Check Point Expands Harmony SASE with Enterprise Browser, Delivering Zero Trust to Any Device

Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced Enterprise Browser, a powerful new feature for Check Point Harmony SASE customers. Enterprise Browser extends Zero Trust security to unmanaged devices — contractors, BYOD users, and third-party partners — delivering full visibility, granular policy enforcement, and compliance-ready data protection without persistent agents or endpoint ownership.
 

As hybrid workforces and third-party ecosystems grow, unmanaged devices have become one of the largest security blind spots. Organizations face heightened risks including data leakage, compliance gaps, and limited visibility into device hygiene. Traditional approaches, such as provisioning VPN access or providing laptops, are costly, inefficient, and hinder today’s compliance mandates like HIPAA, GDPR, and NIS2.
 

Check Point Enterprise Browser closes this gap by transforming unmanaged devices into secure, Zero Trust–capable endpoints. Built on Chromium, the browser creates an isolated, ephemeral workspace that enforces enterprise-grade controls for the duration of each session and removes all sensitive data once closed.
 

“Enterprises can no longer afford to choose between productivity and security,” said Amit Bareket, VP of SASE at Check Point. “Check Point Enterprise Browser delivers both. It enables fast, frictionless access for third parties and BYOD users, while giving IT teams stronger control, compliance, and visibility on devices they don’t manage. With the Enterprise Browser for BYOD and Harmony Browse for managed devices Check Point delivers robust browser security for our customers.”
 

Key Capabilities

  • Data Isolation & Wipe: Enterprise applications and data remain fully isolated from the underlying OS, and sensitive data is erased at session close
  • Integrated Data Loss Prevention (DLP): Enforces restrictions on upload, download, copy/paste, and printing; apply watermarking to documents and screens
  • Agentless Posture Checks: Verifies device posture (antivirus, OS version, disk encryption) before granting access, without installing software
  • Complete Session Visibility: Enables navigation history, screen capture, and full session recording for compliance and forensic investigations
  • Seamless SASE Integration: Unified SSO and policy management with Harmony SASE and Agentless ZTNA

 

Key Benefits for Security and Business Agility

  • Secure Unmanaged Devices: Turn BYOD and contractor laptops into compliant, Zero Trust endpoints
  • Accelerate Onboarding: Grant safe, immediate access to third-party users without provisioning hardware or agents
  • Ensure Compliance: Support HIPAA, GDPR, and NIS2 requirements even on untrusted devices
  • Reduce Risk & IT Overhead: Prevent insider threats and compliance failures while eliminating costly workarounds like shipping laptops

 

With Check Point Enterprise Browser, organizations can finally secure what they don’t own —empowering flexible, distributed workforces without exposing critical systems or sensitive data.

Check Point Harmony SASE with Enterprise Browser is available globally today.
 

Follow Check Point Software via:
X (Formerly known as Twitter): https://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: https://blog.checkpoint.com
YouTube: https://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.

Legal Notice Regarding Forward-Looking Statements
This press release contains forward-looking statements. Forward-looking statements generally relate to future events or our future financial or operating performance. Forward-looking statements in this press release include, but are not limited to, statements related to our expectations regarding future growth, the expansion of Check Point’s industry leadership, the enhancement of shareholder value and the delivery of an industry-leading cyber security platform to customers worldwide. Our expectations and beliefs regarding these matters may not materialize, and actual results or events in the future are subject to risks and uncertainties that could cause actual results or events to differ materially from those projected. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Annual Report on Form 20-F filed with the Securities and Exchange Commission on April 2, 2024. The forward-looking statements in this press release are based on information available to Check Point as of the date hereof, and Check Point disclaims any obligation to update any forward-looking statements, except as required by law.


Continue Reading