Barracuda CloudGen Firewall
4.7
(19)
A Next-Generation firewall for the Cloud Era.
10
Cisco ASA 5500-X Series Logo
Cisco ASA 5500-X Series
4.3
(22)
The industry's first threat-focused next-generation firewall (NGFW).
Show More