Secure Palm M Security
This is a digital product. Upon purchase, an activation code will be sent to the email ID that was registered with your SecurePalm Account
Don’t fall prey to online threats. Stay safe with the Secure Palm M Security3 total security.
Say No to Attacks
With the Secure Palm M Security , you won’t have to worry about online attacks such as infected apps, jailbreaking or Wifi attacks. So use your smartphone anytime, anywhere without worrying about your confidential information getting hacked.
Protection from Damage
With this app installed on your Apple or Android phone, you can stay assured of making online payments, storing confidential details, and having an active location sharing as this app ensures that hackers don’t break into your corporate networks, tracks location, steal emails or contacts.
Protection from Wifi Attacks
Use net banking and other online payments without worrying with the Secure Palm M Security installed on your phone. This app detects man-in-the-middle activities and ensures safe online transactions. What’s more, the Secure Palm M Security also detects configuration changes and other malicious apps.
Many of us would rather give up one of our limbs than stop using our mobile phones or tablets. But as we become more addicted to mobiles, it means more opportunities to be infected by malware and other exploits. And if our phones are infected, chances are attackers can use them as a gateway to our corporate networks. Mobile threats are on the rise, due to a perfect storm of circumstances. Mobile devices have traditionally been less protected than desktops, and the amount of malware in app stores is increasing. Some apps that claim to protect users are really infection vectors, known as ‘FakeAV’. Millions of users have downloaded these apps, quickly turning BYOD into BYOT -- Bring Your Own Trouble
In addition, reading emails on your phone means you have less time and less screen real estate to scrutinize their content, making it more likely you will open a fished attachment, click on a malicious link & open the device to other threats.
Secure Palm M Security
Hackers constantly modify their strategies and techniques to evade detection and reach corporate resources. Zero-day protection from Check Point provides a deeper level of inspection so you can prevent more malware and zero-day attacks, while ensuring quick delivery of safe content to your users.
Detect, assess and mitigate advanced mobile security threats
Protect sensitive business data at rest, in use and in transit on iOS and Android mobile devices from cyber attacks
Improve visibility and protection through integration with existing mobility and security systems (MDM, MAM, NAC, SIEM, etc.)
Enable rapid response to cross-platform advanced persistent threat (APT) attacks
Preserve user experience and privacy, while adding the protection required by organizational or regulatory mandates
Detect and stop attacks before they start
Smart phones and tablets give us unprecedented access to the critical business information we need to work faster and more accurately. Providing your employees with access to that information on the mobile devices they choose has many benefits, but it also exposes your business to risk.
Check Point Secure Palm M Security Mobile, an innovative approach to mobile security for iOS and Android devices, detects and stops mobile threats before they start. Whether your data’s at rest on a device or in flight through the cloud, Secure Palm M Security Mobile helps protect you from vulnerabilities and attacks that put data at risk.
Highest level of mobile security for the enterprise
Only Check Point provides a complete mobile security solution that protects devices from threats on the device (OS), in apps, in the network, and in SMS messages, delivering the industry’s highest threat catch rate for iOS and Android. Secure Palm M Security Mobile uses malicious app detection to find known and unknown threats by applying threat emulation, advanced static code analysis, app reputation, and machine learning.
It safeguards devices from unprotected Wi-Fi® network access and man-in-the middle attacks and stops access to corporate networks when a threat is detected. It uses real-time risk assessments at the device-level (OS) to reduce the attack surface by detecting attacks, vulnerabilities, changes in configurations, and advanced rooting and jail breaking. Its dynamic threat response prevents compromised devices from accessing your organization’s network, and allows your organization to set adaptive policy controls based on unique thresholds for mitigation and elimination of threats on the device.
Advanced app analysis
You can trust your employees to access your sensitive business assets, but can you trust their apps? Secure Palm M Security Mobile captures apps as they are downloaded to devices, and runs each in a virtual, cloud-based environment to analyze its behavior before being approved or flagged as malicious. Easy to understand, exportable analysis reports help your security teams ensure apps employees use are safe.
Public places are filled with unsecured Wi-Fi networks, making it difficult to know which networks are safe and which aren’t. Cyber criminals can use these networks to hijack smart phones and tablets, assuming control of devices and valuable data like messages, files, and network credentials. Secure Palm M Security Mobile detects malicious network behavior and conditions, and automatically disables suspicious networks to keep devices and data safe.
Device vulnerability assessments
Cyber criminals make it their business to know the weakest link in your security before you do. That often includes weaknesses in operating systems and apps that other security solutions may not detect. Our solution continuously analyzes devices to uncover vulnerabilities and behaviors cyber criminals use to attack devices and steal information. With better visibility into the threats mobile devices face, you can reduce the overall attack surface and risk.
SMS fishing attacks
SMS fishing, also known as SMiShing, is a form of fraud in which the attacker tries to learn information such as login credentials or account information by masquerading as a reputable entity or person in SMS messages. A victim receives an SMS text message that appears to have been sent by a known contact or organization. Links in the message may install malware on the user’s device or direct the user to a malicious website set-up to trick them into divulging personal and financial information, such as passwords, account IDs, or credit card details. The solution detects malicious SMS messages and blocks them. Secure Palm M Security Mobile Anti-SMS fishing attacks is powered by ThreatCloud™, the industry’s largest collaborative network and cloud-driven knowledge base that delivers real-time, dynamic security intelligence.
Full mobile threat visibility and intelligence
Secure Palm M Security Mobile’s cloud-based dashboard makes managing supported devices and controlling mobile threats fast and easy. It provides your security and mobility teams with real-time threat intelligence and visibility into the quantity and types of mobile threats that could impact your business or users.
Integrate intelligence with existing systems
Secure Palm M Security Mobile’s stream of real-time threat intelligence pushes to Check Point SmartEvent automatically for monitoring of security events and for correlation with attacks on internal networks. There, this information is shared and correlated in Check Point’s ThreatCloud™, providing the broadest set of threat intelligence that can be used within network environments to prevent cyber-attacks from occurring. Threat intelligence can also be fed into existing enterprise systems like your security information and event management (SIEM) platform. This includes detailed logs and other indicators of compromise that can be filtered to trigger response actions that help your security team take action quickly to control and eliminate risk.
Deploying mobile security has never been easier
Security and mobility teams have enough to worry about. That’s why Secure Palm M Security Mobile is designed to help them secure mobile devices quickly and confidently through integration and cooperation with MDM or EMM solutions. This helps make the solution highly scalable, and delivers strong operational and deployment efficiencies for managing mobile security within a broader security infrastructure.
Deploy advanced mobile security with ease
Whether you support 300 or 300,000 devices, integrating Secure Palm M Security Mobile with your EMM is fast and easy. Deployment and management can be done through your EMM automatically, accelerating adoption and reducing overall operational costs. The solution scales with your EMM, seamlessly protecting enrolled mobile devices. As a result, you can rest assured you have the layers of security you need to both manage and protect mobile devices, even in a highly dynamic environment.
Mitigate and eliminate threats right on the device
When a threat is identified, Secure Palm M Security Mobile automatically mitigates any risk until the threat is eliminated. If a threat can be eliminated on a device immediately, users are notified and prompted to take action, like deleting malicious apps or disconnecting from hostile networks. Integration with your EMM allows the solution to restrict secure container access, or make real-time, risk based policy adjustments on compromised devices that EMMs on their own can’t make. Secure Palm M Security Mobile also activates an on demand VPN to tunnel data traffic away from cyber criminals and to avoid data ex filtration while still keeping users connected
Respect user privacy and device performance
End-user privacy is critical, so Secure Palm M Security Mobile never analyzes files, browser histories, or application data. The solution uses state and context Meta data from operating systems, apps, and networks to determine if a device is compromised. It anonymousness the data it uses for analysis to keep it and security intelligence information separated. The analysis is performed in the cloud to avoid impacting device performance, and since protection runs in the background, users are protected without having to learn anything new.
Deploy any iOS or Android mobile device on your organization’s network with confidence
Protect sensitive information on mobile devices from espionage
Improve visibility and protection against the latest mobile threats with mobile security that integrates easily into your existing mobility and security infrastructures (MDM, MAM, NAC, SIEM, etc.)
Augment the security measures of Microsoft Exchange and container/wrapper solutions
Enable rapid response to cross platform advanced persistent threat (APT) attacks
Enable contractors to access corporate data safely from unmanaged devices
Preserve user experience and privacy, while adding the protection required by organizational or regulatory mandates
1. What is Secure Palm M Security Mobile Security?
Secure Palm M Security Mobile Security is a mobile security application that provides a suite of services that protects mobile users from online attacks, viruses and spyware so you are assured that your mobile device and personal data are protected as you surf the web and download files.
2. What mobile operating systems do Secure Palm M Security Mobile Security support?
Secure Palm M Security Mobile Security supports both IOS (9.0 and Above) and Android (4.2 and above).
3. When I change from iOS to Android or vice versa, can the same subscription work on the new phone?
Yes, the subscription will still work on your new phone. You will need to request for a new code by calling Customer Service to install into the new device.
4. What happens if I switch devices frequently? (Eg: iPhone on weekdays and Android on weekends) Is the subscription interchangeable in this regard?
The Secure Palm M Security Mobile Security application will only work on one device (regardless of operating systems) at any one time. A new code must be requested regardless of whether or not it had Secure Palm M Security installed previously.
5. Can I install Secure Palm M Security Mobile Security in my memory card?
Secure Palm M Security Mobile Security is not installed in memory card. It is installed in your mobile device’s onboard memory.
6. I did not receive the activation SMS. How do I request for the activation SMS again?
Please call our Customer Service to request for a new activation SMS.
7. I have subscribed to other security provider. Can I still subscribe to Secure Palm M Security?
You can subscribe to Secure Palm M Security even if your phone is already covered by another mobile security app. However, we suggest that you cancel the subscription for the other security provider to avoid paying for both services.
8. I have downloaded the trial version of Secure Palm M Security from App Store/ Play Store. How do I subscribe to Secure Palm M Security with Hutchison?
Please call our Customer Service to subscribe to the service. Once you receive the activation SMS, follow the instructions to activate the service.
9. Will Secure Palm M Security Mobile Security drain my battery faster?
Battery drain due to the running of Secure Palm M Security Mobile Security is negligible.
10. Can Secure Palm M Security Mobile Security protect my SIM card too?
Secure Palm M Security Mobile Security does not provide security for your SIM card. Secure Palm M Security Mobile Security is a mobile security application that provides a suite of services that protects mobile users from online and application attacks, viruses and spyware so you are assured that your mobile device and personal data are protected as you surf the web.
11. What kind of malicious software does Secure Palm M Security Mobile Security detect?
Secure Palm M Security Mobile Security protects your mobile device from mobile malware and other digital threats including viruses, worms, spyware and other potential threats.
12. How often does Secure Palm M Security Mobile Security scan for viruses?
Secure Palm M Security automatically scans your device in every 4 hours. You can run a manual scan any time as well.
13. What does Secure Palm M Security Mobile Security scan?
Secure Palm M Security Mobile Security scans the applications on your mobile device.
14. Does Secure Palm M Security Mobile Security scan message content and attachments?
It does not scan message content and attachments.
15. Does Secure Palm M Security Mobile Security detect viruses in the memory card?
Secure Palm M Security Mobile Security scans the applications in your phone.
16. Can Secure Palm M Security Mobile Security stop over-the-air hacking attempts?
Secure Palm M Security Mobile Security prevents the download of malicious and infected applications over-the-air. Secure Palm M Security network protection layer is focused on protection on hotspots. It does not, however, block communication sent with, Bluetooth, or IrDA interfaces.
17. If I had ignored a virus warning earlier, how can I remove the virus?
You can run a manual scan to see the warning again. If you ignored the warning of a malicious application, Secure Palm M Security Mobile Security will automatically remind you to remove the threat the next time you run the application.
18. I have not checked for Secure Palm M Security Mobile Security updates in a while. Am I still protected?
Secure Palm M Security will still scan regularly in the background however, please do ensure that the application is updated regularly to maximize the level of protection offered. Either check in the application’s setting that it will update automatically or perform a manual update on a regular basis.
19. How can I see when Secure Palm M Security Mobile Security was last updated and when it performed the last scan of my mobile phone?
The last update to the app will not be displayed however, you can perform a manual check and update of the app at any point.
The last scan performed of the mobile device will be shown on the screen when you launch the app.
20. I am worried about data charges.
Secure Palm M Security uses a minimal amount of data to scan your applications. The application uses between 2-5Mb a month, depending on the number of applications installed on the phone that has to be scanned through.