SAN CARLOS, Calif., May 18, 2022 (GLOBE NEWSWIRE) — Checkpoint® Software Technologies Ltd. (CHKP), a leading global provider of cybersecurity solutions, announces the availability of the most comprehensive cyber protection against mobile threats with a new version of Harmony Mobile that prevents the download of malicious files. Harmony Mobile is the first mobile threat solution among the industry’s leading vendors to prevent malicious files from being downloaded to mobile devices. This release further extends Harmony Mobile with additional security features including OS Vulnerability Assessment, advanced mitigation capabilities on Samsung devices, easy-to-manage HTTPS inspection, and more to provide the most comprehensive mobile security solution.

With the global shift to remote and hybrid working, employees are increasingly using mobile devices to perform business-critical tasks or to access and share sensitive company information. This has made employee cellphones a major entry point for cybercriminals. According to Check Point Research (CPR), nearly all organizations (97%) have experienced mobile threats from all vectors in the past two years, with one of the most overlooked vectors being file downloads. In fact, as an example, CPR found a critical vulnerability in the Instagram app that would have given an attacker the ability to take over a victim’s account and turn their phone into a spy tool, simply by sending it a malicious image file.

Harmony Mobile’s new file protection works by leveraging Check Point’s Threat Cloud to scan downloaded files for malicious intent. In case such intent is found, the download is completely blocked and the malicious file never reaches the device. On Android handsets, Harmony Mobile can also scan files in storage on the mobile device and will alert both the user and administrator if a malicious file is found. The user will be prompted to delete the file and the administrator can choose to restrict the device’s access to corporate resources.

As part of Check Point’s drive to improve mobile security, the new version 4.0 of Harmony Mobile also includes integration with Samsung Knox for unique mitigation capabilities, OS CVE assessment to allow administrators to understand and remediate vulnerabilities in the organization’s mobile fleet, automated certificate deployments to simplify management, and more.

Rafi Kretchmer, Vice President of Product Marketing at Check Point Software Technologies, said, “Most mobile security solutions on the market today can only scan files related to the mobile operating system, such as apps and iOS profiles. It does not protect your mobile from other types of malicious files such as executables, MS Office files, PDFs, etc. As we become more dependent on mobiles, cybercriminals are increasingly targeting them and so it has never been more important to have a robust mobile security solution that protects you from any type of file.

Learn more about Harmony Mobile Release 4.0 on the Check Point blog.

Availablity

Check Point Harmony Mobile Release 4.0 is available immediately to new and existing customers.

Follow Check Point via:
Twitter: https://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: https://blog.checkpoint.com
YouTube: https://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cybersecurity solutions for businesses and governments worldwide. Check Point Infinity’s portfolio of solutions protects businesses and public organizations against 5e generation-to-generation cyberattacks with an industry-leading capture rate of malware, ransomware and other threats. Infinity comprises three main pillars delivering uncompromising security and Generation V threat prevention in enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and data centers, all controlled by the industry’s most comprehensive and intuitive unified security management. Check Point protects more than 100,000 organizations of all sizes.

Check-Point-Software-Technolog.png

Previous

"A passion to inspire" Upskill Day

Next

Jon Burket discovers, capitalizes on a new passion | West Orange Times & Observer

Check Also