Try our new research platform with insights from 80,000+ expert users
Vikas Gawali - PeerSpot reviewer
Security Engineer at TD SYNNEX
Real User
Top 5Leaderboard
Provides security for mobile devices, safeguarding against threats
Pros and Cons
  • "Check Point Harmony Mobile offers several advantages. It ensures your mobile device is highly secure for accessing Teams, Zoom calls, Outlook, and other business-related applications. Its robust security features protect your device comprehensively."
  • "Harmony Mobile has some limitations. For instance, you can only access it via Check Point's platform. After installation, two profiles may be created: a business profile and a personal profile."

What is our primary use case?

It provides security for mobile devices, safeguarding against threats like unauthorized app installations, VPN access, and other potential security breaches.

What is most valuable?

Check Point Harmony Mobile offers several advantages. It ensures your mobile device is highly secure for accessing Teams, Zoom calls, Outlook, and other business-related applications. Its robust security features protect your device comprehensively. Additionally, Harmony Mobile allows you to access office files, web files, and other services directly from your mobile device. Install the agent on your mobile, scan with Check Point, and apply the policy. After this setup, you can securely access all these services via your mobile device. 

It provides pre-detection, pre-emulation, encrypted file access, and decrypted file access features.

What needs improvement?

Harmony Mobile has some limitations. For instance, you can only access it via Check Point's platform. After installation, two profiles may be created: a business profile and a personal profile.

For how long have I used the solution?

I have been using Check Point Harmony Mobile as a reseller for two years.

Buyer's Guide
Check Point Harmony Mobile
January 2025
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.

What do I think about the stability of the solution?

It's known for its stability. Many organizations utilize its mobile access solutions for secure remote access.

What do I think about the scalability of the solution?

It works seamlessly on Android and Mac devices, making it easy to manage and configure on each platform.

How are customer service and support?

Support is good.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup is very straightforward. You will see a QR code when you log in to your portal. Scan the QR code, and the agent will automatically install it on your system. Afterward, you need to create the policy on your end. Once deployed, you're all set. It is only a one-time job.

What was our ROI?

It is a cost-saving solution, saving 20% cost.

What's my experience with pricing, setup cost, and licensing?

It is very cheap. It costs around one point eight dollars per user.

What other advice do I have?

Regarding AI features, it utilizes threat cloud technology supported by dedicated threat cloud engineers. This infrastructure forms the basis for integrating AI and ML capabilities into the platform.

Before buying, you need to have your mobile device ready, such as an Android or iOS device. This makes it very easy to manage your connectivity and security.

Overall, I rate the solution a ten out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
PeerSpot user
Project Manager at Junta de Andalucia
Real User
Easy to set up, good support, and allows for both personal and professional device profiles
Pros and Cons
  • "The Check Point SandBlast Mobile solution supports Android and iOS operating systems and allows for integration with Mobile Device Management (MDM)."
  • "Compatibility with other Mobile Device Management (MDM) products on the market should be improved, ensuring correct operation between SandBlast Mobile and MDM."

What is our primary use case?

We have implemented Check Point Harmony Mobile due to the numerous phishing attacks that our users were suffering, both by email and by fake text messages, pretending to be the Post Office, Amazon, banks, etc...

With this product, we have tried to avoid this type of attack and therefore have our business environment more secure.

Currently, we have users in various territorial locations and we were looking for a solution that would allow us to secure their mobile devices with a minimum level of intrusiveness in the terminals. The solution should be for both Android and iOS.

How has it helped my organization?

With the Check Point Harmony Mobile solution, we have been able to protect users' mobile terminals, both Android and iOS, from the various attacks they suffered. This has achieved a higher level of security on these devices and prevents access to user data or sensitive information accessible from mobile phones.

With this Check Point product, we can apply similar security policies that the company's desktops or laptops have to mobile phones. Both iOS and Android to be able to use them safely.

Check Point Harmony Mobile helps employees' mobile devices avoid running malicious applications and attacks on their network or operating system.

What is most valuable?

The Check Point SandBlast Mobile solution supports Android and iOS operating systems and allows for integration with Mobile Device Management (MDM).

It has APIs to carry out operations in applications that connect to mobile terminals and performs the tasks that are specified. For example, avoid activating Wi-Fi or installing applications.

When mobile devices are configured, two profiles are created for each of them. There is the personal profile and the professional profile, which means that different security policies can be applied to each profile.

What needs improvement?

Check Point SandBlast Mobile solution is not a Mobile Device Management (MDM), it only takes care of device security. It should have the main functions of Mobile Device Management (MDM), such as automating tasks, automatic updates of applications, etc...

Compatibility with other Mobile Device Management (MDM) products on the market should be improved, ensuring correct operation between SandBlast Mobile and MDM.

Another aspect to take into account is the increased load on old terminals, causing them to work slowly.

What do I think about the stability of the solution?

It is a fairly stable solution, although you have to take into account the increased load that it causes in older mobiles.

What do I think about the scalability of the solution?

It is an easily scalable solution because it allows for integration with any mobile management solution (MDM / UEM).

How are customer service and technical support?

Our experience with customer service / technical support has been very good. They respond quickly and offer us their help in everything we need.

Which solution did I use previously and why did I switch?

We did not have any solutions for mobile devices and after reviewing some, we chose Check Point Harmony Mobile.

How was the initial setup?

The initial setup was relatively easy, with no issues to review.

What about the implementation team?

The implementation was done with a vendor team and their level of knowledge is very high.

What was our ROI?

We currently do not have any ROI forecast. We will see this as the incidents on mobile devices decrease.

What's my experience with pricing, setup cost, and licensing?

Regarding the cost of licenses, each device consumes one, even if it has both professional and personal profiles.

Which other solutions did I evaluate?

We have been evaluating other solutions, such as Palo Alto Networks and Broadcom (Symantec).

What other advice do I have?

My advice is that before installing, a complete analysis of the requirements should be carried out. This should be done in order to correctly define user groups and the respective policies from the beginning. This will help to avoid individual policies.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony Mobile
January 2025
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.
PeerSpot user
Network Engineer at LTTS
Real User
Good support, facilitates secure access of company resources and working from home
Pros and Cons
  • "We have applied MFA so that no one can bypass this security and the users/employees can access their resources very easily, securely, and seamlessly."
  • "We can say that this is a very good solution but Check Point has to reduce the cost."

What is our primary use case?

We are a technology services company and our clients and employees are working from across the world. We have Check Point as a perimeter Firewall device in all our offices and all the devices are with R80.30 with the latest hotfix. 

During this Covid-19 pandemic, we have enabled Check Point Remote access for our employees, so that they can access the office resources from their mobile device, home desktop, or laptop.

Now, they are able to access our resources from their own machine or remote devices and we can say that our employees are doing work from anywhere. 

How has it helped my organization?

We have the Check Point perimeter firewall, which is in a cluster.

Our internal resources or applications we have published over SSL VPN and we have enabled remote desktop for those users who are working from home. This means that they are able to access our local applications and remote desktop.

This is also clientless, so users/employees can work from their mobile devices as well.

We also make sure that proper security is in place as well.

What is most valuable?

In Check Point Mobile access, we are using the SSL VPN for our onsite/work from home users/employees, and in this scenario, we have to secure our organization as well as our users.

In this SSL VPN, multifactor authentication (MFA) is one of the very good and valuable features for us. We have applied MFA so that no one can bypass this security and the users/employees can access their resources very easily, securely, and seamlessly. This feature is the most valuable for Remote Access

What needs improvement?

We can say that this is a very good solution but Check Point has to reduce the cost. The cost is huge compared to other products, and it seems this solution is only for companies with a large budget.

If Check Point can reduce the cost with all of the required security software blades then this product can be used by companies with a medium level of budget, as well.

For how long have I used the solution?

We are using Check Point Mobile Access from April 2020.

What do I think about the stability of the solution?

This is a stable product.

What do I think about the scalability of the solution?

This solution is scalable. We have 300+ users.

How are customer service and technical support?

The technical support is good.

Which solution did I use previously and why did I switch?

We did not use another similar solution prior to this one.

How was the initial setup?

The initial setup is very easy and straightforward.

What about the implementation team?

We had assistance from the vendor team.

What other advice do I have?

This is a very good solution for WFX.

In the time that we have been using this product, we can say that there have been no major challenges or issues that we have faced. All of our clients' and employees' feedback is very positive and they are very satisfied with this solution.

They are accessing the company resources seamlessly, and we are also planning to better secure our clients. We are evaluating this feature with remote access, and it is effective.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Jessica Muñoz - PeerSpot reviewer
Account Manager at a tech vendor with 11-50 employees
Reseller
Top 5
User-friendly and offers complete protection to mobile devices
Pros and Cons
  • "It is very easy for my company to get information from the product's support team."
  • "There are certain shortcomings in the integration capabilities that a product offers."

What is most valuable?

I like the product's ability to offer IPS protections for mobile security.

What needs improvement?

There are certain shortcomings in the integration capabilities that a product offers. In the future, I would like to see the product offer more integration features.

For how long have I used the solution?

I have experience with Check Point Harmony Mobile. My company has a partnership with Check Point.

What do I think about the stability of the solution?

Considering that the product is easy to use, user-friendly, and offers complete protection, I rate the product's stability an eight out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a nine out of ten.

How are customer service and support?

It is very easy for my company to get information from the product's support team. I rate the technical support a nine out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The product's deployment is easy. You only deploy the tool on the mobile device for the client or customer who wants to use it.

What's my experience with pricing, setup cost, and licensing?

When I purchased the product for one of our company's clients, I realized that the price of the product was competitive.

What other advice do I have?

I need to check with the clients in the industry who use Check Point Harmony Mobile and integrate it with other mobile management solutions. I simply managed the product and used it to protect and ensure that scanning processes were in progress while also checking the branch office security, reviewing CVEs, checking the implementation and interventions with the tool. The product offers ease of blocking. The solution also offers integration with Samsung, Microsoft, BlackBerry, and other solutions. The solution can be used for mobile protection and to protect applications.

The product is user-friendly for its customers. The solution also offers complete protection and simple management. The tool provides its users with the capacity to prevent malicious activities and phishing threats while also checking the mobile for malware or any other attacks on the device.

The solution is easy to deploy and to check for attacks in mobile devices.

The product's ability to adapt and offer security against the evolving threat landscape is good because it is easy for a user since there is only one application that they need to use.

I rate the overall tool an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Avesh Kumar - PeerSpot reviewer
Software Tester at a tech services company with 51-200 employees
Real User
Top 10
Works with mobile, protects against vulnerabilities, and offers real-time scanning
Pros and Cons
  • "The simple navigation offered by the graphical user interface is excellent."
  • "The ability to integrate local and cloud technologies to create a hybrid scenario would be an upgrade."

What is our primary use case?

We require a tool that could control and monitor mobile devices, which was one of the primary factors in our decision to adopt Check Point Harmony Mobile. With this tool, we had that capability. We were able to shut down a security hole that was harming our company. The user can connect to the company and access corporate data via this technology, enabling them to adhere to a more secure standard. With the help of the Harmony Mobile panel, each mobile has implemented policies that govern access. It is used by us to control mobile connections. It is a cloud-based solution that is installed on Check Point's cloud.

How has it helped my organization?

Prior to having this solution, our users were vulnerable to infections of any kind on tablets and mobile devices used for business. We have reduced these dangers by utilizing Harmony Mobile's security, which helps both the user and the administrator. With the help of Check Point Harmony, mobile users also have the same level of protection as the business's computers and laptops do and users are also secure to use on both iOS and Android. Observe Point Mobile devices used by employees are protected from dangerous software and attacks on their network or operating system.

What is most valuable?

Check Point's Sandblast Mobile solution integrates with Mobile Device Management and supports Android and iOS operating systems. Two profiles are created for each mobile device when it is configured. There are two types of profiles - personal and professional - and various security guidelines can be applied to each. 

Real-time scanning is only one of the amazing capabilities offered by this tool. 

The simple navigation offered by the graphical user interface is excellent. 

We value the centralization it brings about.

What needs improvement?

The tool is excellent for security purposes, and it gives a lot of information. That said, there needs to be some improvement in everything related to administration and assistance. 

The ability to integrate local and cloud technologies to create a hybrid scenario would be an upgrade. 

Making this tool compatible with Google MDM is one of the enhancements that must be made. 

The increased load on an outdated terminal, which slows them down, is another item to consider. 

It would be preferable if they could incorporate application vulnerability management.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Real User
Top 5Leaderboard
Offers ease of management and can be installed effortlessly
Pros and Cons
  • "The product's initial setup phase is very straightforward."
  • "At times, when configuring policies, the tool takes some time to apply the policy."

What is our primary use case?

I use the solution in my company so that whoever the mobile users are and those who use the corporate applications, we can secure communication from the corporate application to the outside network. My company uses Check Point Harmony Mobile through the browser to secure our applications, as well as to secure the communication between customers and other users.

What is most valuable?

The most effective features of the product stem from its ability to deal with areas like data security and application security while also being useful to users who use mobiles in roaming mode and those who use a personal mobile phone with corporate applications in it.

What needs improvement?

At times, when configuring policies, the tool takes some time to apply the policy. If I configure a new policy and apply it to the management console, it may take time. The product should work on policy enforcement so that users can quickly enforce the policies within a fraction of a second.

For how long have I used the solution?

I have been using Check Point Harmony Mobile for three years.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a nine out of ten. Some customers of the tool face some issues in their environment with respect to policy enforcement.

What do I think about the scalability of the solution?

It is a very easily scalable solution. 

My company deals with a very limited set of customers of the product. The tool's competitors have been very aggressive with the mobile browser part, especially the ones offering MDM solutions. Those who use firewall products from Check Point are very happy to acquire and use Check Point Harmony Mobile.

How are customer service and support?

As and when required, the solution's technical support helps users with troubleshooting. The solution's technical support is good, and it responds quickly.

How was the initial setup?

The product's initial setup phase is very straightforward.

For the product's deployment phase, you just need to install the agent to the end user and configure the policy on the cloud management console.

The solution's deployment phase is a one-day task.

What was our ROI?

In terms of ROI, the product helps secure your application, mobile, and data.

What's my experience with pricing, setup cost, and licensing?

There is a need to make yearly payments towards the licensing costs attached to the product. You can opt for a one-year, three-year, or five-year license. There is a separate team that handles the pricing part of the product, and depending on the customers or order quantity they handle, I believe that 60 or 70 percent discounts on the prices are offered. There are no additional costs attached to the product.

What other advice do I have?

The tool helped prevent potential security threats whenever some users communicate from their mobile with someone outside our company since, at such a time, the product secures the communication as well as the data. With the tool, no confidential data goes outside from the inside of our company. Our company can block data leakage from mobile phones to the outside environment of our organization.

The threat detection and response capabilities of the tool benefit the company in scenarios where a user wants to send out some confidential data outside the company through the browser, which would not be possible If the organization uses Check Point Harmony Mobile. The tool shows how our company can secure the user, as well as how we can prevent data leakage from the inside to the outside of the organization.

The product provides users with ease of management. It is a simple tool that allows users to configure some of the policies for a user or a user-based group and apply them to the solution.

According to Gartner's website, the tool's stability and support as a security provider places it in the leader category.

The tool helps respond to emerging corporate threats, especially those who use corporate applications on their personal devices. If you want to secure your corporate applications, you have to adopt Check Point Harmony Mobile.

If you use corporate applications on your personal mobile device and you want to secure your applications and data, then you have to use Check Point Harmony Mobile.

I rate the tool a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 5Leaderboard
Provides great data security, access control, and network security
Pros and Cons
  • "As a security solution for devices, it can benefit us in many ways, including providing us with data security, access control, network security, and more."
  • "One thing that should be improved in the future of the ability to ensure that mobile devices are protected from connections in environments with unlimited connectivity."

What is our primary use case?

This solution is required for one of the internal needs of our organization. We need the product based on our need for the control of access to corporate resources. We were looking for a solution that allows us to generate the management of mobile network devices and something that could secure all systems in the best way possible, thus giving us a solution that allows for general device management. With this product, our organization will be able to monitor and control the devices used by each of our employees in the organization, which gives us an level of adequate security configuration and allows us to comply with internal policies.

How has it helped my organization?

As a security solution for devices, it can benefit us in many ways, including providing us with data security, access control, network security, and more. The kinds of features on offer provide us with confidential access to information, ensuring each of the different devices is protected while improving the productivity of employees. In summary, this solution can help us protect business resources in the best way possible, which can be translated into efficient and profitable security.

What is most valuable?

A very important feature that is outstanding and helps our organization is the ability to protect the business data stored on each device. This is especially important since these devices are used to create information, catalogs, products, customer information, and inventory. Every time they are outside the company, the solution provides us with a secure connection from the devices to the database, thereby keeping data safe. In addition, we can improve the productivity of each of the employees remotely. This benefits to the company in terms of sales or productivity even from different locations. 

What needs improvement?

One thing that should be improved in the future of the ability to ensure that mobile devices are protected from connections in environments with unlimited connectivity. 

In some cases, devices may be found in areas with little or no signal, which can make it difficult to connect to the network. That makes it difficult to use the solution. We ned to ensue we have something that allows users to work effectively even without a strong network connection. This would allow us to have a solution that adapts to the challenged presented by limited connection environments.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Good protection and integration capabilities with an intuitive implementation
Pros and Cons
  • "The use and management of our portal is easy."
  • "We know that for many companies, the management and administration of device and data security have been complex."

What is our primary use case?

Mobile device security is a top concern for our company today - and for good reason. In the new normal, remote workers increasingly access corporate data from their mobile devices, which means the company is more exposed to data breaches than ever before.

This product keeps corporate information safe by protecting employee mobile devices from all areas of attack: applications, networks, and operating systems. Check Point Harmony Mobile has enabled easy-to-manage, scalable security for any mobility management team.

How has it helped my organization?

Our companies have seen the need to give their collaborators the flexibility to work remotely yet the number of cyberattacks has increased in recent years due to the complexity of the administration and visibility of cross-device risks for security managers. This is where Check Point Harmony Mobile is supporting us very closely. With this solution, it is immediately securing the equipment that is connected outside of our organization and thus protects the equipment and data.

What is most valuable?

Check Point Harmony offers an almost intuitive implementation. The use and management of our portal is easy. It is integrating six security products in a unified way to protect all users, connections, devices, and access. Users get protection regardless of where they are, applications they access, or any device they use. Users face endless cyber threats such as malware, phishing, malicious emails, or ransomware zero-day attacks. In addition to detecting unauthorized use of SaaS applications and preventing data leakage, we get instant threat visibility.

What needs improvement?

Having a unified solution developed by one of the most reliable brands in the market gives our organization the peace of mind that data is safe anytime, anywhere. 

We know that for many companies, the management and administration of device and data security have been complex. However, Check Point Harmony Mobile solves and supports is in all this with solutions made for this need. At the moment, I would not change anything; from my perspective, it is complete.

Something that could be improved is the compatibility with older versions. In distribution centers where Android devices with version 4.4.0 used, the solution gives many errors. In newer versions, the tool complies with its proper functioning.

For how long have I used the solution?

I've used the solution for one year.

How are customer service and support?

With the support teams, it is a bit complex due to the absence of support in Spanish. Also, the guides that the support service provides us in many cases are complex and make it difficult to solve problems.

How would you rate customer service and support?

Positive

What other advice do I have?

Harmony is not only great security for devices, it is a great analytics network that protects us from various attacks and that you can try with a simple and easy-to-configure agent on mobile devices.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2025
Product Categories
Mobile Threat Defense
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.