שיחת ייעוץ חינם: 1-800-800-570

Check Point Mobile Access Software Blade
Provides enterprise-grade remote access via both Layer-3 VPN and SSL VPN

Check Point Mobile Access Software Blade

Check Point Mobile Access Software Blade is the safe and easy solution to connect to corporate applications over the internet with your Smartphone, tablet or PC. The solution provides enterprise-grade remote access via both Layer-3 VPN and SSL VPN, allowing you simple, safe and secure connectivity to your email, calendar, contacts and corporate applications.


Check Point Product
Check Point Security Gateway Blade
Mobile Access Blade for up to 50 concurrent connections
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-50
המחיר שלנו: הצעת מחיר
Mobile Access Blade for up to 200 concurrent connections
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-200
המחיר שלנו: הצעת מחיר
Mobile Access Blade for unlimited concurrent connections
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-U
המחיר שלנו: הצעת מחיר

מחירים נוספים מופיעים למטה, או לחצו כאן!

שימו לב: כל המחירים באתר כוללים מע"מ. החיוב יבוצע על פי שער "העברות והמחאות מכירה" של המטבע (דולר אמריקאי) ביום אישור ההזמנה.

Benefits:

Simply connect from mobile devices

  • Secure connectivity for smartphones, tablets, PCs and laptops
  • Provides client-based and web-based VPN connectivity
  • Easy access for mobile workers using managed or unmanaged devices

Keeps your data secure

  • Communicate security with proven encryption technology
  • Verify authorized users with two-factor authentication and User-Device pairing

Unified management for simple deployment and administration

  • Fully integrated with Check Point Security Policy Manager
  • Activate user-certificates with one click
  • Deploy and configure the Mobile Access Software Blade on your existing Security Gateway

Features:

Remote Access with Encrypted VPN Technology

The Check Point Mobile Access Software Blade uses SSL VPN and IPsec technologies to secure encrypted communication from unmanaged smartphones, tablets, PCs and laptops to your corporate IT infrastructure.

The  Mobile Access Software Blade offers multiple end-user connection options, including:

  • Check Point Mobile app
  • Check Point Mobile VPN app
  • SSL VPN portal through a browser
  • SSL Network Extender (SNX) with light-weight, dissolvable client

 The Mobile Access Software Blade offers:

  • Secure SSL VPN access
  • Two-factor authentication
  • Device/end-user paring
  • Mobile business portal
  • Provisioning of security features and email profile

Works cooperatively with additional gateway Software Blades, such as the Check Point Intrusion Prevention System (IPS), Antivirus and Anti-malware and Firewall Software Blades.  

Check Point Mobile VPN Client

Check Point Mobile VPN is the safe and simple way to connect to your corporate resources from any application on your Apple iPhone and iPad devices. This enterprise-grade VPN application provides secure access to your corporate resources via an SSL or IPsec tunnel.

Check Point Mobile Client

Simple and secure acces from your mobile device to corporate web-based applications through an easy to use portal.
  • One-touch access to your business web applications 
  • Secure sync of your e-mail, calendar and contacts
  • Always-on security
  • Easy setup with downloadable app 
  • Secure business portal customized for each user ensuring access to only authorized corporate resources
  • Single sign-on to reduce login errors into corporate web applications

SSL VPN Portal

As one of the multiple end-user connection options, the SSL VPN portal is best for connecting securely to corporate resources through a portal from a web browser.

Secure Web-based Connectivity
Through an integrated Web portal, users can access web applications, web-based resources, shared files, and email. Administrators can customize the design of the web portal, including support for multiple languages.

 Endpoint Security On Demand - optional endpoint compliance and malware scanner

  • Ensures that connecting endpoints are compliant with corporate policy
  • Out-of-compliance users are offered links to self-remediation resources

Check Point Secure Workspace
End-users can utilize the Check Point virtual desktop that enables data protection during user sessions and enables cache wiping after the sessions have ended. Secure Workspace protects all session-specific data accumulated on the client side, and:

  • Creates a secure virtual environment, insulated from the host
  • Encrypts and deletes browser and application caches, files, etc., when session ends

DynamicID Direct SMS Authentication
The Mobile Access Software Blade can be configured to send a One-Time Password (OTP) to an end-user communication device (such as a mobile phone) via an SMS message. SMS two-factor authentication provides an extra level of security while eliminating the difficulties associated with managing hardware tokens.

Integrated Intrusion Prevention

  • Provides protection against malicious code transferred in Web-related applications
  • Blocks worms, various attacks such as buffer overflows, SQL and command injections, cross-site scripting, customizable HTTP worm catcher, directory traversal, header rejection, malicious HTTP code 

SSL Network Extender (On-demand client - SNX)

The SSL Network Extender (SNX) is used for remote users who need access to network (non-Web-based) applications. The SSL Network Extender offers a browser plug-in that provides remote access, while delivering full network connectivity for IP-based applications. It enables an on-demand SSL VPN Layer-3 tunnel to connect to your corporate resources. It supports any IP-based application, including ICMP, TCP and UDP, without requiring complex configuration to support each application. SSL Network Extender works on remote PCs without requiring administrator privileges.

SSL Network Extender is downloaded automatically from the SSL VPN portal to the endpoint machines, so that VPN client software does not have to be pre-installed and configured on users' PCs and laptops. SSL Network Extender tunnels application traffic using a secure, encrypted and authenticated SSL tunnel to the SSL VPN gateway.

Integrated into Check Point Software Blade Architecture

The Mobile Access Software Blade is integrated into the Software Blade Architecture. It can be easily and rapidly activated on existing Check Point Security Gateways saving time and reducing costs by leveraging existing security infrastructure.

Specifications:

Check Point Mobile Application - Web Portal Specifications
iOS 3.1.3 and above
Android 2.1 and above 
Windows XP, Vista, Windows -Layer-3 VPN Client
 Check Point Mobile VPN Client  - Layer-3 VPN
 iOS 5.0 and above
SSL VPN Portal
Internet Explorer 5.5 and above
Firefox 1.0.3 and above 
Safari All 
Gateway Specifications
Hardware
  • Check Point 2200, 4000, 12000, 21400 and 61000 Appliances
  • Check Point Power-1
  • Check Point UTM-1
  • Check Point IAS
Operating System
  • GAiA R75.40 or later
  • SecurePlatform  R71.30 or later
  • Check Point Mobile VPN requires R71.50 or later.
Management Platform Specifications*
Check Point
  • GAiA
  • SecurePlatform
  • IPSO 6.2 disk-based 
Windows Server 2003/2008- 32-bit 
Linux RHEL 5.0/5.4 32-bit 
Sun/Oracle (SPARC) Solaris 8, 9, 10 
Client Device Operating System  Browser
PC Windows 7 32/64-bit, Vista 32/64-bit, XP 32-bit Internet Explorer 5.5 and above, Firefox 1.0.3 and above
Mac Mac 10.4 and above Safari
Linux Fedora 8, Ubuntu 7, RHEL 3.0, Suse 9 & above, Red Hat 7.3 Firefox 1.0.3 and above

*Security Management Server R71.10 required

הערות תמחור:

Check Point Product
Check Point Security Gateway Blade
Mobile Access Blade for up to 50 concurrent connections
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-50
המחיר שלנו: הצעת מחיר
Mobile Access Blade for up to 200 concurrent connections
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-200
המחיר שלנו: הצעת מחיר
Mobile Access Blade for unlimited concurrent connections
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-U
המחיר שלנו: הצעת מחיר
Check Point Security Gateway Blades for High Availability
Mobile Access Blade for up to 50 concurrent connections for High Availability
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-50-HA
המחיר שלנו: הצעת מחיר
Mobile Access Blade for up to 200 concurrent connections for High Availability
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-200-HA
המחיר שלנו: הצעת מחיר
Mobile Access Blade for unlimited concurrent connections for High Availability
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-U-HA
המחיר שלנו: הצעת מחיר
Check Point Security Gateway Containers
SG101 Container for Security Gateways with 1 core
-Up to 50 users
#CPSG-C101
המחיר שלנו: הצעת מחיר
SG201 Container for Security Gateways with 2 cores
-Up to 500 users
#CPSG-C201
המחיר שלנו: הצעת מחיר
SG401 Container for Security Gateways with 4 cores
-Unlimited Users
#CPSG-C401
המחיר שלנו: הצעת מחיר
SG801 Container for Security Gateways with 8 cores
-Unlimited Users
#CPSG-C801
המחיר שלנו: הצעת מחיר
SG1201 Container for Security Gateways with 12 cores
-Unlimited Users
#CPSG-C1201
המחיר שלנו: הצעת מחיר