With Check Point Protect, you are protected from:
1. Viruses and Malware - that can steal information on or flowing through your device.
2. Spyware - that can be used to snoop on what you are doing and saying. Some spyware can be used to access your emails, pinpoint your location, or even take control over your device's microphone or camera to see exactly what you are doing.
3. WiFi Hotspot Intrusions - that access your device and try to send or receive data when you connect in a public place, such as an airport or coffee shop.
Once you download it, Check Point Protect works to protect you in the background. You won't even know it's there, with no impact to your device's battery or performance.
If your device is attacked, Check Point Capsule Protect will provide you and your IT department a notification and instructions on how to eliminate the infection.
We are committed to protecting your privacy. We don't collect or share any personal information with anyone. For more information, please see the privacy statement on our site at http://www.checkpoint.com/privacy