The Checkpoint Harmony mobile application is used to protect and eliminate our corporate iPhone users from malicious attempts such as phishing, malware, malicious websites, anti-bots, and harmful applications. Many users receive malicious text messages and emails prompting them for credentials such as corporate active directory details, banking information, or credit card information. It is important to protect our corporate data on all mobile devices by using Check Point's Harmony Mobile Application.
Senior Information Technologist at a energy/utilities company with 1,001-5,000 employees
Easy to use with zero-touch deployment and excellent assistance
Pros and Cons
- "The other most valuable service so far has been the assistance provided to us by the Check Point Harmony mobile engineers. They have been so awesome and helpful to us during the setup process."
- "It would be super helpful if there were more details around the risks that were found on our mobile devices."
What is our primary use case?
How has it helped my organization?
It has provided us with an easy-to-use solution that protects our corporate data on all our iPhone mobile devices. The easy-to-manage cloud-based management console provides us with details on the scanning status of our devices and reports all risks that are identified on the mobile devices. It is wonderful to be able to customize the many policies in order for the application to work at it's best for our corporate environment. The scalability has provided us with much protection and flexibility - and that is what we definitely need.
What is most valuable?
The zero-touch deployment system process has been the most valuable feature thus far. The ability to deploy and configure the application with the help of Microsoft's Endpoint Management (our mobile device management solution) has been seamless and has given us the ability to deploy with zero user interaction.
The other most valuable service so far has been the assistance provided to us by the Check Point Harmony mobile engineers. They have been so awesome and helpful to us during the setup process.
What needs improvement?
The area that I find could use the most improvement would be in the forensics section of the administrator console. It would be super helpful if there were more details around the risks that were found on our mobile devices. A simple click to find out more information would be excellent. Also, a reporting option would be beneficial as well. Maybe the option to send an email to the administrators when a high-risk vulnerability is found and also the option to run a monthly report to send to administrators would be great.
Buyer's Guide
Check Point Harmony Mobile
November 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
814,763 professionals have used our research since 2012.
For how long have I used the solution?
I've used the solution for about 4 months.
What do I think about the stability of the solution?
The solution is very stable; we have not had any connection issues with the devices reporting into the admin console.
What do I think about the scalability of the solution?
The options to customize the policies are very beneficial.
How are customer service and support?
Technical support is great. All have excellent customer service skills and stellar technical abilities.
Which solution did I use previously and why did I switch?
We previously did not have a solution in place.
How was the initial setup?
The initial setup was straightforward and the documentation was excellent.
What about the implementation team?
We did an in-house implementation with support from engineers.
What was our ROI?
In terms of ROI, we do not know this yet.
What's my experience with pricing, setup cost, and licensing?
I'd advise new users to be sure to get all information about the cost and licensing first.
Which other solutions did I evaluate?
No, we did not evaluate other options first.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Manager, Infrastructure Services at a energy/utilities company with 1,001-5,000 employees
Straightforward to setup with great technical support and an excellent admin portal
Pros and Cons
- "The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly."
- "The admin portal is slightly clunky and sometimes shows a different status than what the device is actually doing."
What is our primary use case?
We were lacking threat detection and device-level protection in our mobile device space. We are an Apple shop exclusively and although Apple does a good job at vetting apps and developers in the Apple App Store, we were lacking protection beyond that. The Harmony Mobile Protect suite really gave us the confidence of protection and real-time threat level safeguards. Users have the confidence to know that the data on their devices is safe. It's a great solution that has a proven track record in the mobile space.
How has it helped my organization?
Harmony Mobile Protect has improved the confidence of the users in knowing their mobile device and data is protected. It is shocking to see how many sites, apps, and links to content were vulnerable to threats and security gaps. Users found themselves going to what they thought were innocent sites and in-app purchases that led them to a vulnerability. To be fair, some legitimate apps, links, and content were flagged and all we needed to do is make adjustments to the white lists and users were able to access that data with no issue.
What is most valuable?
The app just runs in the background and keeps the device safe. The real-time scan is awesome and really delivers that value-add component to threat defense and a holistic approach to mobile device protection. The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly. Tracking users, seeing devices and their current state at a glance is very helpful. Reporting is also a great value add to this product. Seeing the areas of concern and making adjustments to tighten the gaps is very helpful and a value add.
What needs improvement?
The admin portal is slightly clunky and sometimes shows a different status than what the device is actually doing. A simple refresh of that device corrects the issue and displays real-time data. Overall, it works well and the improvements so far for this product have been great. Allowing the user to control the real-time scan is important. In recent updates of the app version, this can be achieved easily, but the user doesn't always see that. Perhaps making a separate button or leveraging the menu ribbon for this feature may work better.
For how long have I used the solution?
I've worked with the solution for 3 months now.
What do I think about the stability of the solution?
After the initial setup, of course there was some tweaking, but the platform It' very solid. We have had no issues thus far with the stability. There have been a few updates that were low to no impact. More enhancement based updates.
What do I think about the scalability of the solution?
So far, we have found it to be very scalable. That was the main selling point for us on this product.
How are customer service and technical support?
We did have some issues come up and required technical support. The support team was awesome and really knew how to address the issues we were having. The problems were fixed and we were back on the road in no time.
Which solution did I use previously and why did I switch?
We did not. This is our first product for mobile device threat protection and real-time scanning.
How was the initial setup?
It was pretty straightforward. We had a solutions engineer walk us through things and helped us tie into our MDM, which went well.
What about the implementation team?
We implemented through Check Point directly for the POC and then continued with licenses. The setup with Check Point went great and we were very happy to have that level of expertise on hand. Their solutions engineers are top-notch and we were very pleased.
What was our ROI?
We are new to using this product, so we have not been able to capture the ROI as of yet.
What's my experience with pricing, setup cost, and licensing?
We had a very positive experience with this. The cost is the amount of devices times the number of licensing and the setup fees. We were up and running quickly. I do highly recommend leveraging a demo of this product. It really shows the depth of the product and the value-add to the customer.
Which other solutions did I evaluate?
No, we have a vested interest with Check Point Mobile and we looked at their product line first, and was sold.
What other advice do I have?
Harmony Protect is a great solution and really stands up to threat protection and device defense.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point Harmony Mobile
November 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
814,763 professionals have used our research since 2012.
Consultant at ITQS
Easy to use with great URL filtering and protects from unauthorized downloads
Pros and Cons
- "Harmony Mobile presents many innovative features."
- "One of the improvements that can be made is that they become compatible with Google MDM."
What is our primary use case?
One of the main reasons why the implementation of Check Point Harmony Mobile was chosen was due to the fact that we needed a tool that had control and monitoring over mobile devices. Harmony Mobile provided us with that functionality. In this way, we were able to close a security gap that was affecting our organization.
With this solution, users could connect to the organization and access the corporate data and thus comply with a more secure standard.
Each mobile has applied policies through the Harmony Mobile panel and control the access
How has it helped my organization?
One of the great improvements that Harmony Mobile gave us is that it was possible to protect the mobile devices of each one of the users and thus not depend on the users to implement adequate security themselves. With a simple mistake or moment of carelessness, a user can accidentally cause great damage to sensitive company information.
With Harmony Mobile, users do not worry. It transmits all the security to this tool. Currently, with what has been happening in the world with Covid, many workers are working from home and with this solution, we can limit third-party access to devices.
It's important for it to have the main functions of Mobile Device Management (MDM), such as task automation, automatic application updates, they should also improve compatibility with other mobile device management (MDM) products on the market, ensuring correct operation between SandBlast Mobile and MDM. It's important for Point Harmony Mobile to be included in a broader offering so that it is not just a standalone product.
What is most valuable?
Harmony Mobile introduces many innovative features. One of them is URL filtering, which is very valuable in this tool. It offers to filter apps, protect privacy, and reject malicious or unauthorized downloads. It allows us to get an idea of how it protects the application through certain security levels that are threats, network applications and devices. Its administration and configuration is very simple. It is easy to use with its friendly interface, the solutions helped a lot to the security of the company.
What needs improvement?
Harmony Mobile is one of the first tools that we implemented in the organization when we entered into the protection of mobile devices. For many years all our staff did not have any restrictions on mobile devices.
An improvement would be the compatibility of linking local and cloud solutions to create a hybrid scenario. They should allow adding a SIEM for additional functions. That said, in relation to the characteristics that it currently presents, it satisfactorily complies with the security of mobile devices.
One of the improvements that can be made is that they become compatible with Google MDM.
When it comes to scanning the network, sometimes my SSI ID does not appear; it would also be a great plus if they could make a unified console where you can manage several Check Point products and thus not be opening different consoles to manage different products.
For how long have I used the solution?
I have been using about three years.
What do I think about the stability of the solution?
The stability of the product is very good and it generates an excellent amount of monitoring reports.
What do I think about the scalability of the solution?
It is a very scalable tool.
How are customer service and support?
With the support, we have had good and bad experiences. Sometimes they take time to respond. Sometimes they give an accurate solution to the error presented.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
A mobile device solution had not previously been implemented.
How was the initial setup?
One of the parts that worried us was its configuration and administration, however, it was extremely simple.
What about the implementation team?
The installation was done with a seller who demonstrated his ability and handling of the tool.
What was our ROI?
The investment made with this tool is very good. The information will be guaranteed, therefore, every penny invested is a good investment.
What's my experience with pricing, setup cost, and licensing?
The cost is affordable. It competes with other technologies and the installation is easy to implement.
Which other solutions did I evaluate?
We have not opted for other technologies since we have implemented the Check Point line into our company.
What other advice do I have?
It is a good tool that can be implemented in the organization and be sure that it will protect your mobile devices.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Founder - Director (Technology Business) at a tech services company with 1-10 employees
Affordable, easy to set up, with some level of DIY capabilities and is stable
Pros and Cons
- "The solution provides us with all the information in the log."
- "The remote configuration has room for improvement."
What is our primary use case?
We mainly use this solution to detect unwanted traffic or any applications which is installed from a reliable/unreliable source. However, when we install the solution, it begins to behave differently. This software is intelligent enough to understand the user interface and interact with it, determining whether it is doing good or asking for sensitive personal information. This capability must be present in any mobile security app.
How has it helped my organization?
It gives enough confidence when we review the logs after appropriately tuning the 'tunable' parameters and then put the device on raw internet traffic and revisit its behavior/events on log files generated. It helps us in graduating our best practices to a 'Leading Practice'. It helped us in conducting critical tests in conducting our job works on Cybersecurity.
What is most valuable?
If we revisit all possible IT compliance whether it is PCI-DSS, HIPAA, GDPR, and more, they all talk about protecting the 'data' and/or leading to privacy. And mobile devices are some of the most vulnerable devices which can be misused in many ways, so protecting the device from malicious traffic is the key when it would be supported with manual configurable controls then it would be the best fit!
What needs improvement?
Documentation may need a revisit, and on additional features: The problem comes when something goes haywire and customers have changed some elements of the mobile which affects the Android software environment. For the same, we looked for remote connectivity for revisiting the consumer's device safely and securely for which we tried a couple of openly available apps (in a controlled environment) which does not look very safe for consumers. Hence, would be interested to see an add-on or an extension software to be a part of 'Check Point Harmony' and can be used for remote monitoring and controlling (keeping all possible security and compliance aspects in mind!)
For how long have I used the solution?
I have been using the solution for several months.
What do I think about the stability of the solution?
We experienced deploying this software on multiple Android devices (having varied firmware versions), however, when it comes to a few old hardware we faced challenges. Rest the product is very stable. (recommend reviewing the release notes, FAQs and recommendations, and more...)
What do I think about the scalability of the solution?
As stated discussed, this is stable software. Given the required storage, recommended memory, and live internet, it would suffice most of the business needs.
How are customer service and support?
When interacting with technical support, we have to be very clear about the issue we (including customers as well) are encountering then the support will provide assistance quickly.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We had a better experience using Zone Alarm (Antivirus and Firewall - desktop release) for a long time, and when we started getting requests on cybersecurity-related issues on mobile devices, we quickly checked Check Point 'Harmony' app. and found a perfect fit as of now.
How was the initial setup?
The initial setup is straightforward (though version to version - device to device it may vary) and the deployment takes no more than ten minutes, but when it comes to 'fine-tuning or customizations' (some specific need/business requirements) it takes time and a series of testing for its fitment.
What about the implementation team?
We did the implementation ourselves and are happy that we are able to protect our own devices (used in business) and for customers. The good part is there are lots of techno-functional documents available on their site which gives enough pragmatic exposers for technologies to understand its near-to-perfect deployment plus your past experience should kick in.
What was our ROI?
Our Revenue is organic and growing. Though unfortunately when we requested for registering our organization, we received our certificate a few days before the COVID lockdown and things have changed fundamentally, then we quickly transformed our operational machinery for remote work and successfully worked for a couple of clients in and around UAE/Saudi reign, which helped us survive and now we have enough requests coming-up for India/locally.
What's my experience with pricing, setup cost, and licensing?
We pay between 300 and 600 Rupees (around seven dollars per month) per year per license, which depends on where you are procuring it, plus a small quantum of our service charges.
What other advice do I have?
I give the solution an eight out of ten.
The reason we use this solution is primarily due to its availability in the Indian market. This plays a very important role. We then started reviewing many products based on Gartner's magic quadrants, IDC, and other big analytical companies that provide the reports and enough rationale and justification for our decision-making. We prefer to have a look at Moody's ratings for companies' performance.
We must first look at the different mobile applications consumer use. We check the type of issue/problem explained is covered by comprehensive writeups/reports/bug reports/FAQs/or on some relabel blogs or reviews matching our problem area, then we take sustainable solutions.
I recommend the product, but it has to be fine-tuned and tested by each organization.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cloud Engineer at ITQS
Good protection and integration capabilities with an intuitive implementation
Pros and Cons
- "The use and management of our portal is easy."
- "We know that for many companies, the management and administration of device and data security have been complex."
What is our primary use case?
Mobile device security is a top concern for our company today - and for good reason. In the new normal, remote workers increasingly access corporate data from their mobile devices, which means the company is more exposed to data breaches than ever before.
This product keeps corporate information safe by protecting employee mobile devices from all areas of attack: applications, networks, and operating systems. Check Point Harmony Mobile has enabled easy-to-manage, scalable security for any mobility management team.
How has it helped my organization?
Our companies have seen the need to give their collaborators the flexibility to work remotely yet the number of cyberattacks has increased in recent years due to the complexity of the administration and visibility of cross-device risks for security managers. This is where Check Point Harmony Mobile is supporting us very closely. With this solution, it is immediately securing the equipment that is connected outside of our organization and thus protects the equipment and data.
What is most valuable?
Check Point Harmony offers an almost intuitive implementation. The use and management of our portal is easy. It is integrating six security products in a unified way to protect all users, connections, devices, and access. Users get protection regardless of where they are, applications they access, or any device they use. Users face endless cyber threats such as malware, phishing, malicious emails, or ransomware zero-day attacks. In addition to detecting unauthorized use of SaaS applications and preventing data leakage, we get instant threat visibility.
What needs improvement?
Having a unified solution developed by one of the most reliable brands in the market gives our organization the peace of mind that data is safe anytime, anywhere.
We know that for many companies, the management and administration of device and data security have been complex. However, Check Point Harmony Mobile solves and supports is in all this with solutions made for this need. At the moment, I would not change anything; from my perspective, it is complete.
Something that could be improved is the compatibility with older versions. In distribution centers where Android devices with version 4.4.0 used, the solution gives many errors. In newer versions, the tool complies with its proper functioning.
For how long have I used the solution?
I've used the solution for one year.
How are customer service and support?
With the support teams, it is a bit complex due to the absence of support in Spanish. Also, the guides that the support service provides us in many cases are complex and make it difficult to solve problems.
How would you rate customer service and support?
Positive
What other advice do I have?
Harmony is not only great security for devices, it is a great analytics network that protects us from various attacks and that you can try with a simple and easy-to-configure agent on mobile devices.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Engineer at DeliverICT
Provides user-friendly graphical interface with blocking capabilities and easy integration
How has it helped my organization?
We are following the necessary activities and communicating with the client. Check Point Harmony Mobile offers significant benefits, such as enhancing its security. The client is proud to use Harmony Mobile, which has improved their overall security posture.
What is most valuable?
The user-friendly graphical interface makes it easy to interact with Harmony Mobile. Its simplicity allows for smooth engagement with the platform.
For how long have I used the solution?
I have been using Check Point Harmony Mobile for six or seven months.
What do I think about the stability of the solution?
I rate the solution’s stability a nine out of ten.
What do I think about the scalability of the solution?
It is scalable.
I rate the solution’s scalability an eight out of ten.
How are customer service and support?
Check Point support has been incredible. As soon as we create the tag, we can have an engineer to support us.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
They are choosing Harmony Mobile over other vendors due to its effective blocking capabilities for threats like phishing and malware. Harmony Mobile offers these features at a lower cost than competitors like Palo Alto, Cisco, and Fortinet. Given its competitive pricing and comprehensive features, we encourage other financial institutions to adopt Harmony Mobile for enhanced security.
How was the initial setup?
The integration process is smooth and straightforward, with no difficulties, even on my new tech phone. It also integrates well with third-party systems. The installation is simple, and our professional service team is there to assist with setting up Harmony Mobile
What other advice do I have?
One of our clients has committed to deploying these features. We are working on deploying Check Point Harmony Mobile and preparing a proposal for the bank. Once they accept, we can proceed, which will enhance Harmony Mobile's security features.
Clients are very impressed with Harmony Mobile's threat intelligence capabilities, especially the live, real-time updates. The bank's administrators were particularly amazed by the features of advanced threat intelligence. Harmony Mobile adds numerous security features and simplifies the work for both administrative and security staff.
Due to its significant benefits, we encourage other microfinance and financial institutions to adopt this technology. By deploying Harmony Mobile, they gain enhanced security, reduced workload, and overall efficiency, all at a lower cost than other solutions. The technology is proving to be both valuable and cost-effective for users.
We recommend that financial institutions use Harmony Mobile because it is highly effective in blocking threats like phishing and malware, which are significant concerns in today's market. Financial institutions are major targets for these attacks, so Harmony Mobile's specialized features are precious. We are encouraging them to adopt this solution for enhanced security.
Two engineers are enough for the solution's maintenance.
Overall, I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:
Last updated: Sep 16, 2024
Flag as inappropriateSenior Manager at a financial services firm with 10,001+ employees
Secures and segments corporate and personal data, offers remote secure-wipe capabilities, but the reporting is complicated
Pros and Cons
- "Internal applications, data, and folders are published on enrolled mobile devices in a secure way without publishing any of the resources over the internet."
- "The product does not provide deep capabilities for sharing specific data to users or groups separately, nor does it provide visibility as to whether a user has access to the data or not."
What is our primary use case?
The primary use case is to enable access to any corporate application hosted on-premises or in the cloud using a mobile device with single sign-on (SSO) capabilities.
It provides IT admins capabilities for granting access to corporate applications or data on mobile devices and should be able to securely monitor and manage the mobile devices that access sensitive business data. It includes storing essential information about mobile devices, deciding which apps can be present on the devices, and locating devices.
This product should be able to remove corporate applications and data on enrolled devices remotely, known as an enterprise wipe, in case a device is stolen, lost, or if the user leaves the organization.
Corporate data should be securely stored on mobile devices and the user should not be able to share data from corporate apps/data to personal storage.
How has it helped my organization?
Internal applications, data, and folders are published on enrolled mobile devices in a secure way without publishing any of the resources over the internet.
A separate workspace is created on the enrolled mobile, which partitions corporate data from personal data. Policies can restrict users from copying any app/data from corporate to personal storage and vise versa.
Users are able to login to corporate applications using single sign-on.
DLP policy prevents data leakage issues, which cannot be prevented if applications are published directly without any MDM solution.
Enterprise wipe gives us the capability to remove applications and data from enrolled devices remotely in cases where one is lost, stolen, or for any other reason.
Organizations can prevent device enrollment in cases where a device is rooted/jailbroken.
What is most valuable?
Enrollment is based on the user name and the admin needs to create an enrollment policy. The enrollment email goes to users who are entitled to enrollment via Capsule. Each user needs to manually click and add the Token, which is sent via email and used for providing and restricting access.
Licenses are taken from Check Point for the number of users who need to be enrolled via Capsule.
No additional hardware or setup is required for Capsule configuration, as it can be enabled on the same security gateway. This reduces any additional hardware cost, as well as for setup and connectivity.
Configuration is straightforward and can be controlled on the same NGFW as Capsule. This is used for providing access to users.
What needs improvement?
Reporting is quite complicated once more users are enrolled and they need disparate access. It needs to be maintained separately, which adds work for the admin and can lead to errors.
Enrollment emails are sent for each device, which means that when a user needs to change devices or enroll more than one, admins need to generate and send additional tokens.
The product does not provide deep capabilities for sharing specific data to users or groups separately, nor does it provide visibility as to whether a user has access to the data or not.
For example:
- HR sharing certain learning videos or documents to a group of users. The solution does not provide reports as to whether these have been accessed by the user or not.
- It does not provide a solution in the case where a device is being shared by multiple users
- A site where one iPad is being shared between five users is a problem. Each user has their own access to the device but this solution does not have the capabilities of providing each user with specific access to data or applications.
For how long have I used the solution?
We are not using Check Point Harmony Mobile for now.
What do I think about the stability of the solution?
This product is stable, just like any other Check Point solution.
What do I think about the scalability of the solution?
It can be scaled by adding more security gateways and enabling the license. It is done in the same manner as a Check Point firewall.
How are customer service and technical support?
The technical support is excellent.
Which solution did I use previously and why did I switch?
We used this solution and then moved to a different one.
How was the initial setup?
The initial setup is straightforward.
The process involves getting a license from Check Point and enabling a module/blade on the security gateway. After this, start on the configuration (Published data, which needs to be made available on the endpoint to access).
What about the implementation team?
Our in-house team completed the deployment with OEM support.
What was our ROI?
Using this firewall improves productivity and availability for enrolled endpoints. Published data can be accessed anytime on a mobile device.
What's my experience with pricing, setup cost, and licensing?
Check Point provides a separate license in cases where organizations want to use this only on mobile devices, or laptops/desktops. Check Point Total includes both mobile devices and endpoints.
Setup can be done on the existing security gateway or it can be done on a dedicated security gateway where there are a large number of users.
Checkpoint provides five user licenses by default.
What other advice do I have?
The organization should be clear on the requirements. If it is only for publishing a few web apps, URLs, email, or for a few shared drives, then the solution works absolutely fine. However, it is not a full-fledged MDM solution like VMware AirWatch/Citrix/Blackberry and more.
These solutions all provide more MDM capabilities than Capsule.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Suporta engineer at Novasys
Provides complete protection and is easy to deploy and manage
Pros and Cons
- "Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage."
- "If possible, it would be better if they can include vulnerability management for applications. When a user installs many applications, if there is a way to manage a pack of applications, it would be helpful."
What is our primary use case?
We are mainly using it to manage mobile connections. It is a cloud solution, and it is deployed on the Check Point cloud.
How has it helped my organization?
We can manage different mobiles in the Harmony portal. For example, we can fix the version of the OS system that can connect to our network. Some applications are not authorized to be installed by the user. So, we can block those applications or versions.
What is most valuable?
Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage.
What needs improvement?
If possible, it would be better if they can include vulnerability management for applications. When a user installs many applications, if there is a way to manage a pack of applications, it would be helpful.
For how long have I used the solution?
I have been using this solution for two years.
What do I think about the stability of the solution?
There is no problem with stability. We have had no issues since we started using this product.
What do I think about the scalability of the solution?
It is very easy to scale. We have 10 users, and it is for our internal use. We are also a Check Point partner, and we use it on our mobile phones to show it to our customers during seminars or presentations.
How are customer service and support?
I'm a support engineer, and I have contacted their technical support. I was with a customer who needed some information about the mobile UEM integration of Harmony Endpoint, and I had to contact their technical support to find out how we can do this easily.
Their support is very easy to contact. We are a partner, and when we contact their support, they always respond on time. Their support is very good.
Which solution did I use previously and why did I switch?
We were providing Kaspersky and Bitdefender to our customers before becoming a partner of Check Point. I don't know if Bitdefender has protection for mobile, but I know that Kaspersky has recently started developing for mobile. Check Point Harmony Mobile is better and more secure for mobile protection because of its stability and all the functionality. It is easy to deploy and manage.
How was the initial setup?
Its initial setup is very simple. If any additional configuration needs to be done, I just receive an email. When a user is added to the portal, you receive an email with information about the server and the password. You can just click and start the application. It is very easy.
It is pretty fast. It just takes one minute for the installation and the first scan.
What about the implementation team?
I do it myself from the office. I don't need an assistant from Check Point or anyone else. I just need to read the documentation. I can download the documentation from their website, which contains the information for installation and troubleshooting.
The maintenance can be done from the tenants in the cloud. You can do the updates and patching of the product in the portal.
What's my experience with pricing, setup cost, and licensing?
At the moment, the price is good, but there is always scope for amelioration when it comes to pricing. When pricing is lower, it can make a customer buy the product. Customers ask us about the price of the product before allowing us to explain the functionality to them.
What other advice do I have?
I would recommend this solution to others. It is easy to implement, and it is easy to manage. It covers OS protection, network protection, file protection, and application protection. It provides the best protection.
I would rate it a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
Mobile Threat DefensePopular Comparisons
Fortinet FortiClient
Prisma Access by Palo Alto Networks
Workspace ONE UEM
OpenVPN Access Server
Cisco Secure Client (including AnyConnect)
Check Point Remote Access VPN
IBM MaaS360
Citrix Gateway
Cisco IOS SSL VPN
Jamf Connect
McAfee MVISION Mobile
Symantec Endpoint Protection Mobile
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links