Check Point Harmony Mobile protects mobile devices from phishing, malicious apps, and network-based attacks while ensuring secure access to corporate resources. Employees often use their phones for email, messaging, and collaboration apps. In this context, Check Point Harmony Mobile acts as a shield that continues monitoring for threats without disrupting productivity.
Security Support at a non-tech company with 201-500 employees
Defends Mobile Devices from Phishing and Network Threats While Supporting User Productivity
Pros and Cons
- "One of the strengths of Check Point Harmony Mobile is how it balances usability with enterprise-grade protection, as the app runs silently in the background, protecting against threats without slowing down devices or interfering with personal use."
- "Check Point Harmony Mobile can be improved by enhancing user experience customizations."
What is our primary use case?
What is most valuable?
The best feature Check Point Harmony Mobile offers is real-time mobile threat protection. Real-time mobile threat protection stands out because it does not just rely on traditional detection methods; it continuously monitors device behavior, apps, and network traffic to stop threats the moment they appear.
Check Point Harmony Mobile has positively impacted my organization by providing real-time mobile threat prevention that blocks phishing, malware, and unsafe connections, ensuring employees can safely use their devices for work.
What needs improvement?
Check Point Harmony Mobile can be improved by enhancing user experience customizations. More granular control over alerts and notifications could help balance security with minimal disruption for end-users.
Regarding support, I believe it is only available in the English language, which could be an improvement area.
For how long have I used the solution?
I have been using Check Point Harmony Mobile for six years.
Buyer's Guide
Check Point Harmony Mobile
January 2026
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
879,899 professionals have used our research since 2012.
How are customer service and support?
5
How would you rate customer service and support?
Positive
What other advice do I have?
A specific example of how I use Check Point Harmony Mobile in my daily work is when someone connects to public Wi-Fi at different sites. Check Point Harmony Mobile detects the network was vulnerable to man-in-the-middle attack, immediately blocks the risky traffic, and alerts the user, preventing credentials from being intercepted.
Another example I have is that Check Point Harmony Mobile has helped us by enforcing device compliance and app security across all employee phones. It ensures the devices have encryption enabled, are running updated operating systems, and have not been rooted or jailbroken before they connect to corporate resources. This stops vulnerable devices from becoming entry points for attackers.
One of the strengths of Check Point Harmony Mobile is how it balances usability with enterprise-grade protection. The ease of use is evident as the app runs silently in the background, protecting against threats without slowing down devices or interfering with personal use.
My advice for others looking into using Check Point Harmony Mobile is that it is an excellent application for securing smartphones. The agent is not intrusive and does not require high performance.
I would rate this product a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Dec 30, 2025
Flag as inappropriateCloud network engineer at a manufacturing company with 10,001+ employees
Efficient threat detection and prevention reduces cyber attacks by 50%
Pros and Cons
- "Check Point Harmony Mobile has positively impacted my organization by achieving a decrease in 50% in the cyber attacks."
- "My experience with pricing, setup cost, and licensing is that it is very expensive."
What is our primary use case?
My main use case for Check Point Harmony Mobile is that we use it on our employee mobile phones to protect from zero-day malware and other sorts of viruses.
What is most valuable?
The best features that Check Point Harmony Mobile offers are that it's very lightweight, the invisibility of the product to the end user is good, the threat detection and prevention is excellent, and it supports both Android and iOS.
Check Point Harmony Mobile has positively impacted my organization by achieving a decrease in 50% in the cyber attacks.
The overall protection contributed most to that 50% decrease.
What needs improvement?
Check Point Harmony Mobile can be improved in terms of the reporting.
I would like to see improved speed, overall speed, and customization in the reporting.
For how long have I used the solution?
I have been using Check Point Harmony Mobile for six months.
How are customer service and support?
The customer support is pretty good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I did not previously use a different solution.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing is that it is very expensive.
Which other solutions did I evaluate?
Before choosing Check Point Harmony Mobile, I evaluated other options like CrowdStrike, Cisco, and Ivanti.
What other advice do I have?
The advice I would give to others looking into using Check Point Harmony Mobile is to guarantee requirements.
My company is just a customer without any business relationship with this vendor other than being a customer.
I was not offered a gift card or incentive for this review.
I have no additional thoughts about Check Point Harmony Mobile before we wrap up.
On a scale of one to ten, I would rate Check Point Harmony Mobile an eight.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Aug 26, 2025
Flag as inappropriateBuyer's Guide
Check Point Harmony Mobile
January 2026
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
879,899 professionals have used our research since 2012.
Presales Consultant at a outsourcing company with 1,001-5,000 employees
Visibility into mobile risks has improved our guidance while pricing could be more competitive
Pros and Cons
- "Check Point Harmony Mobile is the best solution to secure user mobile devices and company data."
- "I have not seen a return on investment so far because I think it is too early to say."
What is our primary use case?
My main use case for Check Point Harmony Mobile is that many users rely on mobile devices as a first point of attack, and it is very important to secure mobile and endpoints because mobile users take them home, conduct personal activities, and bring them back to the company without any security checks. Check Point Harmony Mobile is the best solution to secure user mobile devices and company data.
I do not have any additional information about my main use case or unique challenges my organization faces with mobile security; we are simply trying out this product.
How has it helped my organization?
Check Point Harmony Mobile has positively impacted my organization so far because we began using it very recently and need more time to observe the results.
Since I am still early in the process, I have noticed some initial benefits or feedback from users, even if they are minor changes. We have observed that some users have pirated applications, which has helped us to gain visibility into what is happening on user devices.
What is most valuable?
The best features Check Point Harmony Mobile offers in my experience so far are that our help desk team can view and check it for visibility.
This visibility has helped our team in day-to-day operations because we can guide our employees if they are doing something wrong or have applications that may compromise company data.
What needs improvement?
Check Point Harmony Mobile can be improved, but I do not wish for any changes as I think it is perfect.
I do not wish to add more about needed improvements or features that could be enhanced in the future; the product is good.
For how long have I used the solution?
I have been using Check Point Harmony Mobile for around six months.
What do I think about the stability of the solution?
Check Point Harmony Mobile is stable because I have not experienced any crashes or major issues.
What do I think about the scalability of the solution?
In my experience, Check Point Harmony Mobile's scalability can handle growing numbers of devices easily.
How are customer service and support?
I have not interacted with customer support for Check Point Harmony Mobile yet.
How would you rate customer service and support?
Negative
Which solution did I use previously and why did I switch?
I previously used Quick Heal antivirus for mobile security, and we switched to Check Point Harmony Mobile because of that solution's limitations.
What was our ROI?
I have not seen a return on investment so far because I think it is too early to say.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing for Check Point Harmony Mobile is that pricing can be a little bit lower, which would be good because other antivirus solutions are significantly cheaper.
What other advice do I have?
The advice I would give to others looking into Check Point Harmony Mobile is to get a proof of concept done to gain more clarity and understanding about the product.
My company does not have a business relationship with this vendor other than being a customer because we are not a partner.
I found this interview good and I do not think anything needs to change for the future.
My overall review rating for Check Point Harmony Mobile is 6.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Other
Last updated: Nov 3, 2025
Flag as inappropriateCybersecurity Engineer at a tech services company with 11-50 employees
Advanced threat prevention reduces security incidents and simplifies remote access management
Pros and Cons
- "Overall, we are very satisfied with Check Point Harmony Mobile."
- "The cost is a bit high. While it is worth the investment given the increased security and improved user experience, it is definitely a significant expense."
What is our primary use case?
We use Check Point Harmony Mobile to provide secure access for our remote workers, including employees working from home and those traveling. It allows them to connect to our internal network and applications securely, regardless of their location. We also use it for our branch offices to connect back to our central network.
What is most valuable?
We have seen a significant reduction in security incidents, particularly phishing attacks and malware infections. Check Point Harmony Mobile's advanced threat prevention capabilities have been very effective in blocking these threats. We also appreciate the consistent security policies we can now enforce, no matter where our users are connecting from. Overall, we are very satisfied with Check Point Harmony Mobile. It has significantly improved our security posture and simplified our remote access management.
What needs improvement?
The cost is a bit high. While it is worth the investment given the increased security and improved user experience, it is definitely a significant expense.
What do I think about the stability of the solution?
We have not had many complaints from our users about performance issues.
How are customer service and support?
There were a few initial hiccups with certain applications, but Check Point Harmony Mobile support helped us resolve those quickly.
How would you rate customer service and support?
Positive
How was the initial setup?
The deployment was straightforward.
What about the implementation team?
Check Point Harmony Mobile support helped us resolve initial hiccups quickly.
What's my experience with pricing, setup cost, and licensing?
The cost is a bit high. It is a significant expense, but it is worth the investment given the increased security and improved user experience.
What other advice do I have?
Overall, we are very satisfied with Check Point Harmony Mobile. It has significantly improved our security posture and simplified our remote access management. I would rate the solution 9 out of 10.
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Apr 30, 2025
Flag as inappropriateTechnical Architect and consultant at a aerospace/defense firm with 10,001+ employees
Protects devices from sophisticated attacks, including malware
Pros and Cons
- "Harmony Mobile is a unified security solution for user devices and internet connections. It protects devices from sophisticated attacks, including malware, and implements Zero Trust Access for comprehensive security."
- "The solution should improve passive scanning and provide regular updates. Also, during business hours, users should not experience any slowdown on their devices."
What is our primary use case?
We use the solution in the hospitality and aviation domains.
What is most valuable?
Harmony Mobile is a unified security solution for user devices and internet connections. It protects devices from sophisticated attacks, including malware, and implements Zero Trust Access for comprehensive security.
What needs improvement?
The solution should improve passive scanning and provide regular updates. Also, during business hours, users should not experience any slowdown on their devices.
For how long have I used the solution?
I have been using Harmony Mobile for four years.
What do I think about the stability of the solution?
I rate the solution’s stability an eight out of ten.
What do I think about the scalability of the solution?
The scalability is very good. We have to take the perpetual license, etc., to expand headcounts. It is suitable for medium to enterprise businesses.
I rate the solution’s scalability a nine out of ten.
How are customer service and support?
Support is good and available 24/7.
How would you rate customer service and support?
Positive
How was the initial setup?
The solution requires a one-time setup, which is on cloud. We must enable inbound configurations by setting up the server. This server should be associated with the Check Point management server, from which we can push policies. We have similar software solutions, such as CrowdStrike and CloudStack, that offer robust security features. In addition, we use products from McAfee and Symantec, among other security vendors. I am working with multiple vendors and organizations, including Microsoft's security solutions.
Once it is designed and discussed, the server will be implemented in about one week, depending on the situation and various factors, such as the number of Harmony users.
What was our ROI?
The tool provides powerful and good features, making it easy to do business.
What's my experience with pricing, setup cost, and licensing?
The product pricing is moderate.
What other advice do I have?
Harmony Mobile is highly effective for protecting mobile devices. Much information and data are shared over the cloud using mobile devices and laptops. Many mobile attacks target devices without robust security features, making them vulnerable to malicious files and bots. However, if a device is configured with Check Point Harmony Protection, these threats, including encrypted and malicious files, will be detected and neutralized based on the configuration settings. This protection ensures the safety of business data and other critical information. Additionally, Harmony Mobile is easy to install and requires minimal intervention on mobile devices, making it a very effective security solution.
Nowadays, everything is integrated with AI, which benefits various use cases and users. For example, if a malicious code is detected by the device, it should send an alert message to the user. Harmony Mobile can notify the user by saying, "Malicious code detected. Please take appropriate action." This kind of artificial intelligence support ensures that even if users do not see the message, they can be alerted through a voice message.
We recommend the solution.
Overall, I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
Senior Technical Consultant- Cyber Security at a tech services company with 51-200 employees
Offers ease of management and can be installed effortlessly
Pros and Cons
- "The product's initial setup phase is very straightforward."
- "At times, when configuring policies, the tool takes some time to apply the policy."
What is our primary use case?
I use the solution in my company so that whoever the mobile users are and those who use the corporate applications, we can secure communication from the corporate application to the outside network. My company uses Check Point Harmony Mobile through the browser to secure our applications, as well as to secure the communication between customers and other users.
What is most valuable?
The most effective features of the product stem from its ability to deal with areas like data security and application security while also being useful to users who use mobiles in roaming mode and those who use a personal mobile phone with corporate applications in it.
What needs improvement?
At times, when configuring policies, the tool takes some time to apply the policy. If I configure a new policy and apply it to the management console, it may take time. The product should work on policy enforcement so that users can quickly enforce the policies within a fraction of a second.
For how long have I used the solution?
I have been using Check Point Harmony Mobile for three years.
What do I think about the stability of the solution?
Stability-wise, I rate the solution a nine out of ten. Some customers of the tool face some issues in their environment with respect to policy enforcement.
What do I think about the scalability of the solution?
It is a very easily scalable solution.
My company deals with a very limited set of customers of the product. The tool's competitors have been very aggressive with the mobile browser part, especially the ones offering MDM solutions. Those who use firewall products from Check Point are very happy to acquire and use Check Point Harmony Mobile.
How are customer service and support?
As and when required, the solution's technical support helps users with troubleshooting. The solution's technical support is good, and it responds quickly.
How was the initial setup?
The product's initial setup phase is very straightforward.
For the product's deployment phase, you just need to install the agent to the end user and configure the policy on the cloud management console.
The solution's deployment phase is a one-day task.
What was our ROI?
In terms of ROI, the product helps secure your application, mobile, and data.
What's my experience with pricing, setup cost, and licensing?
There is a need to make yearly payments towards the licensing costs attached to the product. You can opt for a one-year, three-year, or five-year license. There is a separate team that handles the pricing part of the product, and depending on the customers or order quantity they handle, I believe that 60 or 70 percent discounts on the prices are offered. There are no additional costs attached to the product.
What other advice do I have?
The tool helped prevent potential security threats whenever some users communicate from their mobile with someone outside our company since, at such a time, the product secures the communication as well as the data. With the tool, no confidential data goes outside from the inside of our company. Our company can block data leakage from mobile phones to the outside environment of our organization.
The threat detection and response capabilities of the tool benefit the company in scenarios where a user wants to send out some confidential data outside the company through the browser, which would not be possible If the organization uses Check Point Harmony Mobile. The tool shows how our company can secure the user, as well as how we can prevent data leakage from the inside to the outside of the organization.
The product provides users with ease of management. It is a simple tool that allows users to configure some of the policies for a user or a user-based group and apply them to the solution.
According to Gartner's website, the tool's stability and support as a security provider places it in the leader category.
The tool helps respond to emerging corporate threats, especially those who use corporate applications on their personal devices. If you want to secure your corporate applications, you have to adopt Check Point Harmony Mobile.
If you use corporate applications on your personal mobile device and you want to secure your applications and data, then you have to use Check Point Harmony Mobile.
I rate the tool a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Security Support Engineer at a tech vendor with 51-200 employees
Mobile security is enhanced, but log retrieval needs improvement
Pros and Cons
- "Check Point Harmony Mobile has positively impacted my organization by improving compliance in the customer's environment and helps remind the customer that there is protection on the devices."
- "Troubleshooting on Check Point Harmony Mobile is quite difficult because the logs are not located in the cloud, but they are on the local device."
What is our primary use case?
My main use case for Check Point Harmony Mobile is for securing mobile devices and remote workers.
A specific example of how I use Check Point Harmony Mobile is when the customer receives a company phone. To protect such phone because it might contain sensitive information, it is installed with Check Point Harmony Mobile, which keeps the phone safe for most of the time and allows security on the phone.
What is most valuable?
All features are very fundamental because they are a core protection that every single customer and device should have, especially sensitive devices such as phones that can be used for malicious intent if not protected correctly.
Check Point Harmony Mobile has positively impacted my organization by improving compliance in the customer's environment and helps remind the customer that there is protection on the devices. The weakest link is not the software itself, but the person using the device.
What needs improvement?
Troubleshooting on Check Point Harmony Mobile is quite difficult because the logs are not located in the cloud, but they are on the local device. If there is an issue, you need to retrieve the logs from the device itself, which requires user availability.
For how long have I used the solution?
I have been using Check Point Harmony Mobile for a few months.
What do I think about the stability of the solution?
Check Point Harmony Mobile is stable because I never received any request for troubleshooting other than the one I mentioned previously.
What do I think about the scalability of the solution?
The scalability of Check Point Harmony Mobile can handle a growing number of devices or users easily, depending on the licensing pool.
How are customer service and support?
I had to reach out to customer support for Check Point Harmony Mobile recently to understand better where the log location was, and they replied with the correct SK procedure.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I am not aware if I evaluated other options before choosing Check Point Harmony Mobile.
I am not aware if I previously used a different solution before Check Point Harmony Mobile.
What was our ROI?
I am not aware if I have seen a return on investment from using Check Point Harmony Mobile.
What other advice do I have?
Check Point Harmony Mobile is deployed in my organization in the public cloud.
I use the Check Point provider for the cloud.
I am not aware of the experience with pricing, setup cost, and licensing for Check Point Harmony Mobile.
I rate Check Point Harmony Mobile a seven out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Aug 20, 2025
Flag as inappropriatePresales Engineer at a comms service provider with 51-200 employees
Provides good threat detection and prevention, but it lacks MDM capabilities present in other MDM products
Pros and Cons
- "The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS."
- "Check Point Harmony Mobile lacks MDM capabilities, which are present in other MDM products, like IBM Security MaaS360, AirWatch, and Google Workspace."
What is most valuable?
The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS. Check Point Harmony Mobile is a good option for users who want only incoming and outgoing traffic security for their Android and iOS devices.
What needs improvement?
Check Point Harmony Mobile lacks MDM capabilities, which are present in other MDM products, like IBM Security MaaS360, AirWatch, and Google Workspace.
For how long have I used the solution?
What do I think about the stability of the solution?
Check Point Harmony Mobile is a stable solution.
I rate the solution a nine out of ten for stability.
What do I think about the scalability of the solution?
Around two to three customers are using Check Point Harmony Mobile.
I rate the solution’s scalability a six out of ten.
How are customer service and support?
The technical support team's response time should be faster. Also, the engineers should come up with a proper solution plan, which is currently missing.
Which solution did I use previously and why did I switch?
I have previously worked with Azure MDM, IBM Security MaaS360, and VMware AirWatch. The solution has better threat detection capabilities and catch rates than other mobile security vendors.
What about the implementation team?
The solution’s deployment takes around five minutes. To deploy the solution, you need to deploy the agent to the endpoint Android. It will then be listed in the Infinity portal, and you can start configuring.
You need to download the agent from the Infinity portal, put it on your mobile, install it, and activate it. It will be reflected in the Infinity portal, and you can then configure the policy.
What was our ROI?
Check Point Harmony Mobile can help you with regulation compliance. Customers will secure all infrastructure that belongs to them because they are managing that infrastructure. However, they don't have any control over mobile devices connected to their network. Any threats to those particular devices can also affect your infrastructure if they are connected without any protection.
Check Point Harmony Mobile will ensure the device is clean in such cases. Even if the device gets connected to your infrastructure, there won't be any infection or any impact happening to your infrastructure.
What's my experience with pricing, setup cost, and licensing?
Users have to pay a yearly licensing fee for each device, which is cheap.
What other advice do I have?
Check Point Harmony Mobile is not so attractive and provides security only for mobile devices. Customers can use Check Point Harmony Mobile to secure their mobile devices, such as Android or Mac smartphones. However, it has less capability than an MDM (Mobile device management).
Check Point Harmony Mobile has a good advantage in terms of security posture and security threat detection and prevention. Check Point Harmony Mobile will help prevent 99% of attacks on mobile devices. It is easy to manage Check Point Harmony Mobile.
People bring their own devices and connect them to all the other unwanted networks. This causes traffic to flow to these devices from any network source, such as Wi-Fi, LAN, or other public networks. Deploying Check Point Harmony Mobile can ensure the endpoint is sanitized and clean for use at home and the workplace.
Overall, I rate the solution a six out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Mobile Threat DefensePopular Comparisons
Symantec Endpoint Protection Mobile
McAfee MVISION Mobile
Pradeo Mobile Threat Defense
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros
sharing their opinions.











