Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Access Denied

    Inside the White Sox’s ‘1% Chance’ and Hot Start for Slugger Munetaka Murakami

    US Senate Committee set to consider long-awaited crypto bill next week

    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest VKontakte
    Sg Latest NewsSg Latest News
    • Home
    • Politics
    • Business
    • Technology
    • Entertainment
    • Health
    • Sports
    Sg Latest NewsSg Latest News
    Home»Technology»New enterprise browser aimed at securing BYOD and third-party devices
    Technology

    New enterprise browser aimed at securing BYOD and third-party devices

    AdminBy AdminNo Comments2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Check Point is launching a new Enterprise Browser, extending zero trust security to unmanaged devices like BYOD, contractors, and third-party partners.

    The new feature, available to Check Point Harmony SASE customers from today, delivers full visibility, granular policy enforcement, and compliance-ready data protection without persistent agents or endpoint ownership.

    As hybrid workforces and third-party ecosystems grow, unmanaged devices have become one of the largest security blind spots.

    Check Point Enterprise Browser addresses this by transforming unmanaged devices into secure, zero trust–capable endpoints. Built on Chromium, the browser creates an isolated, ephemeral workspace that enforces enterprise-grade controls for the duration of each session and removes all sensitive data once closed.

    “Enterprises can no longer afford to choose between productivity and security,” says Amit Bareket, VP of SASE at Check Point. “Check Point Enterprise Browser delivers both. It enables fast, frictionless access for third parties and BYOD users, while giving IT teams stronger control, compliance, and visibility on devices they don’t manage. With the Enterprise Browser for BYOD and Harmony Browse for managed devices, Check Point delivers robust browser security for our customers.”

    Key features include enterprise applications and data remaining fully isolated from the underlying OS, and sensitive data automatically erased at session close. There’s also integrated Data Loss Prevention (DLP) which enforces restrictions on upload, download, copy/paste, and printing; apply watermarking to documents and screens.

    It verifies device posture (antivirus, OS version, disk encryption) before granting access, without the need to install software. In addition it captures navigation history, screen capture, and full session recording for compliance and forensic investigations. There’s support HIPAA, GDPR, and NIS2 requirements even on untrusted devices.

    For businesses this means BYOD and contractor devices become zero trust-compliant endpoints, and safe access can be granted without the need to install agents or other software.

    You can find out more on the Check Point site.

    Image credit: jpkirakun/depositphotos.com



    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Admin
    • Website

    Related Posts

    More people are using AI for retirement planning, but how accurate is it? Here’s what experts say.

    ECB is studying defences against Mythos-powered attacks, Lagarde says

    Education tech chief heads to OMB as deputy federal CIO

    The new films and series in May 2026 – Research Snipers

    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Electrical fire to keep theater that hosts ‘The Book of Mormon’ closed through May 17

    The 2026 Grammy Award nominations are about be announced. Here’s what to know

    Disease of 1,000 faces shows how science is tackling immunity’s dark side

    Judge reverses Trump administration’s cuts of billions of dollars to Harvard University

    Top Reviews
    9.1

    Review: Mi 10 Mobile with Qualcomm Snapdragon 870 Mobile Platform

    By Admin
    8.9

    Comparison of Mobile Phone Providers: 4G Connectivity & Speed

    By Admin
    8.9

    Which LED Lights for Nail Salon Safe? Comparison of Major Brands

    By Admin
    Sg Latest News
    Facebook X (Twitter) Instagram Pinterest Vimeo YouTube
    • Get In Touch
    © 2026 SglatestNews. All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.