What is our primary use case?
The primary use case of this solution is for mobile threat prevention. We integrate it with an MDM and push it to our managed devices to protect the company's phone.
How has it helped my organization?
It prevents you from visiting phishing sites. It will scan the URL and let you know whether or not it's a malicious location or not.
It helps to reduce the person from just clicking away.
Users always feel disconnected from the network when they are using their mobile phone and we felt the need to be protected, just as much as our laptops. Sometimes you can click on something without realizing it. Having that extra added layer of security and support helps to keep the person safe from malicious actors.
We were looking for a solution with application scanning, phishing detection, and has the ability to whitelist and blacklist websites or a URL.
What is most valuable?
I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious.
It does an active scan of all applications.
Time and time again, you read that applications have been removed from the Play Store because they are from a malicious vendor or they have been compromised. Having an extra layer of security where it scans to ensure that your device has a more secure and stable version of the application is very valuable.
What needs improvement?
In the next release, I would like to see a Wi-Fi scanner to be able to identify whether a wireless network is malicious before you join it. That would be very valuable.
For how long have I used the solution?
I have been using this product for more than two years.
What do I think about the stability of the solution?
It's a stable solution and I don't recall any outages or access issues. The uptime is high.
What do I think about the scalability of the solution?
Currently, we have not exhausted our license, and haven't had the need to scale it up or down.
We have approximately 800 users who range from customer service to the CEO. Once you have a mobile device, it will be managed.
I am a security analyst and my manager and I are the only two interacting with the solution. We reach out to Check Point for any maintenance that is needed.
How are customer service and technical support?
Technical support was very helpful and not difficult to connect with them. As soon as we sent them the email, there we always ready and available to arrange a meeting to get things done.
The process is the same before and after deployment. Just sent an email with the issues and they will contact to arrange a meeting to resolve the issue.
I would say that they are very helpful and always just an email away.
How was the initial setup?
The initial setup is straightforward. It's an easy setup with just a flip of a switch.
We were set up and ready to go very quickly. Because it's a cloud offering and hosted online, it's made to be much quicker.
The deployment was less than a week. We installed it manually on the devices then integrated with an MDM that automates the process for all manual devices.
What about the implementation team?
We had support from Check Point to assist us and they were very helpful.
What was our ROI?
The fact that we have not had any mobile breaches is a return on investment.
What's my experience with pricing, setup cost, and licensing?
Check Point pricing is better than Symantec.
Which other solutions did I evaluate?
We also evaluated Symantec Endpoint protection Mobile.
Symantec does not do everything that Check Point does and furthermore, Check Point pricing is better. Budgetary-wise, it was the right choice for us.
What other advice do I have?
This solution checks so many of our boxes already, anything new added would just be the icing on the cake.
My advice would be to do your homework. Ensure that this is the right product for you. Request a demo and test it out.
Don't purchase more licenses than you need because it will become costly.
Before this, I didn't realize that there were so many malicious applications out there in the world. So, it was a bit eye-opening to see some of what your phone can access without you even realizing what you were clicking.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.