Call a Specialist Today! 020 3893 1922 | Free Delivery! Free Delivery!


Check Point Mobile Access Software Blade
Provides enterprise-grade remote access via both Layer-3 VPN and SSL VPN


Check Point Mobile Access Software Blade


Check Point Mobile Access is the safe and easy solution to securely connect to corporate applications over the Internet with your Smartphone, tablet or PC. Integrated into the Check Point Infinity Architecture, Mobile Access provides enterprise-grade remote access via both Layer-3 VPN and SSL/TLS VPN, allowing you to simply and securely connect to your email, calendar, contacts and corporate applications.


Check Point Products
Check Point Security Gateway Blade
Mobile Access Blade for unlimited concurrent connections
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-U
Our Price: Request a Quote

Click here to jump to more pricing!

Please Note: All prices displayed are Ex-VAT. 20% VAT is added during the checkout process.

Overview:

Remote work is the new norm. Efforts to slow the spread of COVID-19 accelerated the transition of employees working from home and accessing corporate resources securely through various VPN (Virtual Private Network) technologies. In a recent Gartner CFO survey 74% of companies said they intend to shift employees to work from home permanently.

Check Point Mobile Access is the safe and easy solution to securely connect to corporate applications over the Internet with your Smartphone, tablet or personal computer (PC). Mobile Access allows remote and mobile workers to simply and securely connect to email, calendar, contacts and corporate applications. Because it’s fully integrated into the Check Point network security suite, administrators can easily set policy and monitor remote user’s use of corporate assets.


Flexible

Flexible

Easy access for mobile workers - simply connect from mobile devices to secure connectivity for smartphones, tablets, PCs and laptops

Secure

Secure

Communicate securely with proven encryption technology, two-factor authentication, and User-Device pairing to eliminate network security threats

Unified

Unified

Easily deploy and manage on your existing security gateways with full integration into the Check Point Infinity Architecture


Full Layer-3 VPN Technology using a Client

IPsec VPNs authenticate and encrypt every communication session. Layer-3 VPN technology is highly scalable and allows flexible any-to-any connectivity.

Full Layer-3 VPN Technology using a Client

Encrypted SSL/TLS VPN using a Browser

Encrypt communications from unmanaged mobile devices. Both web-based and network-level access through SSL/TLS encryption is delivered through a browser.

Encrypted SSL/TLS VPN using a Browser


Next Generation Firewall is more than just a firewall

Pricing Notes:

Check Point Products
Check Point Security Gateway Blade
Mobile Access Blade for unlimited concurrent connections
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-U
Our Price: Request a Quote
Check Point Security Gateway Blades for High Availability
Mobile Access Blade for up to 50 concurrent connections for High Availability
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-50-HA
Our Price: Request a Quote
Mobile Access Blade for up to 200 concurrent connections for High Availability
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-200-HA
Our Price: Request a Quote
Mobile Access Blade for unlimited concurrent connections for High Availability
*The purchase of a Security Gateway container is required per user
#CPSB-MOB-U-HA
Our Price: Request a Quote