Try our new research platform with insights from 80,000+ expert users
Anuraj Nair - PeerSpot reviewer
Presales Engineer at SNSIN
Reseller
Top 5Leaderboard
Provides good threat detection and prevention, but it lacks MDM capabilities present in other MDM products
Pros and Cons
  • "The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS."
  • "Check Point Harmony Mobile lacks MDM capabilities, which are present in other MDM products, like IBM Security MaaS360, AirWatch, and Google Workspace."

What is most valuable?

The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS. Check Point Harmony Mobile is a good option for users who want only incoming and outgoing traffic security for their Android and iOS devices.

What needs improvement?

Check Point Harmony Mobile lacks MDM capabilities, which are present in other MDM products, like IBM Security MaaS360, AirWatch, and Google Workspace.

For how long have I used the solution?


What do I think about the stability of the solution?

Check Point Harmony Mobile is a stable solution.

I rate the solution a nine out of ten for stability.

Buyer's Guide
Check Point Harmony Mobile
November 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.

What do I think about the scalability of the solution?

Around two to three customers are using Check Point Harmony Mobile.

I rate the solution’s scalability a six out of ten.

How are customer service and support?

The technical support team's response time should be faster. Also, the engineers should come up with a proper solution plan, which is currently missing.

Which solution did I use previously and why did I switch?

I have previously worked with Azure MDM, IBM Security MaaS360, and VMware AirWatch. The solution has better threat detection capabilities and catch rates than other mobile security vendors.

What about the implementation team?

The solution’s deployment takes around five minutes. To deploy the solution, you need to deploy the agent to the endpoint Android. It will then be listed in the Infinity portal, and you can start configuring.

You need to download the agent from the Infinity portal, put it on your mobile, install it, and activate it. It will be reflected in the Infinity portal, and you can then configure the policy.

What was our ROI?

Check Point Harmony Mobile can help you with regulation compliance. Customers will secure all infrastructure that belongs to them because they are managing that infrastructure. However, they don't have any control over mobile devices connected to their network. Any threats to those particular devices can also affect your infrastructure if they are connected without any protection.

Check Point Harmony Mobile will ensure the device is clean in such cases. Even if the device gets connected to your infrastructure, there won't be any infection or any impact happening to your infrastructure.

What's my experience with pricing, setup cost, and licensing?

Users have to pay a yearly licensing fee for each device, which is cheap.

What other advice do I have?

Check Point Harmony Mobile is not so attractive and provides security only for mobile devices. Customers can use Check Point Harmony Mobile to secure their mobile devices, such as Android or Mac smartphones. However, it has less capability than an MDM (Mobile device management).

Check Point Harmony Mobile has a good advantage in terms of security posture and security threat detection and prevention. Check Point Harmony Mobile will help prevent 99% of attacks on mobile devices. It is easy to manage Check Point Harmony Mobile.

People bring their own devices and connect them to all the other unwanted networks. This causes traffic to flow to these devices from any network source, such as Wi-Fi, LAN, or other public networks. Deploying Check Point Harmony Mobile can ensure the endpoint is sanitized and clean for use at home and the workplace.

Overall, I rate the solution a six out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
Flag as inappropriate
PeerSpot user
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS
Real User
Top 5Leaderboard
Detailed summaries, good mobile security, and nice reporting
Pros and Cons
  • "With Harmony Mobile, we have been able to provide additional security to our network."
  • "They could make a more beautiful interface."

What is our primary use case?

With this, the company has been able to give many users access to the infrastructure of the company from their mobile phones. Several types of applications are used that must connect to the company network which accesses sensitive information. This has helped a lot to improve efficiency in day-to-day operations and be able to reach more customers. In addition, it has provided us with better administration of all devices and has them organized by security policies depending on the area where each employee works.

How has it helped my organization?

This tool has helped us at various points in our organization. For example, we can have better control over each device that accesses the infrastructure network. We can also reach and process orders, and solutions faster, or be able to consult data in real-time from mobile phones. We can work from anywhere in the country. 

With Harmony Mobile, we have been able to provide additional security to our network. 

In addition, it provides a detailed summary of each of the operations from where they access what they access and this has helped us a lot in the audit that they do so we can provide accurate and concise information.

What is most valuable?

The tool is excellent, however, it has some features that stand out a lot, for example, it has a very intuitive interface. 

The search capacity allows you to find information quickly and concisely. 

It generates reports and precise analysis, quickly in real-time allowing the technology department to focus. 

We can automate many of the tasks. 

It has notifications and reminders that help us be aware of each event or vulnerability that may arise in our organization.

What needs improvement?

The tool is very effective and proactive, I don't have much to say about the improvements it should have. It already has a very intuitive interface. Yet they should improve the order of each of the options a little since it is difficult to get used to the location of each one. They should rearrange each of the options since time is wasted finding each one.

They could make a more beautiful interface.

When an update is going to be done, it should be less heavy and should streamline operations.

For how long have I used the solution?

In the last six years, I have been able to use, buy, and implement this tool for the mobile security of companies that are supporting BYD with their officials.

What do I think about the stability of the solution?

It has very good stability - if it weren't for the updates that sometimes loop.

What do I think about the scalability of the solution?

Scalability is one of the high points that the tool has.

How are customer service and support?

Support is sometimes very slow.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

The company did not have any tools previously.

How was the initial setup?

The first implementation was difficult since the tool has a fairly high learning curve.

What about the implementation team?

The seller helped us do the implementation and part of the configuration. They gave us the training to be able to make the tool Russian.

What was our ROI?

The ROI is slow to appear, however, they will provide security to all the company's information.

What's my experience with pricing, setup cost, and licensing?

The tools are a little expensive, however, it is worth making that investment for the installation and it has a medium learning curve.

Which other solutions did I evaluate?

Some tools were evaluated including:

What other advice do I have?

It is a very useful tool for mobile security, thus providing security to the entire company.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony Mobile
November 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
Avesh Kumar - PeerSpot reviewer
Software Tester at a tech services company with 51-200 employees
Real User
Top 10
Works with mobile, protects against vulnerabilities, and offers real-time scanning
Pros and Cons
  • "The simple navigation offered by the graphical user interface is excellent."
  • "The ability to integrate local and cloud technologies to create a hybrid scenario would be an upgrade."

What is our primary use case?

We require a tool that could control and monitor mobile devices, which was one of the primary factors in our decision to adopt Check Point Harmony Mobile. With this tool, we had that capability. We were able to shut down a security hole that was harming our company. The user can connect to the company and access corporate data via this technology, enabling them to adhere to a more secure standard. With the help of the Harmony Mobile panel, each mobile has implemented policies that govern access. It is used by us to control mobile connections. It is a cloud-based solution that is installed on Check Point's cloud.

How has it helped my organization?

Prior to having this solution, our users were vulnerable to infections of any kind on tablets and mobile devices used for business. We have reduced these dangers by utilizing Harmony Mobile's security, which helps both the user and the administrator. With the help of Check Point Harmony, mobile users also have the same level of protection as the business's computers and laptops do and users are also secure to use on both iOS and Android. Observe Point Mobile devices used by employees are protected from dangerous software and attacks on their network or operating system.

What is most valuable?

Check Point's Sandblast Mobile solution integrates with Mobile Device Management and supports Android and iOS operating systems. Two profiles are created for each mobile device when it is configured. There are two types of profiles - personal and professional - and various security guidelines can be applied to each. 

Real-time scanning is only one of the amazing capabilities offered by this tool. 

The simple navigation offered by the graphical user interface is excellent. 

We value the centralization it brings about.

What needs improvement?

The tool is excellent for security purposes, and it gives a lot of information. That said, there needs to be some improvement in everything related to administration and assistance. 

The ability to integrate local and cloud technologies to create a hybrid scenario would be an upgrade. 

Making this tool compatible with Google MDM is one of the enhancements that must be made. 

The increased load on an outdated terminal, which slows them down, is another item to consider. 

It would be preferable if they could incorporate application vulnerability management.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Real User
Top 5Leaderboard
Offers ease of management and can be installed effortlessly
Pros and Cons
  • "The product's initial setup phase is very straightforward."
  • "At times, when configuring policies, the tool takes some time to apply the policy."

What is our primary use case?

I use the solution in my company so that whoever the mobile users are and those who use the corporate applications, we can secure communication from the corporate application to the outside network. My company uses Check Point Harmony Mobile through the browser to secure our applications, as well as to secure the communication between customers and other users.

What is most valuable?

The most effective features of the product stem from its ability to deal with areas like data security and application security while also being useful to users who use mobiles in roaming mode and those who use a personal mobile phone with corporate applications in it.

What needs improvement?

At times, when configuring policies, the tool takes some time to apply the policy. If I configure a new policy and apply it to the management console, it may take time. The product should work on policy enforcement so that users can quickly enforce the policies within a fraction of a second.

For how long have I used the solution?

I have been using Check Point Harmony Mobile for three years.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a nine out of ten. Some customers of the tool face some issues in their environment with respect to policy enforcement.

What do I think about the scalability of the solution?

It is a very easily scalable solution. 

My company deals with a very limited set of customers of the product. The tool's competitors have been very aggressive with the mobile browser part, especially the ones offering MDM solutions. Those who use firewall products from Check Point are very happy to acquire and use Check Point Harmony Mobile.

How are customer service and support?

As and when required, the solution's technical support helps users with troubleshooting. The solution's technical support is good, and it responds quickly.

How was the initial setup?

The product's initial setup phase is very straightforward.

For the product's deployment phase, you just need to install the agent to the end user and configure the policy on the cloud management console.

The solution's deployment phase is a one-day task.

What was our ROI?

In terms of ROI, the product helps secure your application, mobile, and data.

What's my experience with pricing, setup cost, and licensing?

There is a need to make yearly payments towards the licensing costs attached to the product. You can opt for a one-year, three-year, or five-year license. There is a separate team that handles the pricing part of the product, and depending on the customers or order quantity they handle, I believe that 60 or 70 percent discounts on the prices are offered. There are no additional costs attached to the product.

What other advice do I have?

The tool helped prevent potential security threats whenever some users communicate from their mobile with someone outside our company since, at such a time, the product secures the communication as well as the data. With the tool, no confidential data goes outside from the inside of our company. Our company can block data leakage from mobile phones to the outside environment of our organization.

The threat detection and response capabilities of the tool benefit the company in scenarios where a user wants to send out some confidential data outside the company through the browser, which would not be possible If the organization uses Check Point Harmony Mobile. The tool shows how our company can secure the user, as well as how we can prevent data leakage from the inside to the outside of the organization.

The product provides users with ease of management. It is a simple tool that allows users to configure some of the policies for a user or a user-based group and apply them to the solution.

According to Gartner's website, the tool's stability and support as a security provider places it in the leader category.

The tool helps respond to emerging corporate threats, especially those who use corporate applications on their personal devices. If you want to secure your corporate applications, you have to adopt Check Point Harmony Mobile.

If you use corporate applications on your personal mobile device and you want to secure your applications and data, then you have to use Check Point Harmony Mobile.

I rate the tool a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Jessica Muñoz - PeerSpot reviewer
Account Manager at a tech vendor with 11-50 employees
Reseller
Top 5
User-friendly and offers complete protection to mobile devices
Pros and Cons
  • "It is very easy for my company to get information from the product's support team."
  • "There are certain shortcomings in the integration capabilities that a product offers."

What is most valuable?

I like the product's ability to offer IPS protections for mobile security.

What needs improvement?

There are certain shortcomings in the integration capabilities that a product offers. In the future, I would like to see the product offer more integration features.

For how long have I used the solution?

I have experience with Check Point Harmony Mobile. My company has a partnership with Check Point.

What do I think about the stability of the solution?

Considering that the product is easy to use, user-friendly, and offers complete protection, I rate the product's stability an eight out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a nine out of ten.

How are customer service and support?

It is very easy for my company to get information from the product's support team. I rate the technical support a nine out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The product's deployment is easy. You only deploy the tool on the mobile device for the client or customer who wants to use it.

What's my experience with pricing, setup cost, and licensing?

When I purchased the product for one of our company's clients, I realized that the price of the product was competitive.

What other advice do I have?

I need to check with the clients in the industry who use Check Point Harmony Mobile and integrate it with other mobile management solutions. I simply managed the product and used it to protect and ensure that scanning processes were in progress while also checking the branch office security, reviewing CVEs, checking the implementation and interventions with the tool. The product offers ease of blocking. The solution also offers integration with Samsung, Microsoft, BlackBerry, and other solutions. The solution can be used for mobile protection and to protect applications.

The product is user-friendly for its customers. The solution also offers complete protection and simple management. The tool provides its users with the capacity to prevent malicious activities and phishing threats while also checking the mobile for malware or any other attacks on the device.

The solution is easy to deploy and to check for attacks in mobile devices.

The product's ability to adapt and offer security against the evolving threat landscape is good because it is easy for a user since there is only one application that they need to use.

I rate the overall tool an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Flag as inappropriate
PeerSpot user
Prateek Agarwal - PeerSpot reviewer
Manager at a tech company with 201-500 employees
Real User
Top 5Leaderboard
A stable and mature tool that is user-friendly and has a very rich user interface
Pros and Cons
  • "The solution is very user-friendly."
  • "Sometimes, the mobile app crashes and stops responding."

What is our primary use case?

We wanted the mobile version because the team was distributed after the pandemic. Many people use the solution through their iPhones and Android-based mobile devices. We have installed and implemented the solution on mobile devices to ensure that all the contacts and messages are kept confidential and nothing compromises the data security.

How has it helped my organization?

We have integrated the tool through Azure and Check Point’s cloud. It can be easily integrated. Any inbound or outbound email will be scanned. A vulnerability report can be created at any moment.

What is most valuable?

The solution is very user-friendly. It has a very nice and rich user interface. The employees are very happy with the product because they can use it on the go. They need not use their laptop or workstations to analyze the security threats on their emails.

The product has SSL and HTTPS features, which make mobile devices more secure. It doesn’t allow sharing information with third-party tools or any suspicious person. We can stop everything. The compatibility with iOS and Android is very good.

The tool gives real-time notifications. If we have enabled the push notifications, the app will send a notification when there’s a phishing attack or security breach on the mobile devices. We can easily check and stop that conversation easily.

What needs improvement?

Sometimes, the mobile app crashes and stops responding. We need to restart it to make it work. If restarting doesn’t work, we uninstall and install the app again. We also check the internet connectivity. If nothing works, we contact the technical support team. I rate the performance of the solution an eight out of ten.

The updates are very frequent. It should be once a month or once a quarter so the user can work on the mobile app without interruptions. The solution must be integrated with AI and machine learning so that we can predict threats and minimize attacks.

For how long have I used the solution?

I have been using the solution for two to three years.

What do I think about the stability of the solution?

The tool is stable and fully mature. I rate the stability a nine out of ten.

How are customer service and support?

Customer service must be improved. The team must not take more than 48 hours to respond.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have worked with Cisco. Check Point is a better product. We are already using the web version. Generally, we choose the same vendor for the mobile version to integrate the products easily.

How was the initial setup?

The product can be easily deployed on our mobile devices. We can create login credentials and easily work on it.

What's my experience with pricing, setup cost, and licensing?

The subscription plans must be optimized for small and medium-sized organizations.

What other advice do I have?

If someone already uses the web version, Check Point Harmony Mobile will be useful to them due to the compatibility and user information. Everything will easily sync with each other. Overall, I rate the solution an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Cyber Security Consultant at Wirespeed
Reseller
Top 5
Works seamlessly with mobile devices and has good detection capabilities without interrupting your daily phone use
Pros and Cons
  • "I would rate the stability a ten out of ten."
  • "While it's great, there's always room for improvement. Adding capabilities for automatic deployment in an enterprise environment would be useful."

What is our primary use case?

Mobile security, on top of MDM, is the primary use case. Some clients use mobile device management, and we provide additional common security capabilities. This includes vendor locking, where the end solution restricts access to corporate resources based on app management. Check Point does this very well, without issues on mobile devices. There aren't many players in this space, so it's a good, stable solution. You get the results you expect, and it's very quick to set up (around 5 minutes).

What needs improvement?

While it's great, there's always room for improvement. Adding capabilities for automatic deployment in an enterprise environment would be useful. Also, the ability to see licenses per mobile device would be handy.

So, in future releases, the ability to see the environment and licensing per device would be good.

For how long have I used the solution?

I have been working with this solution for three years. It's the best solution I have at the moment.

What do I think about the stability of the solution?

I would rate the stability a ten out of ten. 

What do I think about the scalability of the solution?

It is a scalable solution. I would rate the scalability a ten out of ten. We have enterprise-level customers. 

How are customer service and support?

The solution doesn't require much support. 

How was the initial setup?

I would rate my experience with the initial setup a ten out of ten, where one is difficult and ten is easy.

The management console is on the cloud. The deployment takes around five to ten minutes. 

What about the implementation team?

For the deployment process, you basically create your account in the Harmony Mobile portal (Infiniti Portal on Check Point). 

Then, you configure the user and send them an email containing a QR code for app installation instructions. They download the app from the App Store or Play Store, scan the code, and it configures itself, appearing on the cloud portal. Very quick.

What's my experience with pricing, setup cost, and licensing?

The price is okay. Per user, it should be something like five or ten dollars. But, we usually get discounts that drive the cost down.

What other advice do I have?

It's a very good mobile security solution for protecting phones. It works seamlessly with mobile devices and has good detection capabilities without interrupting your daily phone use. It gives you a lot of visibility into security aspects, including rating every application. 

On the cloud portal, you can see a security rating for every application on the phone and get low-level details of what that application has access to on your phone. Overall, it's a very good solution.

Overall, I would rate the solution a ten out of ten. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Dave Eversden - PeerSpot reviewer
Managing Director at Forever Group
MSP
Top 10
Enhances security and is easy to deploy and configure
Pros and Cons
  • "The solution was easy to deploy and provided a useful security enhancement for mobile devices."
  • "We had some issues with loopback VPN DNS filtering stopping working periodically, however, this is something that we could probably iron out with support."

What is our primary use case?

We used the solution to provide mobile threat defense for mobile devices (predominantly Apple iPhone/iPad). We evaluated numerous solutions from competitors including IBM, Better Mobile, Trend Micro, and others. Check Point is attractive since they are a market-leading firewall vendor and therefore we trust their filtering in terms of web and link protection beyond others who may rely on smaller or third-party feeds. We also found that the breadth of protections including app analysis and WiFi spoofing validation were helpful.

How has it helped my organization?

The solution was easy to deploy and provided a useful security enhancement for mobile devices. It allowed us to extend filtering technologies that we would generally expect to be available within an edge firewall to mobile devices - such as web content filtering and URL protection. With the prevalence of mobile phishing (including SMS phish which circumvents email filters), we felt that this was a useful security layer. Check Point is also a provider that we felt we could trust when adding products to our security stack.

What is most valuable?

The integration with Microsoft Intune scoped to the security group made deployment a breeze. Certainly, once the initial configuration was in place the process was smooth and devices began to appear in the Check Point Harmony portal automatically. Adding web and link protection was considered to be a valuable security enhancement and is a key benefit of using mobile threat defense. The fact that the product can also highlight changes in public IP addresses for known corporate WiFi SSIDs also helps to alert or prevent spoofing of internal WiFi networks.

What needs improvement?

We had some issues with loopback VPN DNS filtering stopping working periodically, however, this is something that we could probably iron out with support. In the end, we ended up disabling this feature and using Umbrella (which we also use). It is of course highly possible that we could have addressed this with their support team but in our scenario, it was easier to disable the functionality and run with a separate product that we already had available. Certainly, everything else worked fine and the alerts were very useful.

For how long have I used the solution?

I first used the solution several years ago.

What do I think about the stability of the solution?

We had no stability issues with the solution save for the periodic VPN loopback internet outages with iOS agents that I'm sure could be resolved with support.

What do I think about the scalability of the solution?

We don't foresee any obvious limits with the scalability of the solution for all but the largest of organizations.

How are customer service and support?

Support engineers were friendly and communicable.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We had previously trialed better mobile but the minimum onboarding/barrier of entry costs were too steep. We are also more familiar with the Check Point brand. We've also used Trend Micro before yet found the feature set for iOS devices to be slim.

How was the initial setup?

The solution has a straightforward setup - especially with Intune integration.

What about the implementation team?

We did an in-house implementation.

What was our ROI?

ROI is impossible to compute.

What's my experience with pricing, setup cost, and licensing?

Setup and recurring costs seemed reasonable and in line with other Check Point products.

Which other solutions did I evaluate?

We did evaluate IBM, Trend Micro, Better Mobile, and others.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Product Categories
Mobile Threat Defense
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.