Skip navigation
All Places > Mobile Security

SandBlast Mobile

Log in to follow, share, and participate in this community.

Recent Activity

Rui Meleiro
1. A new user is created on Checkpoint Sandblast Mobile Dashboard2. Its two factor authentication method is configured3. A QR Code with the activation key to Google Authenticator is shown4. That QR Code is scanned on the Google Authenticator app5. The Google Authenticator app issues temporary codes for the Checkpoint Sandblast Mobile login.   Now… (Show more)
in SandBlast Mobile
Phillip Woon
Currently Supported:   Airwatch MobileIron Core BlackBerry Enterprise Server IBM Maas360 Good Dynamics (or BlackBerry Dynamics as its now called)   Support pending:   MS Intune Citrix ZenMobile   If you have a customer what really wants to buy the best mobile security on the market (ours of course) but needs to deploy with an MDM not… (Show more)
in SandBlast Mobile
Yuval Sered
If you have a customer or a partner that is interested in integrating the information about mobile device risk on their network as analysed by the SBM  solution:  For example if a device is High/medium risk you want the user to be disabled from access the wifi network/application until the device is cleared from risk. You can use REST API from…
in SandBlast Mobile
Daniel Dor
"Mobile malware risks are surging in India. For example, about 40 percent of all the attacks involving Xafecopy mobile device malware, which impacted 47 countries, were targeted at the nation, according to a study by Kaspersky Labs The malware, which targets the WAP [Wireless Application Protocol] billing payment method, steals money through… (Show more)
in SandBlast Mobile
Daniel Dor
The IoT cybersecurity firm, Armis, has revealed eight vulnerabilities in the implementation of Bluetooth in several operating systems, including Android, Windows, Linux, and iOS, successful exploitation of which could allow hackers to take complete control of a device. Indeed, these are the most severe vulnerabilities found in Bluetooth in recent… (Show more)
in SandBlast Mobile
Daniel Dor
Do you want to learn more on SandBlast Mobile? All you need to do is to go to the relevant Sales Enablement page on the PartnerMAP and start learning! Go to https://usercenter.checkpoint.com/ Go to homepage (click on the “partner Map” in the upper part”) -> click on "find it fast" Click on Sales Enablement Click on Mobile Security Click on… (Show more)
in SandBlast Mobile
Pamela S. Lee
Cyberattacks have evolved beyond the enterprise perimeter, breaching mobile environments; yet only one percent of enterprises have deployed mobile security technologies. Microsoft Intune has teamed up with Check Point SandBlast Mobile to secure enterprise mobility, enabling you to secure business data and protect from advanced mobile threats… (Show more)
in SandBlast Mobile
Daniel Dor
Cyber attacks have evolved beyond the enterprise perimeter, breaching mobile environments; yet only one percent of enterprises have deployed mobile security technologies.  Microsoft Intune has teamed with Check Point SandBlast Mobile to secure enterprise mobility, enabling you to secure business data and protect from advanced mobile threats… (Show more)
in SandBlast Mobile
Daniel Dor
Did you ever want to test whether one of your employees installed a malicious mobile application on his device despite of the fact he has MDM installed?   Now you can! The only thing you need to do is to send us the list of applications from your MDM.   The data collection and analysis process includes several phases. In phase 1, the full… (Show more)
in SandBlast Mobile
Ian Flood
Has anyone got MS Intune and Sandblast mobile working correctly? My setup seems to be properly setup but once Sandblast is installed on my iOS devices, they will report as non compliant in intune. In the company portal app, it reports that the device does not meet  a mobile policy and to open sandblast to resolve the issue but when sandblast app… (Show more)
in SandBlast Mobile
Load more items