Appdome Joins Check Point Technology Partner Program, Introduces Appdome for SandBlast App Protect

Solution Empowers Organizations to Implement Mobile Security with a Fast, No-Code Solution

SAN FRANCISCO — April 9, 2020 Appdome, the industry defining, no-code mobile integration and solutions platform, today announced that it has joined Check Point Software Technologies’ (NASDAQ: CHKP) OPSEC Technology Partner Program. Appdome is also introducing Appdome for SandBlast App Protect, a no-code solution that empowers organizations to build Check Point’s mobile threat defense service into Android and iOS apps and combine it with Appdome app-level security to achieve comprehensive protection.

CISOs are aware of the need for mobile app security, but they often lack the ability to control product roadmaps or assign development resources. Organizations using Appdome can build the Check Point SandBlast App Protect service into any app, with no development resources or coding required.

“With SandBlast App Protect, mobile developers can secure their iOS and Android customer facing apps, and Appdome makes it so incredibly easy to build the SDK into any app,” said Itai Greenberg, vice president of product management and marketing at Check Point. “Once SandBlast App Protect is incorporated into an app, it is able to understand the environment in which it is operating, assess its risk, and prevent compromise from a wide array of threats.”

Check Point Sandblast protects against known and unknown mobile threats, including malicious apps, Man-in-the-Middle, keylogging, mobile malware, OS vulnerabilities, and command and control exploits. Appdome for Check Point SandBlast App Protect also is self-defending, as Appdome’s ONEShield app hardening is added to each implementation. Check Point can complement the Sandblast implementation with Appdome’s comprehensive Appdome Mobile Security Suite to add mobile data encryption, code obfuscation, OS integrity and more.

Appdome CEO Tom Tovar said, “By becoming a Check Point OPSEC technology partner, Appdome helps remove the product friction that emerges when CISOs ask for additional security or product security. Appdome for SandBlast App Protect and the Appdome Mobile Security Suite put CISOs in the driver’s seat when it comes to mobile security, eliminating all excuses for putting off ensuring apps are safe from cyber threats.”

For more information on Appdome for SandBlast App Protect, please visit https:///consumer-apps/mobile-thread-defense/checkpoint-sandblast-app-protect/ or watch this two-minute video.

About Appdome
Appdome changes the way people build mobile apps. Appdome’s industry defining no-code mobile solutions platform uses a patented, artificial-intelligence coding technology to power a self-serve, user-friendly service that anyone can use to build new security, authentication, access, enterprise mobility, mobile threat, analytics and more into any Android and iOS app instantly. There are over 25,000 unique combinations of mobile features, kits, vendors, standards, SDKs and APIs available on Appdome. Over 150+ leading financial, healthcare, government, and m-commerce providers use Appdome to consistently deliver richer and safer mobile experiences to millions of mobile end users, eliminating complex development and accelerating mobile app lifecycles. For more information, visit www.appdome.com.

Media Contact:
Jeff Miller
appdome@nonfictionagency.com
541-207-3461

Avita Flit

Have a question?

ask an expert

GilWe're here to help
We'll get back to you in 24 hours to schedule your demo.

Search Appdome Solutions

Search
3f0fcc71 0fcd 4d11 8187 0554f04e965e

How to Comply with the OWASP MASVS Standard

The OWASP MASVS (Mobile Application Security Verification Standard) is a standard that establishes mobile app security requirements for developers to build secure mobile apps and security teams to test mobile apps. On Appdome, brands can easily comply with the OWASP MASVS standard.

Spear Phishing Attacks Blog

AI Has Democratized Spear Phishing Attacks, Now What?

Spear phishing attacks used to be limited to high-profile targets such as CEOs, politicians, and other influential individuals. These attacks required extensive research, preparation, and coordination, making them a…