Try our new research platform with insights from 80,000+ expert users
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Easy to use with great URL filtering and protects from unauthorized downloads
Pros and Cons
  • "Harmony Mobile presents many innovative features."
  • "One of the improvements that can be made is that they become compatible with Google MDM."

What is our primary use case?

One of the main reasons why the implementation of Check Point Harmony Mobile was chosen was due to the fact that we needed a tool that had control and monitoring over mobile devices. Harmony Mobile provided us with that functionality. In this way, we were able to close a security gap that was affecting our organization. 

With this solution, users could connect to the organization and access the corporate data and thus comply with a more secure standard. 

Each mobile has applied policies through the Harmony Mobile panel and control the access

How has it helped my organization?

One of the great improvements that Harmony Mobile gave us is that it was possible to protect the mobile devices of each one of the users and thus not depend on the users to implement adequate security themselves. With a simple mistake or moment of carelessness, a user can accidentally cause great damage to sensitive company information.

With Harmony Mobile, users do not worry. It transmits all the security to this tool. Currently, with what has been happening in the world with Covid, many workers are working from home and with this solution, we can limit third-party access to devices.

It's important for it to have the main functions of Mobile Device Management (MDM), such as task automation, automatic application updates, they should also improve compatibility with other mobile device management (MDM) products on the market, ensuring correct operation between SandBlast Mobile and MDM. It's important for Point Harmony Mobile to be included in a broader offering so that it is not just a standalone product.

What is most valuable?

Harmony Mobile introduces many innovative features. One of them is URL filtering, which is very valuable in this tool. It offers to filter apps, protect privacy, and reject malicious or unauthorized downloads. It allows us to get an idea of how it protects the application through certain security levels that are threats, network applications and devices. Its administration and configuration is very simple. It is easy to use with its friendly interface, the solutions helped a lot to the security of the company.

What needs improvement?

Harmony Mobile is one of the first tools that we implemented in the organization when we entered into the protection of mobile devices. For many years all our staff did not have any restrictions on mobile devices. 

An improvement would be the compatibility of linking local and cloud solutions to create a hybrid scenario. They should allow adding a SIEM for additional functions. That said, in relation to the characteristics that it currently presents, it satisfactorily complies with the security of mobile devices.

One of the improvements that can be made is that they become compatible with Google MDM. 

When it comes to scanning the network, sometimes my SSI ID does not appear; it would also be a great plus if they could make a unified console where you can manage several Check Point products and thus not be opening different consoles to manage different products.

Buyer's Guide
Check Point Harmony Mobile
March 2025
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,690 professionals have used our research since 2012.

For how long have I used the solution?

I have been using about three years.

What do I think about the stability of the solution?

The stability of the product is very good and it generates an excellent amount of monitoring reports.

What do I think about the scalability of the solution?

It is a very scalable tool.

How are customer service and support?

With the support, we have had good and bad experiences. Sometimes they take time to respond. Sometimes they give an accurate solution to the error presented.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

A mobile device solution had not previously been implemented.

How was the initial setup?

One of the parts that worried us was its configuration and administration, however, it was extremely simple.

What about the implementation team?

The installation was done with a seller who demonstrated his ability and handling of the tool.

What was our ROI?

The investment made with this tool is very good. The information will be guaranteed, therefore, every penny invested is a good investment.

What's my experience with pricing, setup cost, and licensing?

The cost is affordable. It competes with other technologies and the installation is easy to implement.

Which other solutions did I evaluate?

We have not opted for other technologies since we have implemented the Check Point line into our company.

What other advice do I have?

It is a good tool that can be implemented in the organization and be sure that it will protect your mobile devices.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Dave Eversden - PeerSpot reviewer
Managing Director at Forever Group
MSP
Top 10
Enhances security and is easy to deploy and configure
Pros and Cons
  • "The solution was easy to deploy and provided a useful security enhancement for mobile devices."
  • "We had some issues with loopback VPN DNS filtering stopping working periodically, however, this is something that we could probably iron out with support."

What is our primary use case?

We used the solution to provide mobile threat defense for mobile devices (predominantly Apple iPhone/iPad). We evaluated numerous solutions from competitors including IBM, Better Mobile, Trend Micro, and others. Check Point is attractive since they are a market-leading firewall vendor and therefore we trust their filtering in terms of web and link protection beyond others who may rely on smaller or third-party feeds. We also found that the breadth of protections including app analysis and WiFi spoofing validation were helpful.

How has it helped my organization?

The solution was easy to deploy and provided a useful security enhancement for mobile devices. It allowed us to extend filtering technologies that we would generally expect to be available within an edge firewall to mobile devices - such as web content filtering and URL protection. With the prevalence of mobile phishing (including SMS phish which circumvents email filters), we felt that this was a useful security layer. Check Point is also a provider that we felt we could trust when adding products to our security stack.

What is most valuable?

The integration with Microsoft Intune scoped to the security group made deployment a breeze. Certainly, once the initial configuration was in place the process was smooth and devices began to appear in the Check Point Harmony portal automatically. Adding web and link protection was considered to be a valuable security enhancement and is a key benefit of using mobile threat defense. The fact that the product can also highlight changes in public IP addresses for known corporate WiFi SSIDs also helps to alert or prevent spoofing of internal WiFi networks.

What needs improvement?

We had some issues with loopback VPN DNS filtering stopping working periodically, however, this is something that we could probably iron out with support. In the end, we ended up disabling this feature and using Umbrella (which we also use). It is of course highly possible that we could have addressed this with their support team but in our scenario, it was easier to disable the functionality and run with a separate product that we already had available. Certainly, everything else worked fine and the alerts were very useful.

For how long have I used the solution?

I first used the solution several years ago.

What do I think about the stability of the solution?

We had no stability issues with the solution save for the periodic VPN loopback internet outages with iOS agents that I'm sure could be resolved with support.

What do I think about the scalability of the solution?

We don't foresee any obvious limits with the scalability of the solution for all but the largest of organizations.

How are customer service and support?

Support engineers were friendly and communicable.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We had previously trialed better mobile but the minimum onboarding/barrier of entry costs were too steep. We are also more familiar with the Check Point brand. We've also used Trend Micro before yet found the feature set for iOS devices to be slim.

How was the initial setup?

The solution has a straightforward setup - especially with Intune integration.

What about the implementation team?

We did an in-house implementation.

What was our ROI?

ROI is impossible to compute.

What's my experience with pricing, setup cost, and licensing?

Setup and recurring costs seemed reasonable and in line with other Check Point products.

Which other solutions did I evaluate?

We did evaluate IBM, Trend Micro, Better Mobile, and others.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony Mobile
March 2025
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,690 professionals have used our research since 2012.
Avesh Kumar - PeerSpot reviewer
Software Tester at a tech services company with 51-200 employees
Real User
Works with mobile, protects against vulnerabilities, and offers real-time scanning
Pros and Cons
  • "The simple navigation offered by the graphical user interface is excellent."
  • "The ability to integrate local and cloud technologies to create a hybrid scenario would be an upgrade."

What is our primary use case?

We require a tool that could control and monitor mobile devices, which was one of the primary factors in our decision to adopt Check Point Harmony Mobile. With this tool, we had that capability. We were able to shut down a security hole that was harming our company. The user can connect to the company and access corporate data via this technology, enabling them to adhere to a more secure standard. With the help of the Harmony Mobile panel, each mobile has implemented policies that govern access. It is used by us to control mobile connections. It is a cloud-based solution that is installed on Check Point's cloud.

How has it helped my organization?

Prior to having this solution, our users were vulnerable to infections of any kind on tablets and mobile devices used for business. We have reduced these dangers by utilizing Harmony Mobile's security, which helps both the user and the administrator. With the help of Check Point Harmony, mobile users also have the same level of protection as the business's computers and laptops do and users are also secure to use on both iOS and Android. Observe Point Mobile devices used by employees are protected from dangerous software and attacks on their network or operating system.

What is most valuable?

Check Point's Sandblast Mobile solution integrates with Mobile Device Management and supports Android and iOS operating systems. Two profiles are created for each mobile device when it is configured. There are two types of profiles - personal and professional - and various security guidelines can be applied to each. 

Real-time scanning is only one of the amazing capabilities offered by this tool. 

The simple navigation offered by the graphical user interface is excellent. 

We value the centralization it brings about.

What needs improvement?

The tool is excellent for security purposes, and it gives a lot of information. That said, there needs to be some improvement in everything related to administration and assistance. 

The ability to integrate local and cloud technologies to create a hybrid scenario would be an upgrade. 

Making this tool compatible with Google MDM is one of the enhancements that must be made. 

The increased load on an outdated terminal, which slows them down, is another item to consider. 

It would be preferable if they could incorporate application vulnerability management.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1523535 - PeerSpot reviewer
IP LAN and Integrity Specialist at Chevron
Real User
Good scanning capabilities, impressive performance, low battery consumption
Pros and Cons
  • "I really like the application scanning feature that scans all of the installed applications, and not only what appears in the add or remove apps, and then reports the results in the console."
  • "Some configuration options inside the management console are a little confusing because the interface is not always user-friendly."

What is our primary use case?

We use SandBlast Mobile, integrated with our MDM for automatic deployment of solutions on our devices. This is for our corporate mobile devices, and also for BYOD (Bring your own device) cases. This works well for the users that want access to our corporate repositories for accessing information.

SandBlast is always monitoring their activity including the applications that are installed or they are trying to install, not allowing apps that are not 100% trusted, receiving logging alerts, etc., to take care of our devices and avoid their comprise. 

How has it helped my organization?

SandBlast Is providing a real security approach, not only AV like other vendor solutions.

Continuously, we are monitoring the apps and rate them, obtain reports, etc., to see the security posture of the devices and apply compliance policies. This prevents users from installing fake applications or non-approved software.

It also monitors all of the user navigation inside the phone, controlling non-permitted connections like fake Wi-Fi, etc. It also manages the enterprise e-mail in a secure way to avoid unauthorized access from the mobile device.

What is most valuable?

I really like the application scanning feature that scans all of the installed applications, and not only what appears in the Add or Remove Apps section, and then reports the results in the console.

The performance of this solution is absolutely impressive, especially in terms of battery consumption. It has less consumption than I was expecting

It is a very stable solution that integrates well with the most standard MDM solutions in the current market.

It offers good support for Apple devices and multiple Android versions, which is quite important if you have a disparate set of devices.

What needs improvement?

There are more features for Android devices than Apple, but, think is more related to the Apple API than Check Point.

Some configuration options inside the management console are a little confusing because the interface is not always user-friendly.

Some policies that can cause problems on the devices, like remediation, cannot be implemented by the administrator and are required to be done by Check Point. This is inconvenient because in some cases, we need a remediation policy immediately and we cannot wait for Check Point to implement it.

For how long have I used the solution?

We have been using Check Point Harmony Mobile for approximately two years.

What do I think about the stability of the solution?

It is a stable solution and we have experienced no problems with our mobile devices.

What do I think about the scalability of the solution?

SandBlast can scale without any kind of problems.

How are customer service and technical support?

We have had no problems with the support to this point.

Which solution did I use previously and why did I switch?

We did not use another similar solution prior to this one.

How was the initial setup?

The initial setup is very easy. The cloud solution is easy to deploy and integrate with our MDM.

What about the implementation team?

This was implemented directly by Check Point Professional Services. The team is very experienced with the solution.

What's my experience with pricing, setup cost, and licensing?

This is a very expensive product.

Which other solutions did I evaluate?

We also evaluated an Intel security solution.

What other advice do I have?

In summary, this is a very good solution that works as expected, although it is very expensive.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Adam Coulibaly - PeerSpot reviewer
Suporta engineer at Novasys
Real User
Provides complete protection and is easy to deploy and manage
Pros and Cons
  • "Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage."
  • "If possible, it would be better if they can include vulnerability management for applications. When a user installs many applications, if there is a way to manage a pack of applications, it would be helpful."

What is our primary use case?

We are mainly using it to manage mobile connections. It is a cloud solution, and it is deployed on the Check Point cloud.

How has it helped my organization?

We can manage different mobiles in the Harmony portal. For example, we can fix the version of the OS system that can connect to our network. Some applications are not authorized to be installed by the user. So, we can block those applications or versions.

What is most valuable?

Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage.

What needs improvement?

If possible, it would be better if they can include vulnerability management for applications. When a user installs many applications, if there is a way to manage a pack of applications, it would be helpful.

For how long have I used the solution?

I have been using this solution for two years.

What do I think about the stability of the solution?

There is no problem with stability. We have had no issues since we started using this product.

What do I think about the scalability of the solution?

It is very easy to scale. We have 10 users, and it is for our internal use. We are also a Check Point partner, and we use it on our mobile phones to show it to our customers during seminars or presentations.

How are customer service and support?

I'm a support engineer, and I have contacted their technical support. I was with a customer who needed some information about the mobile UEM integration of Harmony Endpoint, and I had to contact their technical support to find out how we can do this easily. 

Their support is very easy to contact. We are a partner, and when we contact their support, they always respond on time. Their support is very good.

Which solution did I use previously and why did I switch?

We were providing Kaspersky and Bitdefender to our customers before becoming a partner of Check Point. I don't know if Bitdefender has protection for mobile, but I know that Kaspersky has recently started developing for mobile. Check Point Harmony Mobile is better and more secure for mobile protection because of its stability and all the functionality. It is easy to deploy and manage.

How was the initial setup?

Its initial setup is very simple. If any additional configuration needs to be done, I just receive an email. When a user is added to the portal, you receive an email with information about the server and the password. You can just click and start the application. It is very easy.

It is pretty fast. It just takes one minute for the installation and the first scan.

What about the implementation team?

I do it myself from the office. I don't need an assistant from Check Point or anyone else. I just need to read the documentation. I can download the documentation from their website, which contains the information for installation and troubleshooting.

The maintenance can be done from the tenants in the cloud. You can do the updates and patching of the product in the portal.

What's my experience with pricing, setup cost, and licensing?

At the moment, the price is good, but there is always scope for amelioration when it comes to pricing. When pricing is lower, it can make a customer buy the product. Customers ask us about the price of the product before allowing us to explain the functionality to them.

What other advice do I have?

I would recommend this solution to others. It is easy to implement, and it is easy to manage. It covers OS protection, network protection, file protection, and application protection. It provides the best protection.

I would rate it a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
MulukenMekonene - PeerSpot reviewer
Senior Network Engineer at DeliverICT
Real User
Top 5
Provides user-friendly graphical interface with blocking capabilities and easy integration

How has it helped my organization?

We are following the necessary activities and communicating with the client. Check Point Harmony Mobile offers significant benefits, such as enhancing its security. The client is proud to use Harmony Mobile, which has improved their overall security posture.

What is most valuable?

The user-friendly graphical interface makes it easy to interact with Harmony Mobile. Its simplicity allows for smooth engagement with the platform.

For how long have I used the solution?

I have been using Check Point Harmony Mobile for six or seven months.

What do I think about the stability of the solution?

I rate the solution’s stability a nine out of ten.

What do I think about the scalability of the solution?

It is scalable.

I rate the solution’s scalability an eight out of ten.

How are customer service and support?

Check Point support has been incredible. As soon as we create the tag, we can have an engineer to support us.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

They are choosing Harmony Mobile over other vendors due to its effective blocking capabilities for threats like phishing and malware. Harmony Mobile offers these features at a lower cost than competitors like Palo Alto, Cisco, and Fortinet. Given its competitive pricing and comprehensive features, we encourage other financial institutions to adopt Harmony Mobile for enhanced security.

How was the initial setup?

The integration process is smooth and straightforward, with no difficulties, even on my new tech phone. It also integrates well with third-party systems. The installation is simple, and our professional service team is there to assist with setting up Harmony Mobile

What other advice do I have?

One of our clients has committed to deploying these features. We are working on deploying Check Point Harmony Mobile and preparing a proposal for the bank. Once they accept, we can proceed, which will enhance Harmony Mobile's security features.

Clients are very impressed with Harmony Mobile's threat intelligence capabilities, especially the live, real-time updates. The bank's administrators were particularly amazed by the features of advanced threat intelligence. Harmony Mobile adds numerous security features and simplifies the work for both administrative and security staff.

Due to its significant benefits, we encourage other microfinance and financial institutions to adopt this technology. By deploying Harmony Mobile, they gain enhanced security, reduced workload, and overall efficiency, all at a lower cost than other solutions. The technology is proving to be both valuable and cost-effective for users.

We recommend that financial institutions use Harmony Mobile because it is highly effective in blocking threats like phishing and malware, which are significant concerns in today's market. Financial institutions are major targets for these attacks, so Harmony Mobile's specialized features are precious. We are encouraging them to adopt this solution for enhanced security.

Two engineers are enough for the solution's maintenance.

Overall, I rate the solution a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:
Flag as inappropriate
PeerSpot user
PeerSpot user
Senior Network/Security Engineer at Skywind Group
Real User
Multi-platform support, easy to use, and the VPN portal does not require a client to be installed
Pros and Cons
  • "The most impressive thing is the SSL VPN Portal."
  • "I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

The Check Point Mobile Access software blade is one of the numerous blades activated on the NGFWs and serves for providing connectivity to the datacenter for the employees.

How has it helped my organization?

The Check Point Mobile Access is activated on the Check Point HA Clusters and protects our datacenter located in Taiwan. It is used to provide connectivity to the internal resource for our employees, thus Remote Access VPN services.

The blade is easy to enable and configure, and it provides great benefits with the help of the built-in SSL VPN Portal. Now, most of our employees don't even use any client software, but just the browsers on their devices, to access the applications published via the SSL VPN Portal.

The connection is stable and reliable, and the level of security and encryption is still high. We find this solution really useful and helpful.

What is most valuable?

The users in our company like that the VPN client is supported on the different platforms and operational systems, e.g. Android smartphones and tablets, Windows and MacOS PCs and laptops.

The most impressive thing is the SSL VPN Portal. With it, you don't even need any client software, just a browser is enough to connect. We have integrated the SSL VPN Portal with the Microsoft Exchange server, and this covers the needs of 95% of our users regarding remote access to the office.

The authentication is performed via integration with Active Directory, so the employees use the same credentials. It is super easy and everybody likes that.

What needs improvement?

I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain. Maintenance requires that the licenses and the support services be prolonged regularly.

Alternatively, they should create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers.

We have also had several support cases opened for software issues, but none of them were connected with Check Point Mobile Access.

For how long have I used the solution?

We have been using this product for about three years, starting in late 2017.

What do I think about the stability of the solution?

The Check Point Mobile Access software blade is stable.

What do I think about the scalability of the solution?

The Check Point Mobile Access software blade scales well with the gateways we use, since it doesn't affect the overall performance much after activation.

How are customer service and technical support?

We have had several support cases opened, but none of them were connected with the Check Point Mobile Access Software Blade. Some of the issues were resolved by installing the latest recommended JumoHotfix, whereas some required additional configuration at the OS kernel level.

The longest issue took about one month to be resolved, which we consider too long.

Which solution did I use previously and why did I switch?

No, we didn't use any SSL VPN solutions before onboarding Check Point Mobile Access.

How was the initial setup?

The setup was straightforward. The configuration was easy and understandable, and we relied heavily on built-in objects and groups.

What about the implementation team?

Our deployment was completed by our in-house team. We have a Check Point Certified engineer working in the engineering team.

What's my experience with pricing, setup cost, and licensing?

Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.

Which other solutions did I evaluate?

No, we decided to stick to the Check Point Mobile Access after the demo with the vendor.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Provides great data security, access control, and network security
Pros and Cons
  • "As a security solution for devices, it can benefit us in many ways, including providing us with data security, access control, network security, and more."
  • "One thing that should be improved in the future of the ability to ensure that mobile devices are protected from connections in environments with unlimited connectivity."

What is our primary use case?

This solution is required for one of the internal needs of our organization. We need the product based on our need for the control of access to corporate resources. We were looking for a solution that allows us to generate the management of mobile network devices and something that could secure all systems in the best way possible, thus giving us a solution that allows for general device management. With this product, our organization will be able to monitor and control the devices used by each of our employees in the organization, which gives us an level of adequate security configuration and allows us to comply with internal policies.

How has it helped my organization?

As a security solution for devices, it can benefit us in many ways, including providing us with data security, access control, network security, and more. The kinds of features on offer provide us with confidential access to information, ensuring each of the different devices is protected while improving the productivity of employees. In summary, this solution can help us protect business resources in the best way possible, which can be translated into efficient and profitable security.

What is most valuable?

A very important feature that is outstanding and helps our organization is the ability to protect the business data stored on each device. This is especially important since these devices are used to create information, catalogs, products, customer information, and inventory. Every time they are outside the company, the solution provides us with a secure connection from the devices to the database, thereby keeping data safe. In addition, we can improve the productivity of each of the employees remotely. This benefits to the company in terms of sales or productivity even from different locations. 

What needs improvement?

One thing that should be improved in the future of the ability to ensure that mobile devices are protected from connections in environments with unlimited connectivity. 

In some cases, devices may be found in areas with little or no signal, which can make it difficult to connect to the network. That makes it difficult to use the solution. We ned to ensue we have something that allows users to work effectively even without a strong network connection. This would allow us to have a solution that adapts to the challenged presented by limited connection environments.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2025
Product Categories
Mobile Threat Defense
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.