<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The 4 building blocks of Mobile Security in Mobile</title>
    <link>https://community.checkpoint.com/t5/Mobile/The-4-building-blocks-of-Mobile-Security/m-p/3257#M8</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #1f497d;"&gt;&lt;SPAN style="color: #1f497d;"&gt;I was recently asked by a prospect from the financial sector the following question:&lt;/SPAN&gt; &lt;SPAN style="color: #2873ee;"&gt;"how should I secure my corporate network from the mobile threats landscape".&lt;/SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #303030; font-family: calibri, verdana, arial, sans-serif;"&gt;To answer this question, we first described the 4 Building blocks of Mobile Security:&lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;OL style="list-style-type: lower-alpha;"&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #303030;"&gt;&lt;STRONG&gt;Building Block 1 - MDM&lt;/STRONG&gt; – This component is crucial for policy enforcement, but it doesn’t protect from 4 vectors of attacks: (a) Infected apps (b) Network attacks (c) OS Exploits (4) SMS Phishing – &lt;STRONG&gt;Check Point doesn’t have MDM solution, but SandBlast Mobile (SBM) do have out-of-the-box integration with: (1) MobileIron (2) AirWatch (3) MaaS360 (4) BES. The combination between one of these MDMs and SandBlast Mobile delivers both Devices management and Security.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #303030;"&gt;&lt;STRONG&gt;Building Block 2 – A Container &lt;/STRONG&gt;– The secure container will enable you to work in a secure environment, but it can be bypassed (This &lt;SPAN style="text-decoration: underline; color: #3334ca;"&gt;&lt;A href="https://www.youtube.com/watch?v=pXdGjDgpq0U"&gt;&lt;SPAN style="color: #3334ca; text-decoration: underline;"&gt;video&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt; explains how bypassing is being done) – &lt;STRONG&gt;Check Point sell the Capsule Workspace solution for this need, and also integrate with Good Container and other MDM containers.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #303030;"&gt;&lt;STRONG&gt;Building Block 3 – &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;Detection of &lt;/STRONG&gt;AV \ App reputation –&lt;/STRONG&gt; This enables the detection of known threats – &lt;STRONG&gt;This is being done by &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; solution. &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #303030;"&gt;&lt;STRONG&gt;Building Block 4 –&lt;/STRONG&gt; &lt;STRONG&gt;Detection of Unknown Threats and Zero Day&lt;/STRONG&gt; – which assist you to handle unknown threats and zero day attacks – &lt;STRONG&gt;This is being done by our &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; solution. &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #303030;"&gt;Then, we explored few options to deploy these building blocks: &lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;OL style="list-style-type: lower-alpha;"&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #303030;"&gt;&lt;STRONG&gt;1&lt;SUP&gt;st&lt;/SUP&gt; option – SandBlast Mobile in a standalone mode&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #303030;"&gt;&lt;STRONG&gt;2&lt;SUP&gt;nd&lt;/SUP&gt; option – &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; &amp;amp; MDM&lt;/STRONG&gt;– In such case &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; will detect threats and will send API call to the MDM so the MDM can change the policy of the infected device.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #303030;"&gt;&lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 12pt;"&gt;3&lt;SUP&gt;rd&lt;/SUP&gt; Option – &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; &amp;amp; 3rd Party Container&lt;/STRONG&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif;"&gt;– In such case &lt;/SPAN&gt;&lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; &lt;SPAN style="font-family: calibri, verdana, arial, sans-serif;"&gt;will detect threats and will tell the 3rd party &lt;SPAN style="font-size: 16px;"&gt;container&lt;/SPAN&gt; to disconnect whenever there is a threat on the device.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #303030;"&gt;&lt;STRONG&gt;4&lt;SUP&gt;th&lt;/SUP&gt; Option – &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; &amp;amp; Capsule Wokrspace&lt;/STRONG&gt; – In such case &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; will detect threats and will tell Capsule Workspace to disconnect whenever there is a threat on the device.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #303030;"&gt;Each one of the above options has it's own pros and cons, and fits for different status. In this case, the financial institute decided to implement &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;&lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; &amp;amp; Capsule Wokrspace to his BYOD environment. &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 10 May 2017 12:29:27 GMT</pubDate>
    <dc:creator>Daniel_Dor</dc:creator>
    <dc:date>2017-05-10T12:29:27Z</dc:date>
    <item>
      <title>The 4 building blocks of Mobile Security</title>
      <link>https://community.checkpoint.com/t5/Mobile/The-4-building-blocks-of-Mobile-Security/m-p/3257#M8</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #1f497d;"&gt;&lt;SPAN style="color: #1f497d;"&gt;I was recently asked by a prospect from the financial sector the following question:&lt;/SPAN&gt; &lt;SPAN style="color: #2873ee;"&gt;"how should I secure my corporate network from the mobile threats landscape".&lt;/SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #303030; font-family: calibri, verdana, arial, sans-serif;"&gt;To answer this question, we first described the 4 Building blocks of Mobile Security:&lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;OL style="list-style-type: lower-alpha;"&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #303030;"&gt;&lt;STRONG&gt;Building Block 1 - MDM&lt;/STRONG&gt; – This component is crucial for policy enforcement, but it doesn’t protect from 4 vectors of attacks: (a) Infected apps (b) Network attacks (c) OS Exploits (4) SMS Phishing – &lt;STRONG&gt;Check Point doesn’t have MDM solution, but SandBlast Mobile (SBM) do have out-of-the-box integration with: (1) MobileIron (2) AirWatch (3) MaaS360 (4) BES. The combination between one of these MDMs and SandBlast Mobile delivers both Devices management and Security.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #303030;"&gt;&lt;STRONG&gt;Building Block 2 – A Container &lt;/STRONG&gt;– The secure container will enable you to work in a secure environment, but it can be bypassed (This &lt;SPAN style="text-decoration: underline; color: #3334ca;"&gt;&lt;A href="https://www.youtube.com/watch?v=pXdGjDgpq0U"&gt;&lt;SPAN style="color: #3334ca; text-decoration: underline;"&gt;video&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt; explains how bypassing is being done) – &lt;STRONG&gt;Check Point sell the Capsule Workspace solution for this need, and also integrate with Good Container and other MDM containers.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #303030;"&gt;&lt;STRONG&gt;Building Block 3 – &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;Detection of &lt;/STRONG&gt;AV \ App reputation –&lt;/STRONG&gt; This enables the detection of known threats – &lt;STRONG&gt;This is being done by &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; solution. &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #303030;"&gt;&lt;STRONG&gt;Building Block 4 –&lt;/STRONG&gt; &lt;STRONG&gt;Detection of Unknown Threats and Zero Day&lt;/STRONG&gt; – which assist you to handle unknown threats and zero day attacks – &lt;STRONG&gt;This is being done by our &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; solution. &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #303030;"&gt;Then, we explored few options to deploy these building blocks: &lt;/SPAN&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;OL style="list-style-type: lower-alpha;"&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #303030;"&gt;&lt;STRONG&gt;1&lt;SUP&gt;st&lt;/SUP&gt; option – SandBlast Mobile in a standalone mode&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #303030;"&gt;&lt;STRONG&gt;2&lt;SUP&gt;nd&lt;/SUP&gt; option – &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; &amp;amp; MDM&lt;/STRONG&gt;– In such case &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; will detect threats and will send API call to the MDM so the MDM can change the policy of the infected device.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #303030;"&gt;&lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 12pt;"&gt;3&lt;SUP&gt;rd&lt;/SUP&gt; Option – &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; &amp;amp; 3rd Party Container&lt;/STRONG&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif;"&gt;– In such case &lt;/SPAN&gt;&lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; &lt;SPAN style="font-family: calibri, verdana, arial, sans-serif;"&gt;will detect threats and will tell the 3rd party &lt;SPAN style="font-size: 16px;"&gt;container&lt;/SPAN&gt; to disconnect whenever there is a threat on the device.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-family: calibri, verdana, arial, sans-serif; color: #303030;"&gt;&lt;STRONG&gt;4&lt;SUP&gt;th&lt;/SUP&gt; Option – &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; &amp;amp; Capsule Wokrspace&lt;/STRONG&gt; – In such case &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; will detect threats and will tell Capsule Workspace to disconnect whenever there is a threat on the device.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #303030;"&gt;Each one of the above options has it's own pros and cons, and fits for different status. In this case, the financial institute decided to implement &lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;&lt;STRONG style="color: #1f497d; font-family: calibri, verdana, arial, sans-serif; font-size: 16px;"&gt;SandBlast Mobile&lt;/STRONG&gt; &amp;amp; Capsule Wokrspace to his BYOD environment. &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 May 2017 12:29:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Mobile/The-4-building-blocks-of-Mobile-Security/m-p/3257#M8</guid>
      <dc:creator>Daniel_Dor</dc:creator>
      <dc:date>2017-05-10T12:29:27Z</dc:date>
    </item>
  </channel>
</rss>

