One-touch secure access to corporate data
Posted on 26 October 2010.
Check Point announced its new Mobile Access Software Blade that delivers fast and secure access to corporate email, data and business applications from mobile devices. It integrates advanced SSL VPN capabilities and encryption technology to protect against security threats as users remotely connect to the corporate network.

As part of the solution, users can download the Check Point Mobile application for secure, one-touch access directly from mobile devices running on Apple, Android, Symbian and Windows PC platforms.

With certificate-based authentication and smart user-device pairing, businesses can ensure each individual has access to their authorized applications, just as they would from their desktop. This comprehensive approach helps IT administrators centrally manage security policies and applications, while end-users benefit from fast, secure access with single sign-on authorization.

“The CIOs we talk with struggle to keep up with all the devices their employees bring into the corporate network,” said Rufus Connell, vice president at Frost & Sullivan. “With Check Point's new solution, we think you may see companies stop certifying individual devices themselves and deploy the Software Blade Architecture to eliminate the complexities of delivering security for mobile devices on their networks.”

Key features and benefits
  • Check Point Mobile application provides one-touch access to corporate email, intranet and business applications
  • Strong authentication and device pairing with the end-user protects mobile data and allows users to access pre-authorized mobile applications
  • Intuitive, customizable interface offers users easy access to applications with a single-sign-on
  • Centralized management and provisioning delivers ease of administration, policy configuration and reporting.





Spotlight

5 ways to stop the Internet of Things from becoming the Internet of Thieves

Attacks on the IoT can sound like the stuff of a movie thriller, but they are very real. The highly skilled and organized cybercriminals of today have the potential to tamper with a car’s firmware to kill its brakes.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Tue, Jun 30th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //