<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SandBlast Mobile Architecture Overview in Mobile</title>
    <link>https://community.checkpoint.com/t5/Mobile/SandBlast-Mobile-Architecture-Overview/m-p/40322#M215</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H2&gt;What is SandBlast Mobile?&lt;/H2&gt;&lt;P style="margin-bottom: 7.15pt; background: white;"&gt;&lt;SPAN style="color: #333333;"&gt;Check Point SandBlast Mobile 3.0 is the most complete mobile security solution&amp;nbsp;designed to prevent emerging fifth generation cyber attacks and to allow workers to safely conduct business. Its technology protects against&amp;nbsp;threats&amp;nbsp;to the OS, apps, and network,&amp;nbsp;scoring the industry’s highest threat catch rate&amp;nbsp;without impacting performance or user experience. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: 7.15pt; background: white;"&gt;&lt;SPAN style="color: #333333;"&gt;Only SandBlast Mobile 3.0 delivers threat prevention technology that:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="color: #333333;"&gt; &lt;/SPAN&gt;&lt;SPAN style="color: #333333;"&gt;Performs advanced app analysis to detect known and unknown threats&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333;"&gt;Prevents man-in-the-middle attacks on both cellular and WiFi networks&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333;"&gt;Blocks phishing attacks on all apps: email, messaging, social media&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333;"&gt;Prevents infected devices from sending sensitive data to botnets&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333;"&gt;Blocks infected devices from accessing corporate applications and data&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333;"&gt;Mitigates threats without relying on user action or mobile management platforms&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333;"&gt;SandBlast Mobile 3.0&amp;nbsp;&lt;/SPAN&gt;uses a variety of patent-pending algorithms and detection techniques to identify mobile device risks, and triggers appropriate defense responses that protect business and personal data.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SandBlast Mobile solution (“the Solution”) includes the following components:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;SandBlast Mobile Behavioral Risk Engine (“the Engine”)&lt;/LI&gt;&lt;LI&gt;SandBlast Mobile Gateway (“the Gateway”)&lt;/LI&gt;&lt;LI&gt;SandBlast Mobile Management Dashboard (“the Dashboard”)&lt;/LI&gt;&lt;LI&gt;SandBlast Mobile Protect app (“the App”) for iOS and Android&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When used in conjunction with a Unified Endpoint Management (UEM) solution, the SandBlast Mobile Solution provides integral risk assessment of the device to which the&amp;nbsp;UEM can use to quarantine or enforce a set of policies that are in effect until the device is no longer at risk. Such policy enforcement could be to disable certain capabilities of a device, such as blocking access to corporate assets, such as email, internal websites, etc., thus, providing protection of the corporation’s network and data from mobile based threats.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;Solution Overview&lt;/H2&gt;&lt;P&gt;&lt;IMG __jive_id="68878" alt="" class="image-1 jive-image" height="458" src="/legacyfs/online/checkpoint/68878_Solution Architecture.png" width="1127" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE style="border: none; width: 1162px;"&gt;&lt;THEAD&gt;&lt;TR&gt;&lt;TD style="border-width: 1pt 1pt 3pt; border-style: solid; border-color: white; border-image: initial; background: #e45785; padding: 0in 5.4pt; width: 22px;"&gt;&lt;P&gt;&lt;SPAN style="color: white; font-size: 10.0pt;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: 1pt solid white; border-left: none; border-bottom: 3pt solid white; border-right: 1pt solid white; background: #e45785; padding: 0in 5.4pt; width: 207px;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&lt;STRONG&gt;Component&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: 1pt solid white; border-left: none; border-bottom: 3pt solid white; border-right: 1pt solid white; background: #e45785; padding: 0in 5.4pt; width: 888px;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="border-right: 1pt solid white; border-bottom: 1pt solid white; border-left: 1pt solid white; border-image: initial; border-top: none; background: #f1abc2; padding: 0in 5.4pt; width: 22px; text-align: center;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;1&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f1abc2; padding: 0in 5.4pt; width: 207px;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;SandBlast Mobile Protect app&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f1abc2; padding: 0in 5.4pt; width: 888px;"&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The SandBlast Mobile Protect app is a lightweight app for iOS&lt;SUP&gt;®&lt;/SUP&gt; and Android™ that gathers data and helps analyze threats to devices in an Enterprise environment. It monitors operating systems and information about apps and network connections and provides data to the Solution which it uses to identify suspicious or malicious behavior.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;To protect user privacy, the App examines critical risk indicators found in the anonymized data it collects. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The App performs some analysis on the device while resource-intensive analysis is performed in the cloud. This approach minimizes impact on device performance and battery life without changing the end-user experience.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-right: 1pt solid white; border-bottom: 1pt solid white; border-left: 1pt solid white; border-image: initial; border-top: none; background: #f8d5e0; padding: 0in 5.4pt; width: 22px; text-align: center;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;2&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f8d5e0; padding: 0in 5.4pt; width: 207px;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;UEM&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f8d5e0; padding: 0in 5.4pt; width: 888px;"&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Unified Endpoint Management (generalized term replacing MDM/EMM)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Device Management and Policy Enforcement System.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-right: 1pt solid white; border-bottom: 1pt solid white; border-left: 1pt solid white; border-image: initial; border-top: none; background: #f1abc2; padding: 0in 5.4pt; width: 22px; text-align: center;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;3&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f1abc2; padding: 0in 5.4pt; width: 207px;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;SandBlast Mobile&amp;nbsp; Gateway&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f1abc2; padding: 0in 5.4pt; width: 888px;"&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The cloud-based SandBlast Mobile Gateway is a multi-tenant architecture to which mobile devices are registered. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The Gateway handles all Solution communications with enrolled mobile devices and with the customer’s (“organization’s”) Dashboard instance.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-right: 1pt solid white; border-bottom: 1pt solid white; border-left: 1pt solid white; border-image: initial; border-top: none; background: #f8d5e0; padding: 0in 5.4pt; width: 22px; text-align: center;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;4&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f8d5e0; padding: 0in 5.4pt; width: 207px;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Management Dashboard&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f8d5e0; padding: 0in 5.4pt; width: 888px;"&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The cloud-based web-GUI SandBlast Mobile Management Dashboard enables administration, provisioning, and monitoring of devices and policies and is configured as a per-customer instance.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The Dashboard can be integrated with an existing Unified Endpoint Management (UEM) solution for automated policy enforcement on devices at risk. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;When using this integration, the&amp;nbsp;UEM serves as a repository with which the Dashboard syncs enrolled devices and identities.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-right: 1pt solid white; border-bottom: 1pt solid white; border-left: 1pt solid white; border-image: initial; border-top: none; background: #f1abc2; padding: 0in 5.4pt; width: 22px; text-align: center;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;5&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f1abc2; padding: 0in 5.4pt; width: 207px;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Behavioral Risk Engine&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f1abc2; padding: 0in 5.4pt; width: 888px;"&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The cloud-based SandBlast Mobile Behavioral Risk Engine uses data it receives from the App about network, configuration, and operating system integrity data, and information about installed apps to perform in-depth mobile threat analysis. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The Engine uses this data to detect and analyze suspicious activity, and produces a risk score based on the threat type and severity.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The risk score determines if and what automatic mitigation action is needed to keep a device and its data protected.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;No Personal Information is processed by or stored in the Engine.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Related Content: View our lightboard session about the &lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6607-check-point-lightboard-series-sandblast-mobile-architecture"&gt;SandBlast Mobile Architecture&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 15 Aug 2018 00:03:29 GMT</pubDate>
    <dc:creator>Pamela_S__Lee</dc:creator>
    <dc:date>2018-08-15T00:03:29Z</dc:date>
    <item>
      <title>SandBlast Mobile Architecture Overview</title>
      <link>https://community.checkpoint.com/t5/Mobile/SandBlast-Mobile-Architecture-Overview/m-p/40322#M215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H2&gt;What is SandBlast Mobile?&lt;/H2&gt;&lt;P style="margin-bottom: 7.15pt; background: white;"&gt;&lt;SPAN style="color: #333333;"&gt;Check Point SandBlast Mobile 3.0 is the most complete mobile security solution&amp;nbsp;designed to prevent emerging fifth generation cyber attacks and to allow workers to safely conduct business. Its technology protects against&amp;nbsp;threats&amp;nbsp;to the OS, apps, and network,&amp;nbsp;scoring the industry’s highest threat catch rate&amp;nbsp;without impacting performance or user experience. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: 7.15pt; background: white;"&gt;&lt;SPAN style="color: #333333;"&gt;Only SandBlast Mobile 3.0 delivers threat prevention technology that:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="color: #333333;"&gt; &lt;/SPAN&gt;&lt;SPAN style="color: #333333;"&gt;Performs advanced app analysis to detect known and unknown threats&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333;"&gt;Prevents man-in-the-middle attacks on both cellular and WiFi networks&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333;"&gt;Blocks phishing attacks on all apps: email, messaging, social media&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333;"&gt;Prevents infected devices from sending sensitive data to botnets&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333;"&gt;Blocks infected devices from accessing corporate applications and data&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333;"&gt;Mitigates threats without relying on user action or mobile management platforms&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333;"&gt;SandBlast Mobile 3.0&amp;nbsp;&lt;/SPAN&gt;uses a variety of patent-pending algorithms and detection techniques to identify mobile device risks, and triggers appropriate defense responses that protect business and personal data.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SandBlast Mobile solution (“the Solution”) includes the following components:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;SandBlast Mobile Behavioral Risk Engine (“the Engine”)&lt;/LI&gt;&lt;LI&gt;SandBlast Mobile Gateway (“the Gateway”)&lt;/LI&gt;&lt;LI&gt;SandBlast Mobile Management Dashboard (“the Dashboard”)&lt;/LI&gt;&lt;LI&gt;SandBlast Mobile Protect app (“the App”) for iOS and Android&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When used in conjunction with a Unified Endpoint Management (UEM) solution, the SandBlast Mobile Solution provides integral risk assessment of the device to which the&amp;nbsp;UEM can use to quarantine or enforce a set of policies that are in effect until the device is no longer at risk. Such policy enforcement could be to disable certain capabilities of a device, such as blocking access to corporate assets, such as email, internal websites, etc., thus, providing protection of the corporation’s network and data from mobile based threats.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;Solution Overview&lt;/H2&gt;&lt;P&gt;&lt;IMG __jive_id="68878" alt="" class="image-1 jive-image" height="458" src="/legacyfs/online/checkpoint/68878_Solution Architecture.png" width="1127" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE style="border: none; width: 1162px;"&gt;&lt;THEAD&gt;&lt;TR&gt;&lt;TD style="border-width: 1pt 1pt 3pt; border-style: solid; border-color: white; border-image: initial; background: #e45785; padding: 0in 5.4pt; width: 22px;"&gt;&lt;P&gt;&lt;SPAN style="color: white; font-size: 10.0pt;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: 1pt solid white; border-left: none; border-bottom: 3pt solid white; border-right: 1pt solid white; background: #e45785; padding: 0in 5.4pt; width: 207px;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&lt;STRONG&gt;Component&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: 1pt solid white; border-left: none; border-bottom: 3pt solid white; border-right: 1pt solid white; background: #e45785; padding: 0in 5.4pt; width: 888px;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="border-right: 1pt solid white; border-bottom: 1pt solid white; border-left: 1pt solid white; border-image: initial; border-top: none; background: #f1abc2; padding: 0in 5.4pt; width: 22px; text-align: center;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;1&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f1abc2; padding: 0in 5.4pt; width: 207px;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;SandBlast Mobile Protect app&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f1abc2; padding: 0in 5.4pt; width: 888px;"&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The SandBlast Mobile Protect app is a lightweight app for iOS&lt;SUP&gt;®&lt;/SUP&gt; and Android™ that gathers data and helps analyze threats to devices in an Enterprise environment. It monitors operating systems and information about apps and network connections and provides data to the Solution which it uses to identify suspicious or malicious behavior.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;To protect user privacy, the App examines critical risk indicators found in the anonymized data it collects. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The App performs some analysis on the device while resource-intensive analysis is performed in the cloud. This approach minimizes impact on device performance and battery life without changing the end-user experience.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-right: 1pt solid white; border-bottom: 1pt solid white; border-left: 1pt solid white; border-image: initial; border-top: none; background: #f8d5e0; padding: 0in 5.4pt; width: 22px; text-align: center;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;2&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f8d5e0; padding: 0in 5.4pt; width: 207px;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;UEM&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f8d5e0; padding: 0in 5.4pt; width: 888px;"&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Unified Endpoint Management (generalized term replacing MDM/EMM)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Device Management and Policy Enforcement System.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-right: 1pt solid white; border-bottom: 1pt solid white; border-left: 1pt solid white; border-image: initial; border-top: none; background: #f1abc2; padding: 0in 5.4pt; width: 22px; text-align: center;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;3&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f1abc2; padding: 0in 5.4pt; width: 207px;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;SandBlast Mobile&amp;nbsp; Gateway&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f1abc2; padding: 0in 5.4pt; width: 888px;"&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The cloud-based SandBlast Mobile Gateway is a multi-tenant architecture to which mobile devices are registered. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The Gateway handles all Solution communications with enrolled mobile devices and with the customer’s (“organization’s”) Dashboard instance.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-right: 1pt solid white; border-bottom: 1pt solid white; border-left: 1pt solid white; border-image: initial; border-top: none; background: #f8d5e0; padding: 0in 5.4pt; width: 22px; text-align: center;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;4&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f8d5e0; padding: 0in 5.4pt; width: 207px;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Management Dashboard&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f8d5e0; padding: 0in 5.4pt; width: 888px;"&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The cloud-based web-GUI SandBlast Mobile Management Dashboard enables administration, provisioning, and monitoring of devices and policies and is configured as a per-customer instance.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The Dashboard can be integrated with an existing Unified Endpoint Management (UEM) solution for automated policy enforcement on devices at risk. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;When using this integration, the&amp;nbsp;UEM serves as a repository with which the Dashboard syncs enrolled devices and identities.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-right: 1pt solid white; border-bottom: 1pt solid white; border-left: 1pt solid white; border-image: initial; border-top: none; background: #f1abc2; padding: 0in 5.4pt; width: 22px; text-align: center;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;5&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f1abc2; padding: 0in 5.4pt; width: 207px;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Behavioral Risk Engine&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: 1pt solid white; border-right: 1pt solid white; background: #f1abc2; padding: 0in 5.4pt; width: 888px;"&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The cloud-based SandBlast Mobile Behavioral Risk Engine uses data it receives from the App about network, configuration, and operating system integrity data, and information about installed apps to perform in-depth mobile threat analysis. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The Engine uses this data to detect and analyze suspicious activity, and produces a risk score based on the threat type and severity.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;The risk score determines if and what automatic mitigation action is needed to keep a device and its data protected.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;No Personal Information is processed by or stored in the Engine.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Related Content: View our lightboard session about the &lt;A _jive_internal="true" href="https://community.checkpoint.com/videos/6607-check-point-lightboard-series-sandblast-mobile-architecture"&gt;SandBlast Mobile Architecture&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2018 00:03:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Mobile/SandBlast-Mobile-Architecture-Overview/m-p/40322#M215</guid>
      <dc:creator>Pamela_S__Lee</dc:creator>
      <dc:date>2018-08-15T00:03:29Z</dc:date>
    </item>
  </channel>
</rss>

