Check Point Debuts Mobile Access Software Blade

— November 01, 2010

Internet security services Check Point Software Technologies recently launched its Mobile Access Software Blade, which delivers secure access to corporate e-mail, data, and business applications from mobile devices. The new blade integrates advanced SSL VPN capabilities and encryption technology to protect against security threats as users remotely connect to the corporate network. As part of the solution, users can download the Check Point Mobile application for secure, one-touch access directly from mobile devices running on Android, Apple, Symbian, and Windows PC platforms.
 
"With more users connecting remotely than ever before, mobile computing presents an ongoing security challenge for organizations that want to protect company data and resources, while providing employees with access to the network anytime, anywhere," says Dorit Dor, vice president of products at Check Point Software Technologies.
 
The Mobile Access Software Blade provides users with a business portal that allows secure connectivity to their intranet, corporate e-mail, and web applications. With certificate-based authentication and smart user-device pairing, businesses can ensure each individual has access to their authorized applications, just as they would from their desktop. This comprehensive approach helps IT administrators centrally manage security policies and applications, while end-users benefit from fast, secure access with single sign-on authorization.
 
"The CIOs we talk with struggle to keep up with all the devices their employees bring into the corporate network," says Rufus Connell, vice president at Frost & Sullivan. "With Check Point's new solution, we think you may see companies stop certifying individual devices themselves and deploy the Software Blade Architecture to eliminate the complexities of delivering security for mobile devices on their networks."
 
Check Point's Software Blade Architecture simplifies security for businesses by enabling customers to deploy the Mobile Access Software Blade, or any of the other 30 software blades, on their current security gateway in minutes. Organizations can leverage their existing infrastructure without requiring additional hardware or management.
 
Key features and benefits:
  • Check Point Mobile application provides one-touch access to corporate e-mail, intranet and business applications
  • Strong authentication and device pairing with the end-user protects mobile data and allows users to access pre-authorized mobile applications
  • Intuitive, customizable interface offers users easy access to applications with a single-sign-on
  • Centralized management and provisioning delivers ease of administration, policy configuration and reporting

POST A COMMENT

comments powered by Disqus

RATE THIS CONTENT (5 Being the Best)

12345
Current rating: 0 (0 ratings)

MOST READ STORIES

topics

Must See


FEATURED REPORT

Mobile Risk: Security Is Not a Game

IDC predicts 2 billion mobile devices will be shipped by 2017, while Gartner expects a 26 billion Internet of Things installed base (excluding smartphones and tablets) by 2020. With more devices, more machines, more connectivity comes more risk.