Check Point

How mobile Malware compromises your secure containers and enterprise content


To understand how secure containers work, we first need to look at the sandbox security model – embraced by both Android and iOS operating systems.

Under this model, each mobile application is executed in its own separate environment. In other words, each application is allocated its own separate storage space, is assigned to run in a specific memory location and is entitled to perform only a specific set of device functionalities such as GPS, Network and SMS.

These three restrictions are defined upon application installation, and once the application is installed they cannot be altered.

It is the mobile operating system which enforces the sandbox model and, thereby, prevents one application from accessing another application’s storage and memory.