Solution Architecture

 

 

Component

Description

1

Harmony Mobile Protect app

  • The Harmony Mobile Protect App is a lightweight app for iOS® and Android™ that gathers data and helps analyze threats to devices in an Enterprise environment. It monitors operating systems and information about apps and network connections and provides data to the solution which it uses to identify suspicious or malicious behavior.

  • To protect user privacy, the App examines critical risk indicators found in the anonymized data it collects.

  • The App performs some analysis on the device while resource-intensive analysis is performed in the cloud. This approach minimizes impact on device performance and battery life without changing the end-user experience.

2

UEMClosed Unified Endpoint Management. An architecture and approach that controls different types of devices such as computers, smartphones and IoT devices from a centralized command point.

3

Harmony Mobile Gateway

  • The cloud-based Check Point Harmony Mobile Gateway is a multi-tenant architecture to which mobile devices are registered.

  • The Gateway handles all Solution communications with enrolled mobile devices and with the customer's (organization's) Dashboard instance.

  • No Personal Information is processed by or stored in the Gateway.

4

Harmony Mobile Management Dashboard

  • The cloud-based web-GUI Harmony Mobile Management Dashboard enables administration, provisioning, and monitoring of devices and policies and is configured as a per-customer instance.

  • The Dashboard can be integrated with an existing Unified Endpoint Management (UEM) solution for automated policy enforcement on devices at risk.

  • When using this integration, the UEM serves as a repository with which the Dashboard syncs enrolled devices and identities.

5

Behavioral Risk Engine

  • The cloud-based Harmony Mobile Behavioral Risk Engine (BREClosed Behavioral Risk Engine) uses data it receives from the App about network, configuration, and operating system integrity data, and information about installed apps to perform in-depth mobile threat analysis.

  • The Engine uses this data to detect and analyze suspicious activity, and produces a risk score based on the threat type and severity.

  • The risk score determines if and what automatic mitigation action is needed to keep a device and its data protected.

  • No Personal Information is processed by or stored in the Engine.

6

ThreatCloud

  • Check Point's ThreatCloud is the world largest Indicators of Compromise (IoC) database that incorporates real-time threat intelligence from hundreds of thousand Check Point gateways and from millions of endpoints across the globe.