About Check Point Sandblast mobile

Accurate threat detection and efficient response are critical components of preventing advanced attacks on smartphones and tablets. Traditional anti-virus and app reputation solutions can identify known threats, but they can’t detect zero-day malware or vulnerabilities in networks, operating systems, SMS messages, and apps.



  • Web


Operating system

  • mac

    Mac OS

  • A


Best suitable for

Size :








Organization type :


Mid Market






Industries :

  • All Industries

About Check Point

Check Point Software Technologies Ltd. is a leading IT security industry established in 1993 with its patented stateful inspection technology, which is still the foundation for most network security technology today. The company aims at developing numerous technologies that help secure the use of the internet by corporates and consumers while transacting and communicating.
view more products by Check Point

Client References



Dehnam Capital

Dehnam Capital








Everybody uses public Wi-Fi® hotspots, but there are easy ways to fool users into joining fake, malicious networks. Cybercriminals use these man-in-the-middle (MitM) attacks to intercept communications between two or more parties, allowing them to capture or alter data in transit. Two common kinds of MitM attacks are SSL stripping and SSL bumping. SSL stripping circumvents automatic redirection to secure HTTPS connections, and SSL bumping uses fake SSL certificates to fool apps and browsers into believing they’re using private web connections.


SandBlast Mobile’s SMS Phishing Protection feature detects malicious links, including tiny URLs, in SMS messages and alerts the user through the SandBlast Mobile Protect app notifications. The user is provided detailed information about the threat, with a recommendation to delete the message. Once the message is deleted, the alert is removed.

Check Point ThreatCloud is the first collaborative network to fight cybercrime. It is a knowledge base that delivers real-time, dynamic security intelligence. That intelligence is used to identify emerging outbreaks and threat trends. ThreatCloud also powers the SMS phishing protection capability for SandBlast Mobile, investigating malicious IP, URL, and DNS addresses.

Apps are an easy, effective way for cybercriminals to launch sophisticated, targeted attacks. That’s because most users implicitly trust apps they install no matter from where they’re downloaded. Making matters worse, most users don’t understand or read the permissions they grant during installation. Malicious apps can enable a host of activities like exfiltration of sensitive data, or remotely seizing control of sensors like the camera and microphone to spy on users and their surroundings. The best way to protect devices and data from these risks is to take a multi-layered approach to detecting and stopping app-based threats.

Much like a person can be identified by his or her unique fingerprint, malicious code in apps can be uncovered by looking for unique binary signatures. These scans provide an important first line of defense, but known malware families can be obfuscated, allowing them to bypass signature-based solutions. As part of its behavioral analysis, Check Point SandBlast Mobile immediately detects patterns of known attacks, but it also uses a number advanced detection methods designed to uncover unknown or zero-day threats AV signature scans alone cannot detect.

Some trustworthy apps can exhibit risky behavior. This causes false-positive headaches for IT and a poor experience for end users who might be blocked from using completely safe apps. Facebook, for example, syncs and uploads contact details, calendar records and even records voice during status updates.

Gaining root access to a smartphone or tablet (also called “rooting” on Android and “jailbreaking” on iOS) is no longer something just gadget enthusiasts do so they can tinker with a device. Root access enables a wide range of customizations, and it gives users more access to do as they please with their devices. It also gives cybercriminals greater access, which exposes devices and data to risk.

  • ON-DEVICE MITIGATION:- A secure channel can be triggered automatically using a virtual private network (VPN) that protects the privacy and integrity of communications and minimizes the impact of an attack; on-demand, proactive user notifications that contain remediation steps to remove malware and block data exfiltration.
  • NETWORK-BASED MITIGATION:- Active device protection delivers on-demand blocking of malware to defend against new, emerging and targeted attacks, spyware, drive-by attacks and MitM attacks.
  • MDM/EMM ACTIONS:- MDM or EMM solutions manage devices and static policies that don’t change with the security posture of a device. Through integration with these systems, SandBlast Mobile dynamically changes access privileges to reflect current risk levels, transforming static management policies into active device protection.

Plans and Pricing


Check Point Sandblast Mobile


  • Privacy and performance
  • Network analysis
  • Sms phishing analysis
  • Threatcloud
  • Configuration analysis
  • Dynamic sandbox emulation


SandBlast Mobile Security: Man-in-the-Middle Mobile Attacks



Add Review

Adarsh Soni

Techjockey was helpful and responsive

21st August, 2018

Ease of Feature

Ease of Use

Value for money

Customer Service

  • Pros -
  • I reached out to Techjockey for some advice on software and hardware. I got quick answers and the companies recommended got back to me very quickly as well. I think this model for finding out about services andsoftware is a sound one for individuals and companies who don't have the time to research every single option in the marketplace.
  • Cons -
  • No Cons

Is this product information sufficient?