One-touch secure access to corporate data
Posted on 26 October 2010.
Check Point announced its new Mobile Access Software Blade that delivers fast and secure access to corporate email, data and business applications from mobile devices. It integrates advanced SSL VPN capabilities and encryption technology to protect against security threats as users remotely connect to the corporate network.

As part of the solution, users can download the Check Point Mobile application for secure, one-touch access directly from mobile devices running on Apple, Android, Symbian and Windows PC platforms.

With certificate-based authentication and smart user-device pairing, businesses can ensure each individual has access to their authorized applications, just as they would from their desktop. This comprehensive approach helps IT administrators centrally manage security policies and applications, while end-users benefit from fast, secure access with single sign-on authorization.

“The CIOs we talk with struggle to keep up with all the devices their employees bring into the corporate network,” said Rufus Connell, vice president at Frost & Sullivan. “With Check Point's new solution, we think you may see companies stop certifying individual devices themselves and deploy the Software Blade Architecture to eliminate the complexities of delivering security for mobile devices on their networks.”

Key features and benefits
  • Check Point Mobile application provides one-touch access to corporate email, intranet and business applications
  • Strong authentication and device pairing with the end-user protects mobile data and allows users to access pre-authorized mobile applications
  • Intuitive, customizable interface offers users easy access to applications with a single-sign-on
  • Centralized management and provisioning delivers ease of administration, policy configuration and reporting.





Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //