SandBlast Mobile Security: Man-in-the-Middle Mobile Attacks

Subscribers:
79,900
Published on ● Video Link: https://www.youtube.com/watch?v=AgyyoE6tQpM



Duration: 1:32
14,872 views
63


Our mobile devices are more vulnerable then we think. A man-in-the middle attack is a potential threat every time you connect to a Wi-Fi network. For more information: https://www.checkpoint.com/products/sandblast-network-security/

Imagine you are at a coffee shop and you want to connect to Wi-Fi and check your email. Once connected, you may be asked to download a configuration profile to get internet access. At this moment the man-in-the middle attacker gets to work. Without your knowledge, you are now connected to the internet via the attackers access point. He now has complete visibility and access to everything you are doing on your mobile device. For example, the attacker can capture credentials to highly sensitive business applications or access and download confidential documents stored in file sharing applications Check Point Mobile Threat Prevention can protect against these types of attacks, before they even start.

When trying to connect to a compromised network, Check Point Mobile Threat Prevention alerts you of the malicious activity.
Once you disconnect from the compromised Wi-Fi network, the device is no longer at risk and safe for use. Administrators have complete visibility into all incidents throughout their organization using the Mobile Threat Prevention management console.

Stay one step ahead with Check Point.




Other Videos By Check Point Software


2016-06-13Check Point Partner Success Story - RoundTower on vSEC Solution | Cloud Security
2016-06-07Facebook Vulnerability Demo | Hacker Instals Ransomware
2016-06-07Facebook Vulnerability Demo
2016-05-24Check Point Customer Success: Community Newspaper Group (CNG)
2016-05-2350 SHADES of PAN
2016-05-17Check Point and VMware Partnership delivers advanced security for the SDDC | Cloud Security
2016-04-21Check Point Introduces Next-Generation Threat Prevention Appliances | Advanced Threat Prevention
2016-04-21Check Point Customer Success Video: Helvetia Insurance, vSEC for VMware NSX | Cloud Security
2016-04-20SideStepper: Anatomy of an iOS Vulnerability | Mobile Threat Prevention
2016-04-19Check Point R80 Security Management | Advanced Threat Prevention
2016-04-13SandBlast Mobile Security: Man-in-the-Middle Mobile Attacks
2016-04-12‹Ä¢‹Ä‹â_‹ÄǏãɌ¬Œø__Ð
2016-04-07Big Bad Mobile Threats of 2015 - Check Point Mobile Threat Prevention
2016-03-03RSA 2016: Check Point, One Step Ahead of the Industry
2016-03-03RSA 2016: Prevent Cyberattacks from Entering the Endpoint with SandBlast Agent
2016-03-02RSA 2016: Check Point Mobile Threat Prevention | Mobile Security
2016-03-02RSA 2016: Day 1 - Check Point Software
2016-03-02RSA 2016: Check Point Receives "Recommended" Rating in NSS Next Generation Firewall Test
2016-03-01RSA 2016: R80 Security Management Launch | Security Management Software
2016-03-01Security Management Customer Success Story: Talisys | R80 Security Management
2016-02-19CPU-level Sandboxing with Check Point SandBlast | Advanced Threat Prevention



Tags:
check point software
mobile threat prevention
man-in-the-middle
MITM
attacks
mobile
devices
smartphones
smart phones
tablets
wi-fi
cyberattack
cyber security
malware
enterprise mobile security
mobile security
sandblast mobile
mobile threat
check point infinity
best mobile security
mobilesec
ios
android
googleplay
appstore
iphone
advanced threat prevention
security
sandblast
check point
checkpoint
sandblast mobile security
mobile privacy
network security