Skip navigation
All Places > Mobile Security

SandBlast Mobile

Log in to follow, share, and participate in this community.

Recent Activity

Daniel Dor
The IoT cybersecurity firm, Armis, has revealed eight vulnerabilities in the implementation of Bluetooth in several operating systems, including Android, Windows, Linux, and iOS, successful exploitation of which could allow hackers to take complete control of a device. Indeed, these are the most severe vulnerabilities found in Bluetooth in recent… (Show more)
in SandBlast Mobile
Daniel Dor
Do you want to learn more on SandBlast Mobile? All you need to do is to go to the relevant Sales Enablement page on the PartnerMAP and start learning! Go to https://usercenter.checkpoint.com/ Go to homepage (click on the “partner Map” in the upper part”) -> click on "find it fast" Click on Sales Enablement Click on Mobile Security Click on… (Show more)
in SandBlast Mobile
Pamela S. Lee
Cyberattacks have evolved beyond the enterprise perimeter, breaching mobile environments; yet only one percent of enterprises have deployed mobile security technologies. Microsoft Intune has teamed up with Check Point SandBlast Mobile to secure enterprise mobility, enabling you to secure business data and protect from advanced mobile threats… (Show more)
in SandBlast Mobile
Daniel Dor
Cyber attacks have evolved beyond the enterprise perimeter, breaching mobile environments; yet only one percent of enterprises have deployed mobile security technologies.  Microsoft Intune has teamed with Check Point SandBlast Mobile to secure enterprise mobility, enabling you to secure business data and protect from advanced mobile threats… (Show more)
in SandBlast Mobile
Daniel Dor
Did you ever want to test whether one of your employees installed a malicious mobile application on his device despite of the fact he has MDM installed?   Now you can! The only thing you need to do is to send us the list of applications from your MDM.   The data collection and analysis process includes several phases. In phase 1, the full… (Show more)
in SandBlast Mobile
Ian Flood
Has anyone got MS Intune and Sandblast mobile working correctly? My setup seems to be properly setup but once Sandblast is installed on my iOS devices, they will report as non compliant in intune. In the company portal app, it reports that the device does not meet  a mobile policy and to open sandblast to resolve the issue but when sandblast app… (Show more)
in SandBlast Mobile
Daniel Dor
Check Point researchers identified “CopyCat” mobile malware that infected 14 million Android devices. CopyCat malware earned roughly $1.5 million in fake ad revenue in just two months.   Read more here
in SandBlast Mobile
Daniel Dor
Chrysaor Malware was discovered recently by Google Security team. Can SandBlast Mobile detect Chrysaor Malware on Android?
in SandBlast Mobile
Daniel Dor
Is it possible to block certain users from connecting via Capsule Workspace if they are on an out-dated version?
in SandBlast Mobile
Load more items