WITH CHECK P OINT
S ANDB L AST MOB IL E
PROTECT YOUR ENTERPRISE
FROM THE NEXT SECURITY BREACH:
MOBILE DEVICES
• On and connected as needed
• Primary use: business
• Attack vector: malicious files
• 24/7 on, connected, with you constantly
• Primary uses: personal and business
• Attack vector: Malicious apps
MOBILE IS MORE VULNERABLE AND LESS PROTECTED THAN PCs
PROTECTION
• Anti-virus
• Network protection
PROTECTION
Most organizations today do not have
any cyber protection for mobile devices
VULNERABILITY LEVEL
?
MOBILE
PC
MOBILE IS THE
NEW WINDOW
INTO CORPORATE
NETWORKS
of organizations already
80%
Source: 2016 BYOD and Mobile Security Report, Crowd Research Partners
ADOPTED
BYOD
programs or plan
to adopt in the
next 12 months
HOW DO YOU PROTECT
YOUR NETWORK FROM
MOBILE THREATS?
HOW MOBILE DEVICES
ARE INFECTED?
MOBILE’S UNIQUE
ATTACK VECTORS
Infected Apps
Network Attacks
OS Exploits
SMS Attacks
DAMAGES
Intercepting
text messages
Stealing
passwords
Taking
photos
Microphone
recordings
Stealing
contact lists
Stealing
email
Tracking
location
Breaking into
corporate network
OF ALL
ORGANIZATIONS
ARE INFECTED WITH
MOBILE MALWARE
Source: Check Point Mobile Threat Prevention | N=850 Check Point customers, each protecting more than 500 devices
100%
Averaged 35
jailbroken or
rooted devices
74% 89%
Experienced a
man-in-the-middle
attack over Wi-Fi
UNIQUE CHALLENGES
REQUIRE
UNIQUE SOLUTIONS
ZERO DAY PROTECTION FOR MOBILE DEVICES
SANDBLAST
MOBILE
Complete threat detection
and mitigation
Best mobile threat
catch rate
Full visibility
Simple deployment
HOW IT WORKSHOW IT WORKS
APP ANALYSIS
(INFECTED APPS)
CLOUD-BASED
BEHAVIORAL RISK ENGINE
ON DEVICE DETECTION
OS EXPLOITS
(JAILBREAK/ROOT)
NETWORK
ATTACKS
(WIFI)
SMS ATTACKS
REAL-TIME INTELLIGENCE,
MONITORING AND CONTROL
* Source: Miercom March 2017 (tests included: Known, Unknown Modified, Unknown Zero-day, False Positives, and iOS)
** Lookout, Zimperium and Better Mobile were unwilling to participate in the test
BEST MALICIOUS APPS CATCH RATE
100%
89%
63%
42%
INDUSTRY
AVERAGE
Sandblast Mobile Malicious Application Detection Efficiency
14©2016 Check Point Software Technologies Ltd.
11
3 3
1
14
9
2
1
LARGEST NUMBER OF ZERO DAYS DISCOVERED
2015-JAN 2017
GOOGLE SECURITY
HALL OF FAME
SC MEDIA TOP 25
THREAT SEEKERS 2016
MITRE CVE
AUTHORITY
Vulnerabilities Malware
Check Point Lookout Zimperium Skycure
2014 20162015
GodlessGhost Push* Turkish Clicker HummingBad DressCode Gooligan
Quadrooter.C
CVE-2016-2059
Quadrooter.A
CVE-2016-2503
Quadrooter.B
CVE-2016-2504
Quadrooter.D
CVE-2016-5340
Source: Google Android Security 2016 Year In Review*Partially Check Point : BrainTest, Sept 2015
= DISCOVERED BY CHECK POINT
GOOGLE ANDROID SECURITY 2016 REPORT
70% OF THE THREATS WERE FIRST DISCOVERED BY CHECK POINT
CVE-2015-1805
Dirty Cow
ATTACKS
VULNERABILITIES
APRFEB JUN JULY AUG OCT NOVJANOCT
data transmission
Adups
CVE-2015-1805
500,000,000+
Malicious file hashes
and sites
250,000,000
C & C addresses
11,000,000
Malware behavioral
signatures
The world’s largest
IoC database
Daily inputs from traffic across 100K
security gateways world wide
THE CHECK POINT ADVANTAGE
VISIBILITY
FULL
SIMPLE TO DEPLOY
Integration with all leading
EMM platforms and containers
Cloud base SaaS solution
Without impacting usability:
No impact on battery life
Complete end user privacy
Container
EMM
1,200
Devices
BYOD
400
CHECK POINT CUSTOMER CASE STUDY
INFECTED
DEVICES
DETECTED
Credential
Stealers
Unauthorized
Root Kits
mRATs
Keystroke
Loggers
Devices quarantined
by EMM
SOLUTION
Sandblast Mobile
+ EMM + secure
container integration
Sandblast Mobile
detected
infected devices
SUMMARY
MOBILE CYBER THREATS
ARE ON THE RISE
EMPLOYEES’ MOBILE
DEVICES ARE WEAKEST LINK
IN ANY IT INFRASTRUCTURE
CHECK POINT PROTECTS
YOUR DEVICES FROM
ADVANCED MOBILE
THREATS
WITH CHECK POINT
SANDBLAST MOBILE
PROTECT YOUR ENTERPRISE AGAINST
MOBILE THREATS
CAPSULE
WORKSPACE
SECURE ACCESS TO:
Email
Calendar
Contacts
Documents
Corporate Intranet
Native Enterprise Apps
REMOTE WIPE FOR LOST OR STOLEN DEVICES

Protect Your Enterprise - Check Point SandBlast Mobile