Security Products

An integrated mobile security solution that delivers multilayered protection against sophisticated mobile attacks Check Point Harmony Mobile

モバイル端末のセキュリティAre you confident that your mobile devices are secure simply because they are “not lost” or because “application usage is restricted”?

With the spread of SaaS and remote work, the use of mobile devices for business has accelerated, and at the same time, the risk of external access to critical internal data has increased.Attack vectors are becoming more diverse, including network and OS vulnerability exploits, phishing, and man-in-the-middle attacks using rogue Wi-Fi access points—threats that cannot be fully addressed by conventional antivirus apps alone.

In many Japanese companies, it is common to manage corporate mobile devices using MDM (Mobile Device Management). While MDM provides security features such as restricting the use of applications and performing remote wipe in case of loss, it cannot defend against the diversified attacks mentioned above.

Check Point Harmony Mobile from Check Point Software Technologies enables multifaceted protection using one of the industry’s largest threat intelligence platforms, covering these attacks as well as unknown malicious applications.
  1. Three layers of protection provided by Check Point Harmony Mobile
    Network-level communication control and protection
    Harmony Mobile blocks access to phishing sites. It restricts access to harmful content using URL filtering and protects against man-in-the-middle attacks via rogue Wi-Fi and access to C&C servers, defending against network-level attacks from multiple angles.
    モバイル端末からのフィッシングサイトへのアクセスをブロック


    Protection against malicious applications

    Using a cloud-based sandbox that performs threat intelligence and risk analysis, Harmony Mobile prevents malicious applications from infiltrating devices. Analysis results for applications can be viewed via a dedicated UI, and administrators can configure whitelists and blacklists.

    不正なアプリケーションからデバイスを保護


    Inspection and protection against mobile OS vulnerabilities
    Harmony Mobile scans device configuration information such as OS version, applied patch levels, and jailbreak/root status. If a policy violation is found, it is reported as a risk.

    SanbBlast

  2. Cloud-based management and threat-intelligence-driven ecosystem
    Check Point Harmony Mobile is managed via a cloud-based portal. Its inspection engine uses “ThreatCloud,” a sandbox environment where static and dynamic analysis is performed to detect even unknown malware. ThreatCloud is the threat intelligence knowledge base also used by other Check Point Software Technologies products. It holds information on more than 500 million malware hashes and websites and is updated in real time through the detection of over 700,000 malware samples every day. While standalone products have limitations in terms of their own threat knowledge, Harmony Mobile achieves high detection rates for unknown malware and phishing sites through an ecosystem that shares threat intelligence across multiple Check Point products. ThreatCloudエコシステム
  3. Highly rated by independent evaluation organizations
    Check Point Harmony Mobile has received high ratings from multiple independent evaluation organizations, including Gartner.
    In a comparative test conducted by Miercom in 2019, it received the highest scores for factors such as protection effectiveness against threats, ease of use, ease of deployment, and cost. Check Point Harmony Mobileの第三者評価
  4. Key points compared with MDM solutions
    Check Point Harmony Mobile protects mobile devices against the latest security threats that cannot be mitigated by MDM alone.
    Organizations that already use MDM can achieve stronger security and robust configuration management by adding and integrating Check Point Harmony Mobile on top of their existing MDM deployment.
    Security riskSandBlast MobileMDM
    Lost Device Countermeasures (Remote Wipe)
    Device Encryption
    PIN (Passcode) Enforcement
    Restriction of Usable Applications
    JDetection of Jailbreak/Rooting
    Malware Detection (Known and Unknown)
    Phishing Detection (Known and Unknown)
    URL Filtering
    Wi-Fi Attack Detection
    C&C Communication Detection