The name of the base system (platform): | Check Point SandBlast |
Developers: | Check Point Software Technologies |
Last Release Date: | 2018/08/01 |
Technology: | Cybersecurity - Antiviruses, cybersecurity - Information loss preventions, cybersecurity - Information management and events in a security system (SIEM) |
Content |
SandBlast Mobile is the unified cross-platform solution intended for protection of corporate mobile devices against the known and unknown malware.
The web control panel provides control of the mobile devices used at the enterprise and receipt in real time of prospecting information on security risks which can constitute potential danger for business.[1]
Features of a product
- Use of opportunities and data on the threats collected by the Check Point ThreatCloud platform
- Anticipatory blocking of the attacks till their beginning
- Protection against threats of "zero day"
- The profound analysis of applications for the purpose of detection of the known and unknown threats
- Monitoring of network activity
- Detection of vulnerabilities in OS of corporate mobile devices
- Detection and blocking of the phishing attacks directed to plunder of corporate information
- Seamless integration in the existing infrastructure (ability to integrate with MDM, SIEM and other systems)
- Flexible scaling (for a scope from 30 to 300 thousand mobile devices)
- Performance management of devices when preserving privacy of personal data of employees
2018: Release of SandBlast Mobile 3.0
On August 1, 2018 Check Point Software Technologies Ltd., the solution provider in the field of cyber security worldwide, announced release of the solution for protection against mobile threats of SandBlast Mobile of version 3.0. The updated solution ensures safety of the enterprise and allows employees to work with the help of the mobile devices safely.
SandblastMobile 3.0 creates a paradigm of mobile security with prevention of network threats at the level of the device. The updated SandBlast Mobile is:
- Prevention of phishing attacks on all applications;
- Access lock to the harmful websites;
- Blocking of the infected devices from sending confidential data to a bot network;
- Protection of corporate applications and data against the infected devices;
- Elimination of threats independent of the user or mobile platforms of management.
Mobile devices became an integral part of an IT ecosystem of the enterprises around the world. However in most the organizations their protection does not correspond at all to the level and cost of corporate assets which they store and process. The enterprises need to use a reliable comprehensive protection from threats on the mobile devices that they were not that weak a link in their protection. Possibilities of SandBlast Mobile expand technology of prevention of threats on mobile devices, providing completely integrated protection in corporate networks, endpoints, cloud and mobile environments. Vasily Dyagilev, the chief representative of Check Point Software Technologies in Russia and the CIS
|
2017: Integration into Microsoft Enterprise Mobility + Security
On July 31 the Check Point Software Technologies company announced integration of Check Point SandBlast Mobile into the solution Microsoft Enterprise Mobility + Security (EMS) for protection of mobile devices in the organizations.
Integration of Check Point SandBlast Mobile, the solution on protection against mobile threats (MTD), into the platform of management of Microsoft Intune of corporate mobility (EMM) allows the enterprises to apply complex approach to device management and to provide protection against the advanced mobile attacks.
According to representatives of Check Point, integration of two solutions gives to Microsoft Intune the chance to use data on threats from SandBlast Mobile for settings of compliance to politicians on the device. At SandBlast Mobile threat detection immediately activates protection on the device and notifies Intune on need to change its status and access rights. Thus corporate data to which the device has access remain under protection before complete elimination of threat.
Protection against mobile threats — the most important part of strategy of Check Point on providing our customers with pro-active protection which is offered by architecture of security of Check Point Infinity — Michael Shaulov, the head of department of products for mobile and cloud security of Check Point Software Technologies said. — Integration into the solution Microsoft Intune which manages mobile devices and provides their compliance to politicians, allows us to provide more reliable mobile protection to our customers |
Andrew Conway, the head of the direction Enterprise Mobility + Security, Microsoft, in return added: "As the attacks of hackers constantly become complicated, many customers try to understand how solutions on ensuring mobile security, similar Check Point, can protect them from threats. Integration of Check Point and Microsoft Intune will allow them to prevent advanced cyber attacks and also will provide access to resources of the company only from not compromised devices |
The solution Check Point SandBlast Mobile integrated with Microsoft EMS is already available to customers.