Introduction to Check Point Mobile for Windows
Check Point Mobile for Windows is a remote access client for easy, secure connectivity to corporate resources over the internet, through a VPN tunnel.The Installation Process
Important - To install a Remote Access Client on any version of Windows, you need Administrator permissions. Consult with your system administrator.
To install a Remote Access Client:
1. Log in to Windows with a user name that has Administrator permissions.
2. Get the installation package from your system administrator, and double-click the installation package.
Check Point Mobile Access blade is a simple and comprehensive remote access solution that delivers
exceptional operational efficiency. It allows mobile and remote workers to connect easily and securely from
any location, with any Internet device to critical resources while protecting networks and endpoint computers
from threats. Combining the best of remote access technologies in a software blade provides flexible access
for endpoint users and simple, streamlined deployment for IT.
The ease or difﬁculty of packet snooping (also known as eavesdropping) on networks
depends largely on the technology implemented. Shared media networks are particularly
susceptible to eavesdropping because this type of network transmits packets everywhere
along the network as they travel from the origin to the ﬁnal destination. When concentrators
or hubs are used in a shared media environment (such as FDDI, 10BASE-T, or 100-Mbps
Ethernet), it can be fairly easy to insert a new node with packet-capturing capability and
then snoop the trafﬁc on the network.
Criminals (thieves, terrorists, competitors, employees, etc.)—Criminal scenarios in-
clude simply gathering information that would give knowledge of the buildings and
how to break in, or maybe getting into the security system and having doors open.
DoS attacks could be used for a variety of purposes including: making a political
statement, interfering with business, etc. Terrorists could use low security on a net-
work to shut down facility operation (i.e. as a smokescreen or disruption) that facili-
tates other destructive activity.
While opening our resources to a wide variety of end points, we need a strong access control,
and UAG includes such mechanisms to check clients, users, and groups for authorization and
to apply mandatory policies. With the release of Service Pack 2 (August 2012), UAG is now
able to interact with the most recent devices from all the biggest players in the mobile market
(Windows Phone 7.5, iOS 5.x on iPad and iPhone, and Android 4.x on tablets and phones) and,
as soon as an end point tries to connect to a UAG site, there are different publishing scenarios