Mobile Access Software Blade



Similar documents
Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Q. I use a MAC How do I change my password so I can send and receive my ?

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access

SA Series SSL VPN Virtual Appliances

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service

Accessing the Media General SSL VPN

Secure iphone Access to Corporate Web Applications

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2

Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Smart Phone App version

1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010

The increasing popularity of mobile devices is rapidly changing how and where we

Ultra-strong authentication to protect network access and assets

Ultra-strong authentication to protect network access and assets

Manual for Android 1.5

Proven. Trusted.

Sophos Mobile Control User guide for Apple ios. Product version: 4

What We Do: Simplify Enterprise Mobility

Setup your university on your Android smartphone

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Connecting an Android to a FortiGate with SSL VPN

Workspot, Inc. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: September 16, Product Information Partner Name

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

These additional levels of security are NOT required if you are using a Derbyshire County Council machine on council premises.

Roadmap to Solving Enterprise Mobility

Two-Factor Authentication User FAQ s

Employee Active Directory Self-Service Quick Setup Guide

cbox YOUR FILES GO MOBILE! FOR ANDROID SMARTPHONES AND TABLETS USER MANUAL

MaaS360 Mobile Enterprise Gateway

The Secure Web Access Solution Includes:

Rocket Mail Smartphone Configuration Guide. Version 2.0

Spectrum Health Virtual Desktop (VDI) (available only to select users at this time)

IBM Cognos Mobile Overview

MaaS360 Mobile Enterprise Gateway

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

The ForeScout Difference

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Network Configuration Settings

ipecs UCS Unified Communications Solution Easy to access and activate Highlights Single server solution

Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks

Ultra-strong authentication to protect network access and assets

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

Neat Cloud Service + Mobile App

Enterprise Mobility Solution Puts Unified Communications on the Smartphones Employees Love

Business mail 1 MS OUTLOOK CONFIGURATION... 2

MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions

Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks

BYOD - Provisioning an Android Phone

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

Webfusion Hosted Exchange 2010

1. Accessing the LONZA network from a private PC or Internet Café

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

B&SC Office 365

ForeScout MDM Enterprise

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

SVN5800 Secure Access Gateway

Features of AnyShare

How To Use A Citrix Netscaler Thin Client V (Windows) With A Citirix Vpn Desktop (Windows 10) With An Ipad Or Ipad (Windows 8) With Vpn

Cisco WAAS Optimized for Citrix XenDesktop

When enterprise mobility strategies are discussed, security is usually one of the first topics

Enterprise Content Sharing: A Data Security Checklist. Whitepaper Enterprise Content Sharing: A Data Security Checklist

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Endpoint Security VPN for Mac

Getting Started with VMware Horizon View (Remote Desktop Access)

10 Essential Elements for a Secure Enterprise Mobility Strategy

Sophos Mobile Control user help. Product version: 6.1

Top. Enterprise Reasons to Select kiteworks by Accellion

Enterprise Mobility Management: A Data Security Checklist. Whitepaper Enterprise Mobility Management: A Checklist for Securing Content

Access All Your Files on All Your Devices

APP DEV. We build your ideas into web and mobile applications. steicho. Technological Solutions

What s New in Juniper s SSL VPN Version 6.0

Citrix Enterprise Mobility more than just device management (MDM)

SecureSend File Transfer Portal Usage Guide

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

Mobile Access R Administration Guide. 13 August Classification: [Protected]

Commack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices

How To Use Tsplashbox On A Pc Or Mac Or Mac (For A Pc) With A Windows 7 Computer (For Mac) Or Mac) With Tsplatro (For Pc) Or Ipad (For Windows) With An

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Cloud, security and the mobile enterprise: An end-to-end manageability challenge

Securing Office 365 with MobileIron

How To Secure Your Mobile Device

PULSE SECURE FOR GOOGLE ANDROID

ADDING STRONGER AUTHENTICATION for VPN Access Control

Anchor End-User Guide

SSL VPN vs. IPSec VPN

Sophos UTM. Remote Access via SSL Configuring Remote Client

Workspot Configuration Guide for the Cisco Adaptive Security Appliance

Riva for Exchange and CRM

Transcription:

Mobile Access Software Blade Dimension Data BYOD event Jeroen De Corel SE BeLux 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved.

Today s Workforce Mobile Platforms Are Becoming an Essential and Standard Business Tool Smartphones and tablets accessing email, Web and business applications 2

Today s Workforce Organizations Enabling Mobile Devices Allow mobile devices 89% in the organization 65% Allow personal devices Source: The impact of mobile devices on information security January 2012. Check Point Software Technologies. N=768 3

Mobile Workforce Challenges Access From Anywhere 4

Mobile Workforce Challenges While Maintaining Security 5

The Security Challenge User access only to authorized information Communication privacy Protecting business data on the device Support BYOD and unmanaged devices 6

Mobile Access Software Blade Simple and Secure Corporate Access From Mobile Devices Simply connect from any mobile device Secure communication to the organization Unified management and reporting 7

Flexible, Secure Connectivity from Any Mobile Device Mobile Device: Web portal to business applications Best for: Intranet, Outlook Web Access (OWA), SharePoint, Wiki Mobile Device: Secure communication running local apps Best for: Expense reports, remote IT server management, CRM, HR, remote desktop, file server access Laptop: Simple portal interface from browser for internal Web access Best for: Intranet, Outlook Web Access (OWA), SharePoint, Wiki Business 8

Flexible Connectivity from Any Mobile Device Secure access from smartphones and tablets Secure Check Web Point Portal Mobile App Check Point Mobile VPN VPN App Secure access from other devices Secure SSL VPN Web Portal Mobile Access Software Blade on a Check Point Gateway 9

Check Point Mobile for ios and Android Check Point Mobile Portal for business Web apps Single sign on Encrypted communication 10

Simple to Connect to Business Portal Tap Check Point Mobile Enter your password Gain secure access to your data through portal 11

Check Point Mobile VPN for ios Introducing: Check Point Mobile VPN VPN tunnel for local apps Automatic connect Encrypted communication Android support Q2 2012 12

Check Point Mobile VPN App Fully Transparent User Experience with Secure On-Demand VPN Tunnel Business mail account Remote Desktop Organization 13

Simple to Set Up Install Check Point Mobile VPN via the App Store Set up your profile: Click a link OR scan a QR Done! VPN secures your communication 14

Flexible Connectivity from Any Mobile Device Secure access from smartphones and tablets Check Point Mobile Check Point Mobile VPN Secure access from other devices SSL VPN Portal Mobile Access Software Blade on a Check Point Gateway 15

SSL VPN Portal From Any Internet Browser Access Business Applications from Any Device via SSL VPN Portal Web mail and native apps On-demand SSL VPN client for native apps Web apps Shared files 16

Simple for the Gateway Administrator Enable Mobile Access Software Blade on your gateway Set access policies for users Generate and send an activation key to users 17

Mobile Access Software Blade Simple and Secure Corporate Access From Mobile Devices Simply connect from any mobile device Secure communication to the organization Unified management and reporting 18

User and Device Access Control Certificate, username/password, tokens and PIN Personalized portal 19

User and Device Access Control Certificate, username/password, tokens and PIN Personalized portal Pair device with its owner 20

Mobile Access Software Blade Simple and Secure Corporate Access From Mobile Devices Simply connect from any mobile device Secure communication to the organization Unified management and reporting 21

Centralized Policy Management Integrated With Your Enterprise Security Architecture Enable Mobile Access Software Blade on your security gateway Fully integrated with Check Point security policy management One-click activation for user certificate 22

Mobile Access Software Blade Check Point Mobile VPN App and Check Point Mobile App FREE DOWNLOAD Check Point Mobile Check Point Mobile VPN Mobile Access Blade priced by concurrent connected users: 5 concurrent users Included!* Up to 50 concurrent users $1,540 Up to 200 concurrent users $4,100 Unlimited concurrent users $9,250 *5 concurrent users are included with any new 2012 appliance 23

Mobile Access Software Blade DEMO TIME! 24

Mobile Access Software Blade Questions? 25

Thank You 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved.