Check Point unveils security solution for mobile devices

Saturday, 13 June 2015 00:03 -     - {{hitsCtrl.values.hits}}

Nadun Baduge Photography | www.nadunbaduge.com

Check Point Software Technologies  Regional Director for India and SAARC Bhaskar Bakthavatsalu addressed participants at the launch of Check Point Capsule  in Colombo

Internet security firm Check Point Software Technologies Ltd announced the Sri Lankan launch of Check Point Capsule; a complete mobile solution that offers unparalleled protection for business data and mobile devices.

“Check Point Capsule is an exceptional extension of our industry-leading enterprise security solutions. Protection of information, regardless of device or location, is a clear necessity for all organisations and we are excited to offer a multi-layer mobile solution that is both seamless and secure. 



“Check Point Capsule is an innovative next-generation mobile security solution that offers the necessary protection based on an organisation’s mobile needs. The use of mobile devices on corporate networks will only continue to rise, and Check Point Capsule is an exciting extension of Check Point’s industry-leading enterprise security for the increasingly mobile workforce” Vice President of Products at Check Point Dorit Dor stated.



Launched in Sri Lanka through authorized distributors South Asian Technologies Ltd (SATL), Check Point Capsule gives organisations an unmatched level of security for any device and on any document within a single solution that offers multi-layer security.

“We’re happy to welcome Check Point Capsule to Sri Lanka. Being the complete mobile solution and with unmatched security, I’m confident of overwhelming success among the large number of organizations in Sri Lanka’s thriving IT industry,” SATL CEO Sanjaya Padmaperuma.  



Check Point Capsule enables secure access to data and protects business data on mobile devices without having to manage the entire device itself. The solution creates a secure business environment and separates business data from personal data and applications on mobile devices. 



This enables users to securely use business applications through a simple user interface, where users have one touch access to corporate email, files, directories, corporate contacts, and calendars, without affecting their personal data.

It also prevents internal and external data leakages by attaching security that travels with the document allowing authorised users to seamlessly and transparently access protected documents on any device including devices outside the corporate network. 

The system is capable of scanning all traffic from mobile devices in the cloud while blocking access to malicious files and websites, bots and other cyber threats and is supported on various device platforms and operating systems including iOS, Android, Windows and MacOS.

COMMENTS