Introduction to Harmony Mobile

Check Point Harmony Mobile is the most complete threat defense solution designed to prevent emerging fifth generation cyber-attacks and allows workers to safely conduct business. Its technology protects against threats to the OS, applications, and network, scoring the industry’s highest threat catch rate without impacting performance or userClosed Personnel authorized to use network resources and applications. experience.

Harmony Mobile delivers threat prevention technology that:

  • Performs advanced app analysis to detect known and unknown threats

  • Prevents man-in-the-middle attacks on both cellular and WiFi networks

  • Blocks phishing attacks on all apps: email, messaging, social media

  • Prevents infected devices from sending sensitive data to botnets

  • Blocks infected devices from accessing corporate applications and data

  • Mitigates threats without relying on user action or mobile management platforms

Harmony Mobile uses a variety of patent-pending algorithms and detection techniques to identify mobile device risks, and triggers appropriate defense responses that protect business and personal data.

The Harmony Mobile solution ("the Solution") includes these components:

  • Harmony Mobile Behavioral Risk Engine ("the Engine")

  • Harmony Mobile Gateway ("the Gateway")

  • Harmony Mobile Management Dashboard ("the Dashboard")

  • Harmony Mobile Protect app ("the App") for iOS and Android

Solution Architecture

 

Component

Description

1

Harmony Mobile Protect app

  • The Harmony Mobile Protect app is a lightweight app for iOS® and Android™ that protects the device and helps analyze threats to devices in the Enterprise environment. It monitors operating systems device configurations, apps behavior and network connections and provides data to the Solution which it uses to identify suspicious or malicious behavior.

  • To protect user privacy, the App examines critical risk indicators found in the anonymized data it collects.

  • The App performs some analysis on the device while resource-intensive analysis is performed in the cloud. This approach minimizes impact on device performance and battery life without changing the end-user experience.

2

UEM

3

Harmony Mobile Gateway

  • The cloud-based Check Point Harmony Mobile Gateway is a multi-tenant architecture to which mobile devices are registered.

  • The Gateway handles all Solution communications with enrolled mobile devices and with the customer’s (organization’s) Dashboard instance.

  • No Personal Information is processed by or stored in the Gateway.

4

Harmony Mobile Management Dashboard

5

Behavioral Risk Engine

  • The cloud-based Harmony Mobile Behavioral Risk Engine (BRE) uses data it receives from the App about network, configuration, and operating system integrity data, and information about installed apps to perform in-depth mobile threat analysis.

  • The Engine uses this data to detect and analyze suspicious activity, and produces a risk score based on the threat type and severity.

  • The risk score determines if and what automatic mitigation action is needed to keep a device and its data protected.

  • No Personal Information is processed by or stored in the Engine.

6

ThreatCloud

  • Check Point’s ThreatCloud is the world largest incidence of compromise database that incorporates real-time threat intelligence from hundreds of thousand Check Point gateways and from millions of endpoints across the globe.

  • ThreatCloud powers the Anti-Phishing, Safe Browsing, URL Filtering and Anti-bot technologies for Harmony Mobile on-device Network Protection.

  • ThreatCloud exchanges threat intelligence with the Behavioral Risk Engine for app analysis.