Tuesday, January 20, 2015

Securing mobile devices when they are off the corporate network


With the recent surge in high profile security breaches of the last eighteen months, all businesses regardless of size must have security in the forefront of their IT strategic plan.  Security has become more important than ever before.  It has also become more complicated than ever before.  Never before has corporate data been under attack from so many different vectors.  The days of securing the perimeter of your corporate network and calling it a day are over.  With the ever increasing mobile workforce accessing data from anywhere at anytime, how can security keep up?

There are too many touch points to critical data from multiple avenues to continue to apply the principals of old.  In the past, a company would invest its security spend on the best perimeter firewall they could find.  They would then create a rule base that kept the bad guys out, and tried to keep the good guys in.  But now, with more and more access coming in over cellular networks, free wifi hotspots, and employee’s home broadband connections, the old perimeter firewall isn’t enough.  It can’t provide security on networks that it doesn’t exist on. 

Its happened all too often.  An employee accesses critical data on their device.  That data gets cached in the web browser, or in an app, or on the storage.  Later that day, they click a link in an email from a friend, install a game from the app store, or even visit a hacked Facebook account.  With that action, mobile malware is downloaded and installed on the device.  That corporate data is now being sent back to the malware’s creator to be sold on the black market.  There are literally thousands of ways to get malware installed and running on a mobile device.  Without the protection of the company’s enterprise firewall on these networks, the company’s data, as well as the end users personal data, is at extreme risk.

How do we protect these mobile devices, whether they are laptops, tablets, phones, phablets, or even watches?  We need a solution that applies the enterprise security policy on these devices no matter what network they are connected to.  We need a solution that is unobtrusive to the end user and that doesn’t affect that end user’s device experience.  We need a solution that doesn’t create yet another complicated management interface for IT to administer. 

It must be seamless.  It must be secure.  It must be fast. 

Capsule Cloud by Check Point delivers on all three.

How does it work?

Capsule Cloud tunnels all of the mobile device’s traffic through a cloud based enterprise security system.  The system is able to enforce the enterprise security policy on that traffic no matter where the device is on the Internet.  With Check Point Capsule cloud, your end users receive all the industry leading protections available on the Check Point platform including:  Anti-Bot, Anti-Virus, Data Leakage Protection (DLP), Threat Prevention, IPS, as well as URL Filtering and Application Control.

Check Point has multiple data centers all around the globe to ensure the best possible user experience.   If your business utilizes Check Point gateways or management products already, you can utilize those tools to push the same policy that’s on your enterprise gateways to the Capsule Cloud service.

Capsule Cloud is a cloud based security system that is delivered via a SaaS methodology.  Capsule Cloud utilizes a user based licensing model.  This allows Capsule to secure multiple devices per user, all under a single user license.   Today Capsule cloud supports all of the major mobile devices.  There are clients for Mac OSX, Windows, iOS, and Android.

No comments:

Post a Comment