Check Point Protect is not a full Mobile Device Management solution, there are features that require a Mobile Device Management Profile to function. If the device is already provisioned with a Mobile Device Management solution, this may cause a conflict as the mobile device only permits one MDM profile.
During an evaluation or Proof of Concept, it may be necessary to use a sideloaded version of the Check Point Protect, which does not have these restrictions. This application will be signed by an Untrusted Enterprise Developer. The user will need to take action to enable use of the Check Point Protect application, as described in the following SecureKnowledge article:
When switching from an evaluation installation to a production installation, you should switch to the App Store version of the Check Point Protect application. The app will need to be deployed through a MDM, as described in the following SecureKnowledge article: