<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: The mobile apps risk assessment report in Mobile</title>
    <link>https://community.checkpoint.com/t5/Mobile/The-mobile-apps-risk-assessment-report/m-p/5920#M53</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the information &lt;A href="https://community.checkpoint.com/migrated-users/43278"&gt;Daniel Dor&lt;/A&gt;‌, the application requires an "invitation code" to submit applications. Is this something you can provide or should we request this via our local&amp;nbsp;Check Point&amp;nbsp;account manager?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 19 Apr 2018 14:02:49 GMT</pubDate>
    <dc:creator>Javier_Fdez-San</dc:creator>
    <dc:date>2018-04-19T14:02:49Z</dc:date>
    <item>
      <title>The mobile apps risk assessment report</title>
      <link>https://community.checkpoint.com/t5/Mobile/The-mobile-apps-risk-assessment-report/m-p/5917#M50</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;Did you ever want to&amp;nbsp;test whether one of your employees installed a malicious mobile application on his device despite of the fact he has MDM installed?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;Now you can! The only thing you need to do is to send us &lt;SPAN style="color: #0000ff;"&gt;the list of applications from your MDM.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;The data collection and analysis process includes several phases. In phase 1, the full applications list is extracted from the enterprise MDM. This list includes the application package name and Operation System type. In phase 2, the list of applications is compared to the Check Point’s mobile security database in order to decide what risk factors imposed on each application. In phase 3, the engine rank each application with it’s threat family. In phase 4, Check Point’s Mobile Apps Risk Assessment engine conducts a quantitative analysis of the raw data, and produce descriptive statistics results. In phase 5, intelligence insights are added to the report using the Mobile Security Advanced Research Team. In phase 6, the final report is produced.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;For more info, ping me here or go directly to the submission website (&lt;A href="https://www.checkitapp.cloud/" title="https://www.checkitapp.cloud/"&gt;check-it-app&lt;/A&gt;&amp;nbsp;).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;D&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Sep 2017 11:22:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Mobile/The-mobile-apps-risk-assessment-report/m-p/5917#M50</guid>
      <dc:creator>Daniel_Dor</dc:creator>
      <dc:date>2017-09-03T11:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: The mobile apps risk assessment report</title>
      <link>https://community.checkpoint.com/t5/Mobile/The-mobile-apps-risk-assessment-report/m-p/5918#M51</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;This is cool&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Sep 2017 15:19:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Mobile/The-mobile-apps-risk-assessment-report/m-p/5918#M51</guid>
      <dc:creator>Moti</dc:creator>
      <dc:date>2017-09-04T15:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: The mobile apps risk assessment report</title>
      <link>https://community.checkpoint.com/t5/Mobile/The-mobile-apps-risk-assessment-report/m-p/5919#M52</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ability to check links received via check-it-app is also a nice feature.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Sep 2017 19:02:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Mobile/The-mobile-apps-risk-assessment-report/m-p/5919#M52</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-09-04T19:02:09Z</dc:date>
    </item>
    <item>
      <title>Re: The mobile apps risk assessment report</title>
      <link>https://community.checkpoint.com/t5/Mobile/The-mobile-apps-risk-assessment-report/m-p/5920#M53</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the information &lt;A href="https://community.checkpoint.com/migrated-users/43278"&gt;Daniel Dor&lt;/A&gt;‌, the application requires an "invitation code" to submit applications. Is this something you can provide or should we request this via our local&amp;nbsp;Check Point&amp;nbsp;account manager?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Apr 2018 14:02:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Mobile/The-mobile-apps-risk-assessment-report/m-p/5920#M53</guid>
      <dc:creator>Javier_Fdez-San</dc:creator>
      <dc:date>2018-04-19T14:02:49Z</dc:date>
    </item>
    <item>
      <title>Re: The mobile apps risk assessment report</title>
      <link>https://community.checkpoint.com/t5/Mobile/The-mobile-apps-risk-assessment-report/m-p/5921#M54</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Javier,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's the email of the Check Point sales rep that invited you &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you don't have one, let me know and I will assist &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;D&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent securely from my Android&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Apr 2018 03:26:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Mobile/The-mobile-apps-risk-assessment-report/m-p/5921#M54</guid>
      <dc:creator>Daniel_Dor</dc:creator>
      <dc:date>2018-04-20T03:26:17Z</dc:date>
    </item>
    <item>
      <title>Re: The mobile apps risk assessment report</title>
      <link>https://community.checkpoint.com/t5/Mobile/The-mobile-apps-risk-assessment-report/m-p/5922#M55</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Daniel, thanks, I have obtained one and will use it to give it a try.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Apr 2018 15:21:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Mobile/The-mobile-apps-risk-assessment-report/m-p/5922#M55</guid>
      <dc:creator>Javier_Fdez-San</dc:creator>
      <dc:date>2018-04-20T15:21:56Z</dc:date>
    </item>
  </channel>
</rss>

