Smartphones and tablets give us unprecedented access to the critical business information we need to work faster and more accurately. Providing your employees with access to that information on the mobile devices they choose has many benefits, but it also exposes your business to risk.
Mobile devices are the backdoor to network breaches, exposing sensitive corporate data to threats. Any business that allows users to access corporate assets via mobile phone is at risk.
Check Point Software Technologies
Check Point SandBlast Mobile is an innovative approach to mobile security for iOS and Android devices which detects and stops mobile threats before they start. Whether your data’s at rest on a device or in flight through the cloud, Sandblast Mobile helps protect you from vulnerabilities and attacks that put data at risk.
Sandblast Mobile Secures in 3 Key Ways
Advanced App Analysis
Malicious App Detection finds known and unknown threats by applying threat emulation to your user’s apps. Sandblast Mobile captures apps as they are downloaded to devices and emulates them in the cloud to uncover any malicious behaviours before they damage your organisation.
Device Vulnerability Assessments
Criminals leverage known vulnerabilities in operating systems, apps and hardware. Sandblast Mobile uses real time risk assessments at the device level to detect vulnerabilities and whether they are being attacked. Uncover advanced rooting and jailbreaking attempts and be aware of threats to your mobile devices.
Extend your Check Point Network Security Capabilities to your mobile device. Constantly validate your cellular traffic without routing through your corporate gateway. This ensures you are protected against Phishing, Bot Attacks, Man in the Middle Wi-Fi attacks and can control users access to URLs and other services.
Check Point constantly drive security innovation forward by leveraging deep threat intelligence to understand and overcome attackers. Check Point’s ThreatCloud logs information globally, so that when Sandblast uncovers an unknown Threat anywhere in the world, every Sandblast user is then protected against it.
Centralised Management through Check Point R80.20 allows Network Administrators to control Mobile Phone security through a single console, simultaneously without the need to queue tasks. SmartEvent correlates logs from all Check Point products, including Mobiles, to identify suspicious activity, track trends and investigate events.
Why Do Customers Buy Sandblast Mobile?
Centralised Threat Intelligence
Treat your mobile phones as part of your network, expanding your security infrastructure beyond traditional perimeters.
Dynamic Threat Prevention
ThreatCloud powers the Anti-Phishing, Safe Browsing and URL Filtering technologies for SandBlast Mobile, by investigating malicious IP, URL, and DNS addresses.
Eliminate Threats on Device
Most threats can be eliminated on a device, without any user action or reliance on mobile device management platforms. Integration with your UEM platform allows the solution to restrict secure container access, or make real-time, risk-based policy adjustments on compromised devices that UEMs on their own can’t make.
Respect User Privacy and Device Performance
SandBlast Mobile never analyses files, browser histories, or application data. The solution uses state and context metadata from operating systems, apps, and networks to determine if a device is compromised. It anonymises the data it uses for analysis to keep it and security intelligence information separated.