Compatible with Windows® 2000, XP, Vista, and MAC™ OSX operating systems. Cut any True Type Font. Create and cut Welded Words, outlines and shadows for text or shapes with a single click. Exclusive Print and Cut Technology allows you to print designs to a color. Title Description Release Date (Version) Size; Machine's software: This software is the update software for the machine. We recommend updating the software with the latest version. We recommend updating the software with the latest version. (2.38) 12.00 MB: Utilities. Title Description Release Date. Get more done with the new Google Chrome. A more simple, secure, and faster web browser than ever, with Google’s smarts built-in.

Software Blades

The Endpoint Security policy can include rules for these Software Blades.

Blade

Rule

Description

Client OS

Full Disk Encryption

OneCheck User Settings

Manages:

  • How a Full Disk Encryption user logs in to the computer
  • How failed logins are handled
  • Password security
  • Access to remote help

Windows
Mac

Full Disk Encryption

Full Disk Encryption

Combines Pre-boot protection, boot authentication, and strong encryption to make sure that only authorized users are given access to information stored on desktops and laptops.

Windows
Mac

Media Encryption & Port Protection

Media Encryption & Port Protection

Protects data stored on the computers by encrypting removable media devices and allowing tight control over computers' ports (USB, Bluetooth, and so on).
Note - Port Protection is not supported on Mac OS.

Windows

Mac

Anti-Malware

Anti-Malware

Protects clients from known and unknown viruses, worms, Trojan horses, adware, and keystroke loggers.

Windows

Firewall

Access Zones

Defines the topology of the organizational network, separating it into Trusted and Internet domains.

Windows
Mac

Firewall

Firewall

Blocks or allows network traffic based on attributes of network connections.

Windows
Mac

Firewall

Application Control

Controls network access on a per-application basis, letting you restrict application access by zone and direction.

Windows

Compliance

Compliance

Ensures that protected computers comply with your organization's requirements and allows you to assign different security levels according to the compliance state of the endpoint computer. For example, non-compliance can result in a remediation message, a warning, or restriction from the network.

Windows
Mac

Capsule Docs

Provides security classifications and lets organizations protect and share documents safely with various groups - internal and external.

Windows

Mac

URL Filtering

URL Filtering

Lets organizations control access to web sites by category, user or group.

Windows

SandBlast Agent Anti-Bot

SandBlast Agent Anti-Bot

Detects bot-infected machines and blocks bot C&C communication to prevent bot damage. Provides detailed information about the device affected by the bot activity, about the bot process itself, and other relevant information.

Windows

SandBlast Agent Forensics and Anti-Ransomware

SandBlast Agent Forensics and Anti-Ransomware

Analyzes incidents reported by other blades. Monitors files and the registry for suspicious processes and network activity. Prevents ransomware attacks.

Windows

SandBlast Agent Threat Extraction and Threat Emulation

SandBlast Agent Threat Extraction and Threat Emulation

Threat Emulation sends files on the endpoint computer to a sandbox for emulation to detect evasive zero-day attacks.

Threat Extraction quickly delivers safe files while the original files are inspected for potential threats.

Windows

VPN

Remote Access VPN

Remote Access VPN lets users connect remotely to a Check Point Security Gateway using IPSec.

Windows
Mac

Timmy (blade Software) Mac Os Catalina

Timmy

Settings for some Software Blades are defined for computers, while others are defined for users.

For example:

Timmy (blade Software) Mac Os X

  • The Firewall policy applies to users, and is enforced for users on all company computers they log on to.
  • The Full Disk Encryption policy applies to the computer. For all users that log on to a computer, the disk encryption policy stays the same.

Timmy (blade Software) Mac Os 11

  • - QBlade's development started a small part of the PhD work of G. Pechlivanoglou at the Hermann Föttinger Institute of TU Berlin.
  • - The initial development was done by D. Marten who implemented all the standard airfoil and blade design and simulation routines based on the XFLR5 project.
  • - G. Weinzierl, undergraduate student at the time initiated the development of an integrated turbulent wind field generator
  • - J. Wendler under the supervision of D. Marten developed the VAWT module and the Viterna 360° extrapolation module.
  • - M. Lennie performed the development of a structural Euler-Bernoulli beam module (QFEM).
  • - N. Moesus further developed and integrated the code of G. Weinzierl and M. Lennie in the QBlade code. Furthermore he initiated the integration of a fully developed (GUI) for the aeroelastic code FAST or NREM/NWTC inside QBlade.
  • - QBlade programming is currently handled by J.Wendler, N. Moesus and D. Marten and the latest version (v0.8) of the software was released in May 2014.
D. Marten is the person mainly responsible for the development and supervision of future versions while G. Pechlivanoglou, G. Weinzierl, N. Moesus and J. Wendler also remain very active in the project