CA, San Francisco, 18thOctober 2023: Hexnode UEM, the enterprise software division of Mitsogo Inc., has announced a collaboration with Checkpoint’s Harmony Mobile, a threat defense solution designed to safeguard mobile devices against emerging cyber threats. This combination, currently available for Android and iOS devices, capitalizes on the complementary strengths of MTDs (Mobile Threat Defense) and UEMs (Unified Endpoint Management), empowering IT administrators to take a proactive stance against impending threats.
The inherent versatility of mobile devices has made them a favoured choice among employees. However, with mobile gadgets serving as gateways to critical enterprise systems, the need to safeguard sensitive corporate data becomes paramount. Moreover, the penchant for employees to download third-party applications outside the purview of IT exposes organizations to significant risks in terms of data security and seamless business operations.
Harmony Mobile Application, an innovative approach by Checkpoint, provides complete protection over corporate data across all mobile attack surfaces like operating systems, applications, and networks. Its app protection feature is adept at identifying and thwarting malicious app infiltration, while simultaneously halting phishing attacks across various applications. Furthermore, it curbs the unauthorized distribution of sensitive data from infected devices to malicious botnets, bolstering overall data security.
Hexnode’s integration with Checkpoint Harmony Mobile amplifies the device security endeavor by allowing IT admins to enforce the installation of the Harmony Mobile app by setting it up as a mandatory app. Once the application is installed, admins can access device-specific threat-related information in the Hexnode UEM portal. Hexnode rates the device’s threat level as none, low, medium, or high, based on the data collected from Harmony Mobile. Additionally, Hexnode’s application management feature empowers IT administrators to proactively block any applications that are identified as malicious.
“While Harmony Mobile focuses on securing applications, Hexnode is dedicated to enhancing this commitment through effective corporate app repository management. In essence, the union of Hexnode and Checkpoint Harmony Mobile elevates the experience of IT administrators in managing threats, enabling them to fortify the company’s security posture proactively,” says Hexnode’s CTO, Sahad M.
The Hexnode-Checkpoint Integration sets out to detect threats locally, mitigating network and OS-based vulnerabilities. In doing so, it enhances the digital employee experience and optimizes IT operations, delivering a robust security solution for the modern enterprise. To access this integration, Hexnode’s users will need to subscribe to either the Ultimate or Ultra plans.
About Hexnode
Hexnode, an award-winning cloud-based Unified Endpoint Management (UEM) solution, was developed with the mission of helping enterprises manage their device fleet. Recognizing the value of corporate data and witnessing the emergence of BYODs, COPEs, and COBOs, Hexnode has been in an endeavor of introducing intelligent technologies to safeguard devices against threats and thefts. It offers full mobility management software compatible with all major platforms, including Android, Windows, iOS, macOS, Fire OS, and Apple TVs. Hexnode, known for its enthusiastic support crew, offers a free trial for those interested in giving it a try.
About Checkpoint
Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware, ransomware and other advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention,”, this combined product architecture defends enterprise cloud, network and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system.
Share your thoughts