Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Check Point Mobile Threat Prevention

798 views

Published on

Learn more: https://www.checkpoint.com/products/mobile-threat-prevention/index.html

Keeping your business safe from cyberattacks is no easy task, and the increased use of personal smartphones and tablets in the workplace has made it even harder. Cyberthieves know your employees are often the weakest link in your organization’s security. With a single attack, these criminals can get inside operating systems, networks, and apps to take, monitor, or even change sensitive business data. Read this presentation to learn how Check Point Mobile Threat Prevention can keep mobile devices and data protected from cybercrime.

Be sure to download "IDC Technology Spotlight: Comprehensive Protection from Advanced Threats Requires Mobile Threat Assessment at http://bit.ly/1TA2Sw2

Published in: Technology
  • Be the first to comment

Check Point Mobile Threat Prevention

  1. 1. ©2015 Check Point Software Technologies Ltd. CHECK POINT MOBILE THREAT PREVENTION
  2. 2. MAJOR ATTACKS
  3. 3. FACTS Targeting Androids $4M Per Day, 1M Infected Brain Test Targeting Androids Singapore Banking Targeted Malware GMBot Targeting iOS 4,000 Apps Infected XcodeGhost
  4. 4. 3 VECTORS OF Network Attacks OS ExploitsInfected Apps
  5. 5. TURN ON THE MICROPHONE TURN ON THE CAMERA TRACK DEVICE LOCATION CAPTURE EMAILS EXTRACT DATA STEAL USERNAME & PASSWORD
  6. 6. MOBILE SECURITY BUILDING BLOCKS Mobile Device Management Policy Enforcement Secure Containers Capsule workspace Anti-Virus, App Reputation Known Threats Check Point Mobile Threat Prevention Unknown Threats and Zero Day
  7. 7. MOBILE THREAT PREVENTION Advanced Threat Detection and Mitigation Best Mobile Threat Catch Rate Full Visibility Simple Deployment
  8. 8. MDM EMM
  9. 9. Consolidated Security Solution ADVANCED THREAT PREVENTION GENERATION MOBILE SECURITY VIRTUALIZED / CLOUD SECURITY UNIFIED MANAGEMENT
  10. 10. LEARN MORE: checkpoint.com/mobilesecurity Download: IDC Technology Spotlight: Comprehensive Protection from Advanced Threats Requires Mobile Threat Assessment

×