Info Pulse Now

HOMEcorporateentertainmentresearchmiscwellnessathletics

Check Point expands Harmony SASE with Enterprise Browser, delivering Zero Trust to any device


Check Point expands Harmony SASE with Enterprise Browser, delivering Zero Trust to any device

Enterprise Browser secures access on unmanaged devices without compromising compliance or productivity.

Check Point Software Technologies, a pioneer and global leader of cybersecurity solutions, has announced Enterprise Browser, a powerful new feature for Check Point Harmony SASE customers. Enterprise Browser extends Zero Trust security to unmanaged devices -- contractors, BYOD users and third-party partners -- delivering full visibility, granular policy enforcement and compliance-ready data protection without persistent agents or endpoint ownership.

As hybrid workforces and third-party ecosystems grow, unmanaged devices have become one of the largest security blind spots. Organisations face heightened risks including data leakage, compliance gaps and limited visibility into device hygiene. Traditional approaches, such as provisioning VPN access or providing laptops, are costly, inefficient and hinder today's compliance mandates like HIPAA, GDPR and NIS2.

Check Point Enterprise Browser closes this gap by transforming unmanaged devices into secure, Zero Trust-capable endpoints. Built on Chromium, the browser creates an isolated, ephemeral workspace that enforces enterprise-grade controls for the duration of each session and removes all sensitive data once closed.

"Enterprises can no longer afford to choose between productivity and security," said Amit Bareket, VP of SASE at Check Point. "Check Point Enterprise Browser delivers both. It enables fast, frictionless access for third parties and BYOD users, while giving IT teams stronger control, compliance and visibility on devices they don't manage. With the Enterprise Browser for BYOD and Harmony Browse for managed devices Check Point delivers robust browser security for our customers."

Key capabilities

* Data isolation & wipe: Enterprise applications and data remain fully isolated from the underlying OS, and sensitive data is erased at session close

* Integrated data loss prevention (DLP): Enforces restrictions on upload, download, copy/paste and printing; apply watermarking to documents and screens

* Agentless posture checks: Verifies device posture (antivirus, OS version, disk encryption) before granting access, without installing software

* Complete session visibility: Enables navigation history, screen capture and full session recording for compliance and forensic investigations

* Seamless SASE integration: Unified SSO and policy management with Harmony SASE and agentless ZTNA

Key benefits for security and business agility

* Secure unmanaged devices: Turn BYOD and contractor laptops into compliant, Zero Trust endpoints

* Accelerate onboarding: Grant safe, immediate access to third-party users without provisioning hardware or agents

* Ensure compliance: Support HIPAA, GDPR and NIS2 requirements even on untrusted devices

* Reduce risk & IT overhead: Prevent insider threats and compliance failures while eliminating costly workarounds like shipping laptops

With Check Point Enterprise Browser, organisations can finally secure what they don't own -- empowering flexible, distributed workforces without exposing critical systems or sensitive data.

Previous articleNext article

POPULAR CATEGORY

corporate

10761

entertainment

13512

research

6639

misc

13787

wellness

11227

athletics

14317