Skip navigation
All Places > Mobile Security

SandBlast Mobile

Log in to follow, share, and participate in this community.

Recent Activity

Niran Turgeman
Hi CheckMates, want to learn more about the Remote Code Execution Vulnerability on LG smartphones? Check out this TechTalk session with Neatsun Ziv and Jonathan Shimonovich and get familiar with all the details! Read the writeup here: Remote Code Execution Vulnerability on LG Smartphones - Check Point Research      More details: Remote Code… (Show more)
in SandBlast Mobile
Henri NGO
Hello everyone,   Did someone already configure sandblast with SCCM / Intune, for IOS devices ?   With a customer who uses your solution, we have done some duties on SCCM for IOS and Android devices, and it works correctly with Android, but not for IOS ...   We have seen that there is an XML data to enter, but what we met right now, is "no… (Show more)
in SandBlast Mobile
Rui Meleiro
1. A new user is created on Checkpoint Sandblast Mobile Dashboard2. Its two factor authentication method is configured3. A QR Code with the activation key to Google Authenticator is shown4. That QR Code is scanned on the Google Authenticator app5. The Google Authenticator app issues temporary codes for the Checkpoint Sandblast Mobile login.   Now… (Show more)
in SandBlast Mobile
Xavier Bensemhoun
Hi, I would like to know if a dedicated SandBlast Mobile dashboard app is planned? Off course we shouldn't have all information though such app than through the online dashboard but that could be a gain in efficiency/security. What do you think?
Ken Dickey
During a test, a client performed a MITM attack on a wireless network using ettercap. The Sandblast client did not detect the attack. Should Sandblast have seen the attack (Based on the MAC of the gateway changing)?
in SandBlast Mobile
Pamela S. Lee
In this video we will show you how integrating with Citrix XenMobile, SandBlast Mobile actively and dynamically adapts the policy and access privileges to instantly protect your Enterprise data and assets from known and unknown threats.   SandBlast Mobile is designed to help you secure mobile devices quickly and confidently through integration and…
Video preview image▶︎
in SandBlast Mobile
Javier Fdez-Sanguino
The Administration Guide mentions that device risk is based on the "accumulative" threat risks levels found on a device as well as the different settings. But it does not give any indication of how the calculation is actually accomplished. Will a device with several or many Medium risk applications be categorised as "High" risk? or will "High"… (Show more)
in SandBlast Mobile
Daniel Dor
Marcher, a banking malware, downloaded by thousands of users around the world directly from the Google Play Store in July 2016, targeted hundreds of the biggest financial services companies. It used overlay windows to steal bank account credentials, credit cards, and personal identifiable information.   Mobile applications need to be deployed out… (Show more)
in SandBlast Mobile
Daniel Dor
Did you ever want to test whether one of your employees installed a malicious mobile application on his device despite of the fact he has MDM installed?   Now you can! The only thing you need to do is to send us the list of applications from your MDM.   The data collection and analysis process includes several phases. In phase 1, the full… (Show more)
in SandBlast Mobile
Daniel Dor
I don't have MDM/EMM, and I would like to import a list of 35 devices to SandBlast Mobile Dashboard. How can I do that? Yuval Sered Oded Yarkoni Ricardo Panez
in SandBlast Mobile
Load more items