IKARUS cooperates with Check Point for optimal endpoint protection on mobile devices

6. December, 2023

Mobile operating systems are just as vulnerable to hacking as traditional operating systems on laptops or PCs. Before smartphones regularly accessed financial data and corporate networks, they were not the focus of cybercriminals. That has changed.

Christian Fritz und Roman Prinz

Christian Fritz, COO at IKARUS Security Software GmbH, and Roman Prinz, Country Manager at Check Point Software Technologies Austria GmbH, look forward to working together in the field of mobile security. (Photo: IKARUS)

“The increasing threat landscape for mobile devices and the associated growing demand in the enterprise prompted us to look for a sustainable solution that would effectively address the need for holistic endpoint and network security,” describes Christian Fritz, COO at IKARUS Security Software.

In addition to reliable malware detection, Check Point’s Harmony Mobile mobile security application offers additional features to help organisations protect against current and future threats. „Especially in the enterprise, mobile devices are not always the actual target of attackers. Sometimes the smartphone is just a stepping stone to the corporate network, while nothing happens on the mobile device itself“, says Christoph Ehardt, Mobile Security specialist at IKARUS: „ Malware protection alone is sometimes not enough. Harmony Mobile comes with an impressive set of features to prevent attacks on the corporate network, phishing attacks via messengers, man-in-the-middle attacks or exploitation of operating system vulnerabilities.“

Centralised management, control, and security for mobile devices

In combination with the mobile device management system IKARUS mobile.management, companies get an effective tool to centrally manage, control and proactively protect their entire mobile fleet with little effort. While Harmony Mobile detects and assesses threats, IKARUS mobile.management enables administrators to take immediate action – or simply define automatic actions. Customised rule sets can be used, for example, to block compromised devices or their access to corporate resources, or to force security updates.

„I am very pleased to be working with an Austrian manufacturer“, says Roman Prinz, Country Manager at Check Point Software Technologies Austria GmbH: „Together, we can provide our customers with a very secure and easy-to-use solution that not only fulfils the current requirements in terms of cyber security, but also sets new standards for the management and security of mobile devices, especially in the DACH region.“

Austrian data processing for international security solutions

IKARUS has been developing and operating cyber security solutions since 1986, when the first PC virus became widespread. IKARUS’ own portfolio is based on the IKARUS Malware Scan Engine, which is developed by IKARUS and successfully used internationally, and is complemented by solutions from selected technology partners. The aim is to provide local companies with the world’s best technologies, with operation, support and hosting in Austria.

IKARUS mobile.management meets the strict requirements for local data processing even in cloud operation and also supports local installation. Harmony Mobile only uses anonymised status and metadata and does not collect any personal data, ensuring compliance with EU GDPR at all times.

About Check Point Software Technologies Ltd.

Check Point

Check Point Software Technologies Ltd. is a leading provider of cybersecurity solutions for businesses and governments worldwide. Harmony Mobile is part of the Check Point Harmony product suite, the industry’s first unified security solution for users, devices, and access. Harmony consolidates six products to provide uncompromised security and simplicity for everyone. It protects devices and internet connections from the most sophisticated attacks while ensuring Zero-Trust Access to corporate applications – all in a single solution that is easy to use, manage and buy.

Business Email Compromise
Prognosen für die zehn größten Cybersecurity-Bedrohungen für 2030
E-Mail Verschlüsselung
Schritt für Schritt zum Notfallplan für IT-Security-Incidents
Account Management
Indicators of Attack
Gefahren durch vertrauenswürdige Services
Threat Intelligence
SQL Injection
SMTP Smuggling
Cyber-Risiken in der Ferienzeit
Dynamische Cybersicherheit
Harmony Mobile by Check Point


IKARUS Security Software GmbH Blechturmgasse 11
1050 Vienna

Phone: +43 1 58995-0
Sales Hotline:
+43 1 58995-500


Support hotline:
+43 1 58995-400

Support hours:
Mon – Thu: 8am – 5pm
Fri: 8am – 3pm
24/7 support by arrangement

Remote maintenance software:
AnyDesk Download