SHARE
Facebook X Pinterest WhatsApp

Check Point Software Rises to Mobile Security Challenge

Five Tips for Overcoming Mobile Security Challenges Securing mobile computing applications and devices has been a major challenge for IT environments in terms of both time and expense. Looking to bring mobile computing back into the larger enterprise security fold, Check Point Software today introduced a mobile security offering that can be centrally managed from […]

Written By
MV
Mike Vizard
Oct 28, 2014
Slide Show

Five Tips for Overcoming Mobile Security Challenges

Securing mobile computing applications and devices has been a major challenge for IT environments in terms of both time and expense. Looking to bring mobile computing back into the larger enterprise security fold, Check Point Software today introduced a mobile security offering that can be centrally managed from an existing Check Point security management console.

Juliette Rizkallah, vice president of global marketing for Check Point Software, says Check Point Capsule works by first encapsulating an application and then applying governance policies to any file or document within that application. In effect, that enables IT organizations to apply the same security policies they use on traditional desktop applications to mobile computing environments, says Rizkallah.

Those rules, adds Rizkallah, can be extended to the device that an end user shares those documents with because all the files within the Check Point Capsule environment are encrypted.

Smartphone

Check Point Capsule also provides the ability to scan all traffic coming from iOS, Android, Windows and MacOS devices in the cloud to prevent malicious files and code from infecting the rest of the enterprise.

Regardless of who actually owns them, mobile devices have become a major security headache for IT organizations. To address that issue, many of them have invested in additional mobile security products that come complete with their own console. In effect, Check Point is now moving to reunify security management by making it possible to apply a consistent set of rules to all the applications and devices, which exists throughout the extended enterprise from within the confines of a single management console.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Observability: Why It’s a Red Hot Tech Term
Tom Taulli
Jul 19, 2022
Top GRC Platforms & Tools in 2022
Jira vs. ServiceNow: Features, Pricing, and Comparison
Surajdeep Singh
Jun 17, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.