Try our new research platform with insights from 80,000+ expert users
Check Point Harmony Mobile Logo

Check Point Harmony Mobile pros and cons

4.4 out of 5
Badge Ranked 1
138 followers
Post review
 

Check Point Harmony Mobile Pros review quotes

LW
Sep 7, 2020
We like the URL content filtering, that is one of the most valuable features.
CS
Aug 5, 2020
It monitors all the URLs that a user goes to on their phone and so we can see what they're looking at and we can limit that. Certain topics are not allowed to be accessed. They're monitoring their apps and they rate them based upon how big of a security risk that individual app is based on their ratings. And so we're able to limit those as well and allow people to have some that may be a low risk, but still a risk, but we may allow that for our users whereas we block medium and high risk.
rb6k - PeerSpot reviewer
Oct 11, 2023
Management can see all devices on one panel and easily highlight any devices under threat.
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
814,649 professionals have used our research since 2012.
BD
Mar 29, 2021
Internal applications, data, and folders are published on enrolled mobile devices in a secure way without publishing any of the resources over the internet.
Raj Ashish - PeerSpot reviewer
Apr 7, 2023
The solution provides us with all the information in the log.
GS
Jul 28, 2021
The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly.
Adrian Cambronero - PeerSpot reviewer
Dec 21, 2023
Harmony Mobile presents many innovative features.
JG
Aug 12, 2021
It has been very easy to implement and deploy.
KC
Jul 28, 2020
I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious.
Mitesh D Patel - PeerSpot reviewer
Mar 27, 2024
The product's initial setup phase is very straightforward.
 

Check Point Harmony Mobile Cons review quotes

LW
Sep 7, 2020
We don't have Google MDM being supported by the solution as of yet. It is a feature requirement... They are aware that it is something that I need. My objective is to be able to have the MDM integration and to have some level of control over the asset itself.
CS
Aug 5, 2020
Integration needs improvement. We use Check Point for email. We use Check Point Capsule Workspace and I wish that it tied into that better and was integrated with their email application so that when it's secure, then they're able to access their email and it could be deployed as one group instead of two separate applications. It's a little bit more work for us to deploy both of those so it'd be nice if they could be integrated.
rb6k - PeerSpot reviewer
Oct 11, 2023
I would quite like to be able to block ads on my phone by blocking known inbound ad websites and services.
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
814,649 professionals have used our research since 2012.
BD
Mar 29, 2021
The product does not provide deep capabilities for sharing specific data to users or groups separately, nor does it provide visibility as to whether a user has access to the data or not.
Raj Ashish - PeerSpot reviewer
Apr 7, 2023
The remote configuration has room for improvement.
GS
Jul 28, 2021
The admin portal is slightly clunky and sometimes shows a different status than what the device is actually doing.
Adrian Cambronero - PeerSpot reviewer
Dec 21, 2023
One of the improvements that can be made is that they become compatible with Google MDM.
JG
Aug 12, 2021
It could expand the functionalities to, in addition to security functionality, incorporate Mobile Device Management (MDM) functionalities such as remote device management, administration of installed applications, etc.
KC
Jul 28, 2020
In the next release, I would like to see a Wi-Fi scanner to be able to identify whether a wireless network is malicious before you join it.
Mitesh D Patel - PeerSpot reviewer
Mar 27, 2024
At times, when configuring policies, the tool takes some time to apply the policy.