Check Point Software Technologies Ltd. (NASDAQ: CHKP) today announced its product integration of Check Point SandBlast Mobile with Microsoft Enterprise Mobility + Security (EMS)to secure mobile devices in the enterprise.
Cyber attacks have evolved beyond the enterprise perimeter, breaching mobile environments; yet only one percent of enterprises have deployed mobile security technologies. The integration of Check Point SandBlast Mobile, the market-leading mobile threat defense (MTD) solution, with Microsoft’s Intune enterprise mobility management (EMM) platform, provides businesses with a comprehensive approach to manage mobile devices and protect against advanced mobile attacks.
The integration with Microsoft Intune and SandBlast Mobile simplifies how customers can apply SandBlast Mobile’s threat intelligence, as an additional input into Intune’s device compliance settings. Once a threat is detected, SandBlast Mobile immediately applies on-device protections and notifies Intune to enforce device status changes and conditional access controls to ensure that company data stays protected until the threat is remediated.
“Mobile threat defense is a critical part of our strategy to provide customers with the best proactive prevention available with Check Point Infinity security architecture,” said Michael Shaulov, Head of Products, Mobile and Cloud Security, Check Point.“Recent third-party validation highlights the effectiveness of implementing SandBlast Mobile to find and prevent threats, and the integration with Microsoft Intune, which manages mobile devices and ensures their compliance, will allow us to serve our customers further in our goal to continue to improve mobile security.”
Andrew Conway, General Manager for Enterprise Mobility + Security at Microsoft Corp. added, “As attacks continue to become more sophisticated, many customers are looking at how mobile threat defense solutions, such as Check Point, can help them thwart threats on mobile devices. The integration between Check Point and Microsoft Intune will help secure mobile devices from advanced cyber threats, and help ensure that only compliant devices have access to company resources.”