Protection from Malicious Apps

Check Point’s unique Behavioral Risk Engine (BRE) runs applications in a cloud- based environment to scan for threats. The BRE uses machine learning and AI, sandboxing, advanced static code flow analysis, anomaly detection, and app reputation among other techniques to determine if an app is malicious. Additionally, in case the device is offline, there are on-device mechanisms to provide the same protections.

Every time a user downloads an app, they will see a detailed analysis of the app and its access privileges. SandBlast Mobile also blocks downloading apps from unknown sources or third-party app stores, relieving the dangers associated with sideloading apps.

Protection from OS and Device-based Risks

SandBlast Mobile uses real-time risk assessments of the device to reduce the attack surface by detecting attacks, vulnerabilities, changes in configurations, as well as advanced rooting and jailbreaking. With better visibility into these threats, administrators can granularly configure security and compliance policies for devices at risk.

Protection from Network-Based Attacks

SandBlast Mobile’s unique network security infrastructure – On-device Network Protection (ONP) – allows businesses to stay ahead of emerging threats by extending Check Point’s industry-leading network security technologies to mobile devices. 

The SandBlast Mobile app continually validates traffic on the device without routing data through a cloud or on-premise gateway. This ensures user and data privacy is protected, while allowing for a seamless browsing experience.

Advanced Threat Prevention

With the market’s highest threat catch rate, you’ll stay protected from malware, phishing, Man-in-the-Middle attacks, OS exploits, and more.

Full Visibility into Mobile Risks

SandBlast Mobile’s cloud-based dashboard provides real-time risk assessments and visibility into threats impacting your mobile fleet.

Elegant User Experience

Intuitive to use, you’ll only hear from SandBlast Mobile if you’re under attack. All user and corporate data is kept completely private.

Screenshots

Set up a demo or POC (Proof of Concept)

Want to know more? Then contact us to organise a demo or set up a POC (Proof Of Concept).