Mobile Threat Protection

Checkpoint

Mobile Threat Prevention

Using smartphones and tablets to access critical business information on the go has many benefits, but it can also expose your sensitive data to risk. Check Point Mobile Threat Prevention protects iOS and Android devices from advanced mobile threats, ensuring you can deploy and defend devices with confidence.

Detect, assess and mitigate advanced mobile threats

  • Protect sensitive business data at rest, use, and transit on mobile devices from cyberattacks
  • Improve visibility and protection through integration with existing mobility and security systems (MDM, MAM, NAC, SIEM, etc.)
  • Enable rapid response to cross-platform advanced persistent threat (APT) attacks
  • Preserve user experience and privacy, while adding the protection required by organizational or regulatory mandates

Comprehensive threat detection

Static policies, PINs, and passwords provide little protection against sophisticated cyber threats. Our intelligent Behavioral Risk Engine (BRE) monitors more than just one attack vector. It looks at a whole device in context, including its environment – a key component to any mobile device security strategy.

  • Perform advanced app analysis to detect known and unknown threats
  • Monitor network activity for suspicious or malicious behavior
  • Assess device-level (OS) vulnerabilities to reduce the attack surface

Dynamic threat response

Every threat is different and requires a prescriptive response. Our solution executes calculated threat responses that prevent compromised devices from accessing your organization’s network. You can even create policies for different thresholds, individuals, and groups to help meet your unique security or compliance requirements.

  • Mitigate and eliminate threats right on the device
  • Integrate threat intelligence with your existing SIEM

Seamless deployment and adoption

Our solution integrates with you existing enterprise systems to make delivering advanced security for mobile devices surprisingly effortless. It is also designed to be non-intrusive, making it easy for users to keep work data secure without worrying about the privacy of their own.

  • Deploy quickly and easily at scale, from 30 to 300,000 devices
  • Maintain device performance while respecting end user privacy