Skip navigation
All Places > Mobile Security

SandBlast Mobile

Log in to follow, share, and participate in this community.

Recent Activity

Ian Flood
Please can you advise, where I can get an updated ipa file for the new version of Sandblast Mobile Enterprise client v2.70.3713? so I can update my Intune portal.   Previously this was sent to me via email.   Thanks
in SandBlast Mobile
Rui Meleiro
1. A new user is created on Checkpoint Sandblast Mobile Dashboard2. Its two factor authentication method is configured3. A QR Code with the activation key to Google Authenticator is shown4. That QR Code is scanned on the Google Authenticator app5. The Google Authenticator app issues temporary codes for the Checkpoint Sandblast Mobile login.   Now… (Show more)
in SandBlast Mobile
Phillip Woon
Short demo on how SS7 vulnerabilities can be exploited in order to re-route and record cell phone conversations.
Video preview image▶︎
in SandBlast Mobile
Daniel Dor
Hi,   These are answers for few Frequently Asked Questions about Capsule Workspace:   Question Answer Can Capsule Workspace (CWS) provide root detection/jailbreak? Yes Does CWS provide Encrypted end-to-end communication (HTTPS connections) and certificate pinning to communicate with BYOD solution servers? Yes Does CWS provide Strong Encryption of… (Show more)
in SandBlast Mobile
Jony Fischbein
Cyber Security is all about connecting the dots. So much information out there that connecting all the ONE and ZEROS into meaningfull actionalbe data is a complex challange.  Thats where Check Point infinity excels by mitigating UNKNOWN Cyber Threats across Networks, Mobile devices & Cloud. This prevention is demonstrated within minutes.    … (Show more)
Yuval Sered
If you have a customer or a partner that is interested in integrating the information about mobile device risk on their network as analysed by the SBM  solution:  For example if a device is High/medium risk you want the user to be disabled from access the wifi network/application until the device is cleared from risk. You can use REST API from…
in SandBlast Mobile
Phillip Woon
Currently Supported:   Airwatch MobileIron Core BlackBerry Enterprise Server IBM Maas360 Good Dynamics (or BlackBerry Dynamics as its now called)   Support pending:   MS Intune Citrix ZenMobile   If you have a customer what really wants to buy the best mobile security on the market (ours of course) but needs to deploy with an MDM not… (Show more)
in SandBlast Mobile
Daniel Dor
"Mobile malware risks are surging in India. For example, about 40 percent of all the attacks involving Xafecopy mobile device malware, which impacted 47 countries, were targeted at the nation, according to a study by Kaspersky Labs The malware, which targets the WAP [Wireless Application Protocol] billing payment method, steals money through… (Show more)
in SandBlast Mobile
Daniel Dor
The IoT cybersecurity firm, Armis, has revealed eight vulnerabilities in the implementation of Bluetooth in several operating systems, including Android, Windows, Linux, and iOS, successful exploitation of which could allow hackers to take complete control of a device. Indeed, these are the most severe vulnerabilities found in Bluetooth in recent… (Show more)
in SandBlast Mobile
Daniel Dor
Do you want to learn more on SandBlast Mobile? All you need to do is to go to the relevant Sales Enablement page on the PartnerMAP and start learning! Go to https://usercenter.checkpoint.com/ Go to homepage (click on the “partner Map” in the upper part”) -> click on "find it fast" Click on Sales Enablement Click on Mobile Security Click on… (Show more)
in SandBlast Mobile
Load more items