The Check Point Mobile application is a secure business-container letting end users connect, use and store business data securely on their mobile device. Users can access the corporate email, calendar, contacts, documents and internal web applications securely from their mobile devices. Check Point Mobile Security enables simple and secure business continuity from mobile devices, while allowing organizations to fully manage, control and protect business data on Smartphones and Tablets.
Businesses that are looking to enhance their mobility with highly advanced security by leveraging a Check Point appliance to drive access to an enterprise data container.
The Check Point Mobile application enables business end users to connect, use and store business data securely on their mobile device in a dedicated container. Users can access the corporate email, calendar, contacts, documents and internal web applications securely from their business liable or personally owned mobile devices.
The Mobile Enterprise Container encrypts and controls business data with features such as how the user authenticates to access the data, modified devices (jail break/rooted) detection and data storage policies. It encrypts mobile device communications and protects the communication between native apps and the business with a Layer 3 VPN tunnel.
The solution supports rich authentication to the mobile business application— from a simple passlock to strong two factor authentication.
The Mobile Enterprise Container provides one single place to gain access to required business resources with a native-like application usage for syncing emails, calendar, contacts, protected documents and business web applications.
The solution leverages the Check Point Mobile Access Software Blade to enable robust email compliance capabilities via simple and secure remote access from any device, from anywhere; VPN native application for PC and Smartphones; SSL VPN portal for any device, using web browser; clientless VPN access for PC, Mac and Linux.