With the recent surge in high profile security breaches of
the last eighteen months, all businesses regardless of size must have security
in the forefront of their IT strategic plan.
Security has become more important than ever before. It has also become more complicated than ever
before. Never before has corporate data
been under attack from so many different vectors. The days of securing the perimeter of your
corporate network and calling it a day are over. With the ever increasing mobile workforce
accessing data from anywhere at anytime, how can security keep up?
There are too many touch points to critical data from
multiple avenues to continue to apply the principals of old. In the past, a company would invest its
security spend on the best perimeter firewall they could find. They would then create a rule base that kept
the bad guys out, and tried to keep the good guys in. But now, with more and more access coming in
over cellular networks, free wifi hotspots, and employee’s home broadband
connections, the old perimeter firewall isn’t enough. It can’t provide security on networks that it
doesn’t exist on.
Its happened all too often.
An employee accesses critical data on their device. That data gets cached in the web browser, or
in an app, or on the storage. Later that
day, they click a link in an email from a friend, install a game from the app
store, or even visit a hacked Facebook account.
With that action, mobile malware is downloaded and installed on the
device. That corporate data is now being
sent back to the malware’s creator to be sold on the black market. There are literally thousands of ways to get
malware installed and running on a mobile device. Without the protection of the company’s
enterprise firewall on these networks, the company’s data, as well as the end
users personal data, is at extreme risk.
How do we protect these mobile devices, whether they are
laptops, tablets, phones, phablets, or even watches? We need a solution that applies the
enterprise security policy on these devices no matter what network they are
connected to. We need a solution that is
unobtrusive to the end user and that doesn’t affect that end user’s device
experience. We need a solution that
doesn’t create yet another complicated management interface for IT to
administer.
It must be seamless.
It must be secure. It must be
fast.
Capsule Cloud by Check Point delivers on all three.
How does it work?
Capsule Cloud tunnels all of the mobile device’s traffic
through a cloud based enterprise security system. The system is able to enforce the enterprise
security policy on that traffic no matter where the device is on the
Internet. With Check Point Capsule
cloud, your end users receive all the industry leading protections available on
the Check Point platform including:
Anti-Bot, Anti-Virus, Data Leakage Protection (DLP), Threat Prevention,
IPS, as well as URL Filtering and Application Control.
Check Point has multiple data centers all around the globe
to ensure the best possible user experience.
If your business utilizes Check
Point gateways or management products already, you can utilize those tools to
push the same policy that’s on your enterprise gateways to the Capsule Cloud
service.
Capsule Cloud is a cloud based security
system that is delivered via a SaaS methodology. Capsule Cloud utilizes a user based licensing
model. This allows Capsule to secure
multiple devices per user, all under a single user license. Today Capsule cloud supports all of the
major mobile devices. There are clients
for Mac OSX, Windows, iOS, and Android.