Skip links

Check Point Enterprise Mobile Security

Mobile security solution with technology-leading performance and features

Check Point Harmony Mobile and Check Point Capsule Workspace are two complementary security solutions designed to protect mobile devices and data in the business environment. By using these solutions, strong protection and separation of business and personal data is ensured, providing a secure and controlled environment for access to company applications and data.

Solution overview

Check Point Harmony Mobile and Check Point Capsule Workspace are optimized to provide the highest level of security for both users and devices running applications on Android and iOS platforms. They enable the secure use of both company-owned and personal (Bring Your Own Device – BYOD) mobile devices.

Check Point Harmony Mobile secures mobile devices against cyber attacks and protects user identities and credentials used to access company and personal data.

To separate personal data from business data and provide regulated and secure access to company applications, Check Point Capsule Workspace implements the concept of an encrypted container that allows access based on a security score determined by Harmony Mobile.

Check Point Harmony Mobile features

Check Point Harmony Mobile provides the following functionalities:

Protection against malicious applications and cyber threats

Using anti-phishing capabilities, Harmony Mobile detects and blocks malicious domains and web applications, preventing phishing and other cyber threats, thereby protecting users' devices and data. Using the Behavioral Risk Engine and artificial intelligence, the solution can prevent advanced threats when files are downloaded to mobile devices, including zero-day attacks;

Access control and botnet threat prevention

Harmony Mobile blocks access to the company' data and applications if the mobile device is infected with malware and, in the case of malicious bot-net components, the solution blocks the device access to command and control centers;

Protection against DNS spoofing, Man-in-the-Middle (MitM) and WiFi attacks

Harmony Mobile provides options for controlling DNS settings on mobile devices, thus preventing attacks that intercept and modify DNS requests, thus blocking MitM attacks. Abnormal behavior in WiFi networks is also detected and access to malicious applications is blocked;

Identifying risks at the level of operating systems and preventing the exploitation of vulnerabilities

Harmony Mobile implements a mechanism for detecting and preventing the vulnerabilities of the Android and iOS operating systems, being able to detect risky configurations and altered operating systems through privileged access (root/jailbreak);

Conditional access to company data and applications

If the risk score of the mobile device is high, access to company data and applications stored in the encrypted container of the Check Point Capsule Workspace security solution is not allowed;

Integration with existing security infrastructure

Integrates with existing Check Point solutions and other security appliances to provide coordinated protection and centralized threat visibility.

What is the role of the Check Point Enterprise Mobile Security solution?

Check Point Harmony Mobile and Capsule Workspace are designed to meet the security needs of organizations in the context of using mobile devices in the business environment.

They provide protection against cyber threats, centralized management and access control, data encryption and other relevant functionalities to ensure data security and protection in this context.

The integration of Check Point security solutions with SIEM systems allows continuous monitoring and prompt response to security incidents.

Key features of Check Point Capsule Workspace

Check Point Capsule Workspace provides the following functionality:

Separation of personal and professional data

Capsule Workspace uses an encrypted container technology to create a separate and secure environment for business applications and data, keeping it separate from users' personal information;

Centralized application management

Allows administrators to manage access to business applications on users' mobile devices;

Data security and secure access

Capsule Workspace provides encryption for company data stored on mobile devices and ensures secure access to them through VPN and multi-factor authentication (MFA);

Control and reporting of application usage and business data

Centralized management of mobile devices allows monitoring and reporting of their use, ensuring compliance with security policies and regulations in force.

Maximum efficiency with Safetech Innovations services

Safetech Innovations is an established security service provider on the Romanian market. The company is accredited by Check Point as a Collaborative Support Service Provider (CCSP) and is a “Three Star” level partner, ensuring services at a high level of quality. With advanced skills in Check Point technologies for networks, endpoint devices and cloud solutions, Safetech has extensive experience in implementing multiple cyber security projects.

Capitalizing on these resources, Safetech can provide companies with complete implementation, configuration and customization services of Check Point security technologies, so that the offered solution optimally covers the specific requirements of the clients’ business environments. At the same time, Safetech performs the integration with advanced security and IT solutions within the client’s infrastructure.

Our IT security systems integration services include:

Requirements analysis and system design

Requirements analysis and system design

Analysis of project objectives, requirements and constraints, identification of risks, design of integrated architecture, development of a detailed project plan for the integration of various components and subsystems



Delivering and installing products, configuring, testing, implementing and optimizing the integrated system, verifying that all components work together as planned, training system administrators on how to use the solution

Technical support and service

Technical support and service

Providing technical support and service to ensure the continuous operation of the system optimally, meeting the needs of the organization

Another significant advantage of collaborating with Safetech is the possibility of integrating Check Point security solutions with CERT (Computer Emergency Response Team) services provided by the company. Through this integration, Safetech’s team of certified specialists can detect threats early and provide rapid responses to prevent potential damage. Using the information provided by the platform, the CERT team can analyze incidents in depth, identifying the sources and methods of attack, as well as their impact on the infrastructure. Also, by using preconfigured workflows and policies, automated remediation and protection actions can be implemented, reducing response time and minimizing the impact of attacks.