Mobile

7/21/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Check Point Teams with Microsoft Intune to Secure Enterprise Mobility

Check Point integrates its SandBlast Mobile with a Microsoft enterprise mobility product.

Singapore - Check Point Software Technologies Ltd. today announced its product integration of Check Point SandBlast Mobile with Microsoft Enterprise Mobility + Security (EMS) to secure mobile devices in the enterprise.

Cyberattacks have evolved beyond the enterprise perimeter, breaching mobile environments; yet only one percent of enterprises have deployed mobile security technologies. The integration of Check Point SandBlast Mobile, the market-leading mobile threat defense (MTD) solution, with Microsoft's Intune enterprise mobility management (EMM) platform, provides businesses with a comprehensive approach to manage mobile devices and protect against advanced mobile attacks.

The integration with Microsoft Intune and SandBlast Mobile simplifies how customers can apply SandBlast Mobile's threat intelligence, as an additional input into Intune's device compliance settings. Once a threat is detected, SandBlast Mobile immediately applies on-device protections and notifies Intune to enforce device status changes and conditional access controls to ensure that company data stays protected until the threat is remediated.

"Mobile threat defense is a critical part of our strategy to provide customers with the best proactive prevention available with Check Point Infinity security architecture," said Michael Shaulov, Head of Products, Mobile and Cloud Security, Check Point. "Recent third-party validation highlights the effectiveness of implementing SandBlast Mobile to find and prevent threats, and the integration with Microsoft Intune, which manages mobile devices and ensures their compliance, will allow us to serve our customers further in our goal to continue to improve mobile security."

Andrew Conway, General Manager for Enterprise Mobility + Security at Microsoft Corp. added, "As attacks continue to become more sophisticated, many customers are looking at how mobile threat defense solutions, such as Check Point, can help them thwart threats on mobile devices. The integration between Check Point and Microsoft Intune will help secure mobile devices from advanced cyber threats, and help ensure that only compliant devices have access to company resources."

Check Point SandBlast Mobile's integration with Microsoft Intune continues the companies' mutual efforts to secure enterprise infrastructure - from cloud to mobile. This includes previous joint work on Check Point v. Sec Cloud Security for Microsoft Azure.

Availability

Check Point SandBlast Mobile's integration with Microsoft EMS is now generally available.

For more information on the SandBlast Mobile and Intune integration:

http://blog.checkpoint.com/2017/07/19/introducing-check-point-sandblast-mobile-microsoft-intune/

For details and to learn more about how SandBlast Mobile helps organizations defend against mobile threats visit:

https://www.checkpoint.com/products/sandblast-mobile/

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
The Fundamental Flaw in Security Awareness Programs
Ira Winkler, CISSP, President, Secure Mentem,  7/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14492
PUBLISHED: 2018-07-21
Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI.
CVE-2018-3770
PUBLISHED: 2018-07-20
A path traversal exists in markdown-pdf version <9.0.0 that allows a user to insert a malicious html code that can result in reading the local files.
CVE-2018-3771
PUBLISHED: 2018-07-20
An XSS in statics-server <= 0.0.9 can be used via injected iframe in the filename when statics-server displays directory index in the browser.
CVE-2018-5065
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
CVE-2018-5066
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.