Securing mobile computing applications and devices has been a major challenge for IT environments in terms of both time and expense. Looking to bring mobile computing back into the larger enterprise security fold, Check Point Software today introduced a mobile security offering that can be centrally managed from an existing Check Point security management console.
Juliette Rizkallah, vice president of global marketing for Check Point Software, says Check Point Capsule works by first encapsulating an application and then applying governance policies to any file or document within that application. In effect, that enables IT organizations to apply the same security policies they use on traditional desktop applications to mobile computing environments, says Rizkallah.
Those rules, adds Rizkallah, can be extended to the device that an end user shares those documents with because all the files within the Check Point Capsule environment are encrypted.
Check Point Capsule also provides the ability to scan all traffic coming from iOS, Android, Windows and MacOS devices in the cloud to prevent malicious files and code from infecting the rest of the enterprise.
Regardless of who actually owns them, mobile devices have become a major security headache for IT organizations. To address that issue, many of them have invested in additional mobile security products that come complete with their own console. In effect, Check Point is now moving to reunify security management by making it possible to apply a consistent set of rules to all the applications and devices, which exists throughout the extended enterprise from within the confines of a single management console.