Mobile

7/21/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Check Point Teams with Microsoft Intune to Secure Enterprise Mobility

Check Point integrates its SandBlast Mobile with a Microsoft enterprise mobility product.

Singapore - Check Point Software Technologies Ltd. today announced its product integration of Check Point SandBlast Mobile with Microsoft Enterprise Mobility + Security (EMS) to secure mobile devices in the enterprise.

Cyberattacks have evolved beyond the enterprise perimeter, breaching mobile environments; yet only one percent of enterprises have deployed mobile security technologies. The integration of Check Point SandBlast Mobile, the market-leading mobile threat defense (MTD) solution, with Microsoft's Intune enterprise mobility management (EMM) platform, provides businesses with a comprehensive approach to manage mobile devices and protect against advanced mobile attacks.

The integration with Microsoft Intune and SandBlast Mobile simplifies how customers can apply SandBlast Mobile's threat intelligence, as an additional input into Intune's device compliance settings. Once a threat is detected, SandBlast Mobile immediately applies on-device protections and notifies Intune to enforce device status changes and conditional access controls to ensure that company data stays protected until the threat is remediated.

"Mobile threat defense is a critical part of our strategy to provide customers with the best proactive prevention available with Check Point Infinity security architecture," said Michael Shaulov, Head of Products, Mobile and Cloud Security, Check Point. "Recent third-party validation highlights the effectiveness of implementing SandBlast Mobile to find and prevent threats, and the integration with Microsoft Intune, which manages mobile devices and ensures their compliance, will allow us to serve our customers further in our goal to continue to improve mobile security."

Andrew Conway, General Manager for Enterprise Mobility + Security at Microsoft Corp. added, "As attacks continue to become more sophisticated, many customers are looking at how mobile threat defense solutions, such as Check Point, can help them thwart threats on mobile devices. The integration between Check Point and Microsoft Intune will help secure mobile devices from advanced cyber threats, and help ensure that only compliant devices have access to company resources."

Check Point SandBlast Mobile's integration with Microsoft Intune continues the companies' mutual efforts to secure enterprise infrastructure - from cloud to mobile. This includes previous joint work on Check Point v. Sec Cloud Security for Microsoft Azure.

Availability

Check Point SandBlast Mobile's integration with Microsoft EMS is now generally available.

For more information on the SandBlast Mobile and Intune integration:

http://blog.checkpoint.com/2017/07/19/introducing-check-point-sandblast-mobile-microsoft-intune/

For details and to learn more about how SandBlast Mobile helps organizations defend against mobile threats visit:

https://www.checkpoint.com/products/sandblast-mobile/

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Santa: "How about a unicorn coming out of a monitor instead?"
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.