Call a Specialist Today! (02) 9388 1741
Free Delivery! Free Delivery!

Check Point Mobile Access Software Blade
Provides enterprise-grade remote access via both Layer-3 VPN and SSL VPN


Check Point Mobile Access Software Blade


Check Point Mobile Access is the safe and easy solution to securely connect to corporate applications over the Internet with your Smartphone, tablet or PC. Integrated into the Check Point Infinity Architecture, Mobile Access provides enterprise-grade remote access via both Layer-3 VPN and SSL/TLS VPN, allowing you to simply and securely connect to your email, calendar, contacts and corporate applications.


Check Point Products
Check Point Security Gateway Blade
Mobile Access Blade for unlimited concurrent connections
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-U
Our Price: Request a Quote

Click here to jump to more pricing!

Please Note: All Prices are Inclusive of GST

Overview:

Remote work is the new norm. Efforts to slow the spread of COVID-19 accelerated the transition of employees working from home and accessing corporate resources securely through various VPN (Virtual Private Network) technologies. In a recent Gartner CFO survey 74% of companies said they intend to shift employees to work from home permanently.

Check Point Mobile Access is the safe and easy solution to securely connect to corporate applications over the Internet with your Smartphone, tablet or personal computer (PC). Mobile Access allows remote and mobile workers to simply and securely connect to email, calendar, contacts and corporate applications. Because it’s fully integrated into the Check Point network security suite, administrators can easily set policy and monitor remote user’s use of corporate assets.


Flexible

Flexible

Easy access for mobile workers - simply connect from mobile devices to secure connectivity for smartphones, tablets, PCs and laptops

Secure

Secure

Communicate securely with proven encryption technology, two-factor authentication, and User-Device pairing to eliminate network security threats

Unified

Unified

Easily deploy and manage on your existing security gateways with full integration into the Check Point Infinity Architecture


Full Layer-3 VPN Technology using a Client

IPsec VPNs authenticate and encrypt every communication session. Layer-3 VPN technology is highly scalable and allows flexible any-to-any connectivity.

Full Layer-3 VPN Technology using a Client

Encrypted SSL/TLS VPN using a Browser

Encrypt communications from unmanaged mobile devices. Both web-based and network-level access through SSL/TLS encryption is delivered through a browser.

Encrypted SSL/TLS VPN using a Browser


Next Generation Firewall is more than just a firewall

Benefits:

Simply connect from mobile devices

  • Secure connectivity for smartphones, tablets, PCs and laptops
  • Provides client-based and web-based VPN connectivity
  • Easy access for mobile workers using managed or unmanaged devices

Keeps your data secure

  • Communicate security with proven encryption technology
  • Verify authorised users with two-factor authentication and User-Device pairing

Unified management for simple deployment and administration

  • Fully integrated with Check Point Security Policy Manager
  • Activate user-certificates with one click
  • Deploy and configure the Mobile Access Software Blade on your existing Security Gateway

Features:

Spotlight on the Web Portal

The Web Portal is best for connecting securely to corporate resources from a web browser. Through an integrated web portal, users can access native corporate applications including web-based resources, shared file and email. Administrators can customize the design of the web portal to match their corporate brand identity. Mobile Access offers secure SSL/TLS VPN transport, strong multi-factor authentication and Role-based Access Control (RBAC).

Connect from Everywhere - Web, Mobile and Desktop
Connect from Everywhere - Web, Mobile and Desktop

DynamicID™ Direct SMS Authentication
Mobile Access can be configured to send a One-Time Password (OTP) to an end-user device such as a mobile phone via an SMS message. SMS two-factor authentication provides an extra level of security while eliminating the difficulties associated with managing hardware tokens.

Compliance Scanner
An endpoint compliance scanner ensures that connecting endpoints are compliant with corporate policy. Out-of-compliance users are offered links to self-remediation resources. Enforce your corporate compliance policy for Windows, macOS and Linux endpoints.

SSL Network Extender (SNX, an On-demand Client)
Best for secure connectivity to corporate resources using non- web-based applications via an on-demand, dissolvable client. The SSL Network Extender (SNX) is used for remote users who need access to network (non-web-based) applications. SSL Network Extender is downloaded automatically from the SSL VPN portal to the endpoint machines, so that client software does not have to be pre-installed and configured on users' PCs and laptops. SNX delivers full network connectivity for IP-based applications including a Layer-3 tunnel to connect to your corporate resources. It supports IP-based applications, including ICMP, TCP, and UDP, without requiring complex configuration to support each application. SNX Application Mode works without requiring administrative privileges and establishes a VPN tunnel for the specified applications.

Secure Workspace
End-users can utilize the Check Point virtual desktop that enables data protection during user sessions and enables cache wiping after the sessions have ended. Secure Workspace protects all session-specific data accumulated on the client side and creates a secure virtual environment insulated from the host. Browser and application caches, files, etc. are encrypted and then deleted when session ends.

Spotlight on Clinets

Check Point Capsule VPN (for Windows 10, 8.1)
Securely Access all your corporate resources from your device through a Virtual Private Network (VPN) tunnel. As you launch business applications such as RDP, VoIP or any other app on your mobile device, all transmitted data to corporate is encrypted, without any additional actions required by you.

Check Point Capsule Connect and Capsule VPN (for iOS and Android)
Check Point Connect for iOS and Capsule VPN for Android are simple client-to-site VPN clients available on mobile devices. Simply set up the site and connections to assets protected by the site gateway are secured by an IPsec or SSL VPN.

Check Point Capsule Workspace (for iOS and Android)
Check Point Capsule Workspace is a mobile security container on iOS and Android devices that creates an isolated corporate workspace on personal devices, making it simple to secure corporate data and assets both inside and outside the corporate network. Check Point Capsule Workspace protects and manages enterprise apps and data without needing to manage Mobile Device Management (MDM) profiles. So no matter which team is responsible for supporting smartphones and tablets, they’ll value how Capsule Workspace secures mobile environments with ease - including BYOD.

Capsule Workspace is easy to deploy and manage, helping to reduce the time, effort, and cost of keeping mobile devices and data secure. Once deployed, it creates an AES256-bit encrypted container for enterprise apps and data that puts you in control of the sensitive enterprise information you need to protect. It never touches the personal apps, media, or content, on a device which helps improve end user adoption, even on personally-owned devices. Users will also appreciate the native experience and onetouch access Capsule Workspace provides to the critical enterprise apps they need to stay in touch on the go. It supports Microsoft Exchange Server and Office 365 email, calendar, and contacts, and includes secure enterprise instant messaging and document access.

Rapid and Flexible Deployment
With SmartConsole, companies can email users at their leisure with information on how to download the Mobile client directly to users’ smartphones. Multiple ways to distribute notice of a Mobile client are available as well as choosing what Mobile client will be available for users using customized emails.

Endpoint VPN Clients (for Windows and macOS)
Mobile Access is part of our larger remote access solution. For additional endpoint protection, install our endpoint VPN client with or without the full Endpoint Security suite. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data. The VPN client has the ability to transparently establish a VPN tunnel upon demand when accessing corporate resources. The connection is re-established when roaming between networks and automatically tears down the VPN tunnel when the device is connected to the local corporate network.

Specifications:


Check Point Mobile Application - Web Portal Specifications
iOS 3.1.3 and above
Android 2.1 and above
Windows XP, Vista, Windows -Layer-3 VPN Client
Check Point Mobile VPN Client - Layer-3 VPN
iOS 5.0 and above
SSL VPN Portal
Internet Explorer 5.5 and above
Firefox 1.0.3 and above
Safari All
Gateway Specifications
Hardware
  • Check Point 2200, 4000, 12000, 21400 and 61000 Appliances
  • Check Point Power-1
  • Check Point UTM-1
  • Check Point IAS
Operating System
  • GAiA R75.40 or later
  • SecurePlatform R71.30 or later
  • Check Point Mobile VPN requires R71.50 or later.
Management Platform Specifications*
Check Point
  • GAiA
  • SecurePlatform
  • IPSO 6.2 disk-based
Windows Server 2003/2008- 32-bit
Linux RHEL 5.0/5.4 32-bit
Sun/Oracle (SPARC) Solaris 8, 9, 10
Client Device Operating System Browser
PC Windows 7 32/64-bit, Vista 32/64-bit, XP 32-bit Internet Explorer 5.5 and above, Firefox 1.0.3 and above
Mac Mac 10.4 and above Safari
Linux Fedora 8, Ubuntu 7, RHEL 3.0, Suse 9 & above, Red Hat 7.3 Firefox 1.0.3 and above

*Security Management Server R71.10 required

Documentation:

Download the Check Point Mobile Access Datasheet (PDF).

It appears you don't have a PDF plugin for this browser. No biggie... you can click here to download the PDF file.

Pricing Notes:

Check Point Products
Check Point Security Gateway Blade
Mobile Access Blade for unlimited concurrent connections
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-U
Our Price: Request a Quote
Check Point Security Gateway Blades for High Availability
Mobile Access Blade for up to 50 concurrent connections for High Availability
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-50-HA
Our Price: Request a Quote
Mobile Access Blade for up to 200 concurrent connections for High Availability
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-200-HA
Our Price: Request a Quote
Mobile Access Blade for unlimited concurrent connections for High Availability
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-U-HA
Our Price: Request a Quote