Check Point Introduces Enterprise Browser to Enhance Zero Trust Security for All Devices

Check Point Introduces a Game-Changer in Cybersecurity



On September 3, 2025, Check Point Software Technologies, a recognized pioneer in cybersecurity solutions, announced their latest innovation: the Enterprise Browser. This new feature, designed for users of Check Point's Harmony SASE, aims to enforce Zero Trust security principles even on unmanaged devices including contractor-owned and BYOD (Bring Your Own Device) hardware. This development comes at a crucial time when organizations face vital challenges regarding security visibility and compliance risks associated with the rapidly growing use of unmanaged devices in the hybrid workforce.

As organizations increasingly adopt remote work policies, unmanaged devices have emerged as significant security vulnerabilities. They present risks such as data leaks, compliance failures, and limited visibility into device health. Traditional security measures—like providing VPN access or issuing company laptops—can be expensive and inefficient, complicating compliance with regulations such as HIPAA, GDPR, and NIS2. Check Point's Enterprise Browser aims to bridge this gap by transforming unmanaged devices into secure endpoints that comply with Zero Trust protocols.

The Enterprise Browser is built on the Chromium framework and creates an isolated temporary workspace. Within this workspace, enterprise-grade controls are enforced during each session, automatically erasing all sensitive data upon session termination. Amit Bareket, the Vice President of Check Point's SASE division, stated, "Companies can no longer afford to choose between productivity and security. With Check Point's Enterprise Browser, they can have both. It enables fast, frictionless access for third-party users while providing IT teams with stronger control, compliance, and visibility over devices they do not manage."

Key Features of Enterprise Browser


The Enterprise Browser comes equipped with several robust features designed to enhance security and compliance:

  • - Data Isolation and Erasure: This feature completely separates enterprise applications and data from the underlying operating system, ensuring that sensitive information is deleted at the end of each session.

  • - Integrated Data Loss Prevention (DLP): This function helps restrict various actions such as uploads, downloads, copy/paste, and printing. Additionally, watermarks can be applied to documents and screens to enhance security.

  • - Agentless State Checks: Allowing for device state validation, this feature checks antivirus status, OS version, and disk encryption without requiring software installation prior to access permission.

  • - Complete Session Visibility: Provides navigation history, screen captures, and full session logs to support compliance and forensic investigations.

  • - Seamless SASE Integration: Offers single sign-on (SSO) and policy management integrated with Harmony SASE and agentless ZTNA.

Benefits for Security and Business Agility


Enterprise Browser emphasizes both security and the agility of business operations, promising:

  • - Protection for Unmanaged Devices: Converting BYOD and contractor-owned laptops into compliance-ready Zero Trust endpoints.

  • - Accelerated Onboarding: Granting immediate secure access to third-party users without the need for hardware or agent provisioning.

  • - Assured Compliance: Supporting HIPAA, GDPR, and NIS2 requirements even on low-trust devices.

  • - Reduced Risks and IT Overhead: Eliminating costly measures such as laptop shipping while preventing internal threats and compliance violations.

Through the implementation of the Enterprise Browser, organizations can secure devices that are not owned by them, enabling them to strengthen a flexible, decentralized workforce without exposing sensitive systems or data.

Check Point's Harmony SASE featuring Enterprise Browser is now available to customers worldwide from September 3, 2025.

About Check Point


Check Point Software Technologies is a leading provider of cyber security solutions that protect over 100,000 organizations across the globe. Through their AI-driven security offerings and the Infinity Architecture, Check Point delivers unparalleled security effectiveness while minimizing risk. The Infinity Architecture employs a hybrid mesh network approach centered on SASE, integrating management of on-premises, cloud, and workspace environments while offering flexibility and scalability to enterprises and service providers alike. Check Point Software Technologies, Inc. is publicly traded on NASDAQ under the ticker CHKP and has a fully-owned subsidiary in Japan established on October 1, 1997.

Stay Connected


For more updates about Check Point, follow them on their blog and social media platforms:

Forward-Looking Statements


This press release includes forward-looking statements regarding Check Point’s outlook on growth, future leadership in the industry, and the value it aims to generate for shareholders. These statements may not materialize, as various risks and uncertainties may cause actual results to differ significantly from expectations. These include the company’s ability to continue developing its solutions, customer acceptance of the existing and new offerings, and general market conditions. For a detailed discussion, refer to the latest Annual Report filed with the U.S. Securities and Exchange Commission.

For media inquiries, please contact:
Check Point PR Office (Next PR)
Tel: 03-4405-9537
E-mail: [email protected]

Topics Other)

【About Using Articles】

You can freely use the title and article content by linking to the page where the article is posted.
※ Images cannot be used.

【About Links】

Links are free to use.