Advertisment

Check Point Announces SandBlast Mobile 3.0 with Threat Prevention Technology

author-image
Voice&Data Bureau
New Update
checkp

Check Point Software Technologies has announced new capabilities for its industry-leading mobile threat defense solution, SandBlast Mobile. SandBlast Mobile 3.0 becomes the only solution in the category to offer threat prevention technology for the enterprise, allowing employees to safely conduct business using their mobile devices.

Advertisment

The new SandblastMobile 3.0 establishes a new mobile security paradigm with on-device network threat prevention. The latest additions to SandBlast Mobile will now:

  • Prevent phishing attacks on all applications
  • Prevent browsing to malicious sites where devices may become infected
  • Block infected devices from sending sensitive data to botnets
  • Keep infected devices from accessing corporate applications and data
  • Mitigate threats without relying on user action or mobile management platforms

“Mobile devices are a key part of the IT ecosystem of businesses globally.  However, in most organizations, they are not protected anywhere near the level they need to be, in relation to the value of the corporate assets they store and process,” said Itai Greenberg, VP of Product Management at Check Point Software Technologies.  “Enterprises need to use consistent, comprehensive threat prevention across their mobile fleets, to stop these devices from being the weak point in their security defenses.  The new capabilities for SandBlast Mobile extend our best-in-class threat prevention technology to mobile, delivering fully-integrated protection across enterprise networks, endpoints, cloud and mobile deployments.”

Advertisment

In Miercom’s independent Mobile Threat Defense Industry Assessment, SandBlast Mobile achieved the highest threat catch rate of all tested vendors.  Check Point has seen the attack vectors on mobile devices expand from just known malware, network and OS exploits, to now include zero-day malware, mobile cryptomining, SMS attacks and Bluetooth exploits. To address this, the company offers a complete solution to enterprise customers, part of Check Point’s Infinity security architecture. Infinity seamlessly shares indicators between network appliances, PC endpoints, cloud, and mobile.

check-point check-point-software
Advertisment