Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor

Secure SSL VPN Access For Mobile Users

Check Point : 26 October, 2010  (New Product)
The Mobile Access Software Blade from Check Point delivers secure corporate data access for remote mobile users via secure VPN
Check Point Software Technologies has announced its new Mobile Access Software Blade that delivers fast and secure access to corporate email, data and business applications from mobile devices. The new blade integrates advanced SSL VPN capabilities and encryption technology to protect against security threats as users remotely connect to the corporate network. As part of the solution, users can download the Check Point Mobile application for secure, one-touch access directly from mobile devices running on Apple, Android, Symbian and Windows PC platforms.

"With more users connecting remotely than ever before, mobile computing presents an ongoing security challenge for organizations that want to protect company data and resources, while providing employees with access to the network anytime, anywhere," said Dorit Dor, vice president of products at Check Point Software Technologies. "Our approach is to simplify mobile security for businesses and their employees. Users can go to the Apple app store and download the free Check Point Mobile application, enter their login and password, and instantly gain secure access to their corporate data. It's as simple as downloading a game."

The new Mobile Access Software Blade provides users with an intuitive business portal that allows secure connectivity to their intranet, corporate email and web applications. With certificate-based authentication and smart user-device pairing, businesses can ensure each individual has access to their authorized applications, just as they would from their desktop. This comprehensive approach helps IT administrators centrally manage security policies and applications, while end-users benefit from fast, secure access with single sign-on authorization.

"The CIOs we talk with struggle to keep up with all the devices their employees bring into the corporate network," said Rufus Connell, vice president at Frost & Sullivan. "With Check Point's new solution, we think you may see companies stop certifying individual devices themselves and deploy the Software Blade Architecture to eliminate the complexities of delivering security for mobile devices on their networks."

Check Point's Software Blade Architecture simplifies security for businesses by enabling customers to deploy the Mobile Access Software Blade, or any of the other 30 software blades, on their current security gateway in minutes. Organizations can leverage their existing infrastructure without requiring additional hardware or management.

Key features and benefits of the Mobile Access Software Blade:

• Check Point Mobile application provides one-touch access to corporate email, intranet and business applications
• Strong authentication and device pairing with the end-user protects mobile data and allows users to access pre-authorized mobile applications
• Intuitive, customizable interface offers users easy access to applications with a single-sign-on
• Centralized management and provisioning delivers ease of administration, policy configuration and reporting

"As a supplier of mobile data protection for over ten years, we are committed to delivering innovative security solutions that enable users to embrace new devices and technologies to do business. We are giving service providers, enterprises and end-users the confidence that they can access mobile data simply and securely," concluded Dor.
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo