Mobile devices and computers are scanned one time to make sure that they are compliant before they can connect to the network. lets you use the Endpoint Security on Demand feature to create compliance policies and add more security to the network. Software Blade Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. The Mobile Access Check Point Software Blade on a Security Gateway that provides a Remote Access VPN access for managed and unmanaged clients.