Site icon Check Point Blog

Check Point Harmony Mobile Introduces Malicious File Protection

The industry’s leading mobile security solution can now block the download of malicious files to mobile devices and prevent file-based cyber-attacks on organizations

By Noa Goldstein, Product Marketing Manager and Guy Lev, Harmony Mobile Product Lead.

Check Point announces the availability of the most complete cyber protection against mobile-related threats with a new version of Harmony Mobile that prevents the download of malicious files. Harmony Mobile is the first mobile threat solution among the industry’s top leading vendors to prevent the download of malicious files to mobile devices. With a staggering rise in mobile related attacks, Check Point Harmony Mobile customers can rest assured knowing that their critical business assets remain protected from even the most sophisticated attacks targeting their workforce via mobile devices. 

The release further extends Harmony Mobile with additional security capabilities including: operating system vulnerability assessment, advanced mitigation capabilities on Samsung devices, easy-to-manage HTTPS inspection, and more, to provide the industry’s best mobile security.


Join a live webinar with our security experts on June 1st to learn more about Harmony Mobile’s new release and gain a detailed view of the file protection capability.

Register today: AmericasEMEA/APAC


Why do you need File Protection for your mobile?

In today’s hybrid workspace, employees are increasingly using their mobile devices to perform critical business tasks, share sensitive company information and access corporate applications. This new reality has expanded the mobile attack surface and made employees’ mobile devices a significant entry point for cyber attackers.

Organizations worldwide are experiencing a steep increase in mobile cyberattacks, both in quantity and in variety. According to Check Point Research, a staggering 97% of organizations have faced mobile threats from all vectors over the last two years with the rise of mobile ransomware attacks and malware-as-a-service.

One of the most overlooked vectors in mobile security is file download. Over the past weeks, Harmony Mobile has already prevented multiple attack attempts in the wild using malicious files, including botnets and phishing. According to Check Point’s ThreatCloud, out of billions of files scanned weekly, more than 0.5% contain malicious content. Files such as PDF, GIF images, and Excel sheets can all be malicious and facilitate cyberattacks on your mobile device fleet and on your organization.

Just this year we’ve seen highly sophisticated attacks using files as an attack vector including spyware using PDF and GIF files to penetrate mobile operating systems. A similar vulnerability was found by Check Point researchers on the Instagram app.

What can you do to protect your Mobile from malicious files?

Most mobile security solutions can scan files that are related to the mobile operating system, such as apps and iOS profiles, but that does not protect your mobile from other malicious file types such as executables, MS Office files, PDFs and more.

Check Point Harmony Mobile is the only mobile security solution that protects you from any type of file.

How does Harmony Mobile File Protection work?

Harmony Mobile uses ThreatCloud, the brain behind all of Check Point’s products, for scanning files. ThreatCloud combines the latest AI technology with big data threat intelligence, as well as threat intelligence collected and analyzed by Check Point’s elite research team. ThreatCloud provides the best catch rate in the industry of known and unknown threats, blocks attacks faster than anyone else and has zero false positives.

File Protection combines two features:

Harmony Mobile File Protection provides a never seen before connection between Check Point’s file protection capabilities and Harmony Mobile’s leading protection mechanism. Both features leverage Check Point’s Threat Emulation and Threat Extraction advanced capabilities to identify and block malicious files and are enhanced by Check Point’s ThreatCloud. These award-winning capabilities have been developed by Check Point over many years, enriched by Check Point’s vast customer database.

Further enhancements in Harmony Mobile file protection

Harmony Mobile’s file protection capabilities will be further enhanced during the year with threat emulation and threat extraction capabilities on your mobile device.

This will allow not only uploading files to Check Point’s Threat Extraction and using Check Point’s tools to identify threats, but it will also enable the user to receive a sanitized version of the file while it is being checked to provide a seamless work experience with minimal impact on productivity.

In addition, this capability will also be leveraged by Check Point Harmony App Protect, an SDK that organizations can embed in the application they develop to safeguard their customer-facing applications and their users. The hosting application will use Harmony App Protect File Protection capabilities to scan files uploaded within the app. It will detect malicious files, preventing them from accessing the organization.

Enhanced Security with Harmony Mobile Release 4.0

As part of Check Point’s continuing drive to enhance Mobile Security while simplifying Security Management, we have released a few more exciting features in this version:

Enhancing Security:

Harmony Mobile OS CVE Assessment

Harmony Mobile Campaign Detection Configuration

Harmony Mobile Campaign Detection on Display

Simplifying Management

 


Harmony Mobile Application Categories Based Policy

Want to learn more about File Protection and other new and exciting mobile security capabilities in Harmony Mobile?

Register for the Check Point presents the Leading Malicious File Protection for Mobile webinar AmericasEMEA/APAC


 

Exit mobile version