Overview:
    Remote work is the new norm. Efforts to slow the spread of COVID-19 accelerated the transition of employees working from
home and accessing corporate resources securely through various VPN (Virtual Private Network) technologies. In a recent
Gartner CFO survey 74% of companies said they intend to shift employees to work from home permanently.
    Check Point Mobile Access is the safe and easy solution to securely connect to corporate applications over the Internet with your  Smartphone, tablet or personal computer (PC). Mobile Access allows remote and mobile workers to simply and securely connect  to email, calendar, contacts and corporate applications. Because it’s fully integrated into the Check Point network security suite,  administrators can easily set policy and monitor remote user’s use of corporate assets.
    
    
      
        
          
          Flexible
          Easy access for mobile workers – simply connect from mobile devices to secure connectivity for smartphones, tablets, PCs and laptops
         
        
          
          Secure
          Communicate securely with proven encryption technology, two-factor authentication, and User-Device pairing to eliminate network security threats
         
        
          
          Unified
          Easily deploy and manage on your existing security gateways with full integration into the Check Point Infinity Architecture
         
       
	  
	  
        
          Full Layer-3 VPN Technology using a Client
          IPsec VPNs authenticate and encrypt every communication  session. Layer-3 VPN technology is highly scalable and  allows flexible any-to-any connectivity.
          
         
        
          Encrypted SSL/TLS VPN using a Browser
          Encrypt communications from unmanaged mobile devices.  Both web-based and network-level access through SSL/TLS  encryption is delivered through a browser.
          
         
       
     
    
    
    
   
    Benefits:
    Simply connect from mobile devices
    
     - Secure connectivity for smartphones, tablets, PCs and laptops
- Provides client-based and web-based VPN connectivity
- Easy access for mobile workers using managed or unmanaged devices
Keeps your data secure
    
     - Communicate security with proven encryption technology
- Verify authorized users with two-factor authentication and User-Device pairing
Unified management for simple deployment and administration
    
     - Fully integrated with Check Point Security Policy Manager
- Activate user-certificates with one click
- Deploy and configure the Mobile Access Software Blade on your existing Security Gateway
 
   
    Features:
    Spotlight on the Web Portal
    The Web Portal is best for connecting securely to corporate resources from a web browser. Through an integrated web portal,  users can access native corporate applications including web-based resources, shared file and email. Administrators can  customize the design of the web portal to match their corporate brand identity. Mobile Access offers secure SSL/TLS VPN  transport, strong multi-factor authentication and Role-based Access Control (RBAC).    
    
      Connect from Everywhere - Web, Mobile and Desktop
    DynamicID™ Direct SMS Authentication
      Mobile Access can be configured to send a One-Time Password (OTP) to an end-user device such as a mobile phone via an SMS  message. SMS two-factor authentication provides an extra level of security while eliminating the difficulties associated with  managing hardware tokens.
    Compliance Scanner
      An endpoint compliance scanner ensures that connecting endpoints are compliant with corporate policy. Out-of-compliance users  are offered links to self-remediation resources. Enforce your corporate compliance policy for Windows, macOS and Linux  endpoints.
    SSL Network Extender (SNX, an On-demand Client)
      Best for secure connectivity to corporate resources using non- web-based applications via an on-demand, dissolvable client. The  SSL Network Extender (SNX) is used for remote users who need access to network (non-web-based) applications. SSL Network  Extender is downloaded automatically from the SSL VPN portal to the endpoint machines, so that client software does not have to  be pre-installed and configured on users' PCs and laptops. SNX delivers full network connectivity for IP-based applications  including a Layer-3 tunnel to connect to your corporate resources. It supports IP-based applications, including ICMP, TCP, and  UDP, without requiring complex configuration to support each application. SNX Application Mode works without requiring  administrative privileges and establishes a VPN tunnel for the specified applications.
    Secure Workspace
      End-users can utilize the Check Point virtual desktop that enables data protection during user sessions and enables cache wiping  after the sessions have ended. Secure Workspace protects all session-specific data accumulated on the client side and creates a  secure virtual environment insulated from the host. Browser and application caches, files, etc. are encrypted and then deleted  when session ends.
    Spotlight on Clinets
    Check Point Capsule VPN (for Windows 10, 8.1)
      Securely Access all your corporate resources from your device through a Virtual Private Network (VPN) tunnel. As you launch  business applications such as RDP, VoIP or any other app on your mobile device, all transmitted data to corporate is encrypted,  without any additional actions required by you.
    Check Point Capsule Connect and Capsule VPN (for iOS and Android)
      Check Point Connect for iOS and Capsule VPN for Android are simple client-to-site VPN clients available on mobile devices.  Simply set up the site and connections to assets protected by the site gateway are secured by an IPsec or SSL VPN.
    Check Point Capsule Workspace (for iOS and Android)
      Check Point Capsule Workspace is a mobile security container on iOS and Android devices that creates an isolated corporate  workspace on personal devices, making it simple to secure corporate data and assets both inside and outside the corporate  network. Check Point Capsule Workspace protects and manages enterprise apps and data without needing to manage Mobile  Device Management (MDM) profiles. So no matter which team is responsible for supporting smartphones and tablets, they’ll value  how Capsule Workspace secures mobile environments with ease – including BYOD.
    Capsule Workspace is easy to deploy and manage, helping to reduce the time, effort, and cost of keeping mobile devices and data  secure. Once deployed, it creates an AES256-bit encrypted container for enterprise apps and data that puts you in control of the  sensitive enterprise information you need to protect. It never touches the personal apps, media, or content, on a device which  helps improve end user adoption, even on personally-owned devices. Users will also appreciate the native experience and onetouch access Capsule Workspace provides to the critical enterprise apps they need to stay in touch on the go. It supports Microsoft  Exchange Server and Office 365 email, calendar, and contacts, and includes secure enterprise instant messaging and document  access.
    Rapid and Flexible Deployment
      With SmartConsole, companies can email users at their  leisure with information on how to download the Mobile  client directly to users’ smartphones. Multiple ways to  distribute notice of a Mobile client are available as well as  choosing what Mobile client will be available for users  using customized emails.
    Endpoint VPN Clients (for Windows and macOS)
      Mobile Access is part of our larger remote access solution.  For additional endpoint protection, install our endpoint  VPN client with or without the full Endpoint Security suite.  Privacy and integrity of sensitive information is ensured  through multi-factor authentication, endpoint system  compliance scanning and encryption of all transmitted  data. The VPN client has the ability to transparently  establish a VPN tunnel upon demand when accessing  corporate resources. The connection is re-established  when roaming between networks and automatically tears  down the VPN tunnel when the device is connected to the  local corporate network. 
    
   
    Specifications:
	
    
     
     
      | iOS | 3.1.3 and above | 
     
      | Android | 2.1 and above | 
     
      | Windows | XP, Vista, Windows -Layer-3 VPN Client | 
     
     
      | iOS | 5.0 and above | 
     
     
      | Internet Explorer | 5.5 and above | 
     
      | Firefox | 1.0.3 and above | 
     
      | Safari | All | 
     
     
      | Hardware | 
        Check Point 2200, 4000, 12000, 21400 and 61000 AppliancesCheck Point Power-1Check Point UTM-1Check Point IAS | 
     
      | Operating System | 
        GAiA R75.40 or laterSecurePlatform  R71.30 or laterCheck Point Mobile VPN requires R71.50 or later. | 
     
     
      | Check Point | 
        GAiASecurePlatformIPSO 6.2 disk-based  | 
     
      | Windows | Server 2003/2008- 32-bit | 
     
      | Linux | RHEL 5.0/5.4 32-bit | 
     
      | Sun/Oracle (SPARC) | Solaris 8, 9, 10 | 
     
     
      | PC | Windows 7 32/64-bit, Vista 32/64-bit, XP 32-bit | Internet Explorer 5.5 and above, Firefox 1.0.3 and above | 
     
      | Mac | Mac 10.4 and above | Safari | 
     
      | Linux | Fedora 8, Ubuntu 7, RHEL 3.0, Suse 9 & above, Red Hat 7.3 | Firefox 1.0.3 and above | 
    
    *Security Management Server R71.10 required