Try our new research platform with insights from 80,000+ expert users
Rodrigo Nalda - PeerSpot reviewer
Responsable de Ciberseguridad. CISO at a printing company with 501-1,000 employees
Real User
Quick and efficient support, transparent to the end-user, and priced well
Pros and Cons
  • "The best thing about the product is that it is transparent and does not impact the users."
  • "The deployment in the Android system is very simple but in the case of iOS, it is more complicated so the users require attention from our CAU."

What is our primary use case?

We are deploying the solution on all corporate mobiles. We began the deployment with the most critical users for the business and we are expanding according to our needs. We have an organization differentiated by countries and we monitor the incidents reported from our SIEM.

The main objective is to have a security mechanism in these devices that prevents users from falling into attempts to steal credentials, infection by malware, etc.

With this tool, we consider that the systems are protected and so far, we have already been able to stop a good number of attacks.

How has it helped my organization?

Before having this tool, our users were exposed to any type of infection on corporate mobile devices and tablets. With the incorporation of Check Point Harmony Mobile technology, we have minimized these risks and both users and administrators feel calmer.

We also know that any incident that occurs is sent to our SIEM, which is monitored 24x7x365 by a security services company, which, if necessary, will act immediately to solve the incident detected.

All of this adds great value to the company in terms of security.

What is most valuable?

The best thing about the product is that it is transparent and does not impact the users. After analyzing the battery consumption and resource load, we found that it is practically negligible.

On some occasions, we have had to contact the user to solve a problem with the system. It is quite simple, which facilitates the resolution of problems.

What needs improvement?

Based on the fact that we do not have an MDM system, the deployment of the solution has been a bit difficult. The deployment in the Android system is very simple but in the case of iOS, it is more complicated so the users require attention from our CAU.

Buyer's Guide
Check Point Harmony Mobile
November 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
814,763 professionals have used our research since 2012.

For how long have I used the solution?

We have been using Check Point Harmony Mobile for more than a year.

What do I think about the stability of the solution?

The solution is very stable and in the time we have been using it, we have not had significant problems.

What do I think about the scalability of the solution?

There is no problem in terms of the scalability of the solution, as it is only necessary to acquire a greater number of licenses.

How are customer service and support?

The support has attended to us quickly and efficiently in the few cases that we have needed it. It seems that this is the usual case for Check Point support.

How was the initial setup?

Not having an MDM is somewhat more complex as it cannot automate, and in the iOS environment, it is more complex than in Android.

What about the implementation team?

We carry out the deployment of the solution with our own internal teams supported by the CAU.

What's my experience with pricing, setup cost, and licensing?

The quality, price, and support ratio are very good.

What other advice do I have?

At the moment, we have not detected a specific need for new features within our environment. With the last update, the possibility of analyzing applications developed by us or even requesting an analysis of an application already published in stores was incorporated, which is a great improvement. It is good, for example, to anticipate possible problems with third-party applications, as well as for checking the security status of our applications.

In any case, we trust that in the next versions that Check Point publishes, useful functionalities will appear.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Security Consultant at Synergy
Reseller
Top 5
A good choice for a phishing and malware-free mobile

What is our primary use case?

If you're looking for ways to ensure that your mobile is phishing-free and malware-free, then Harmony Mobile is a good choice.

What is most valuable?

The feature I find the most valuable is the confirmation of all the apps on your mobile, which is clean.

What needs improvement?

In Harmony Mobile mobile, there is a part for network protection and it actually affects some Messenger apps. For example, in the LINE app, you can receive important messages from friends if you turn on the option in the default settings.


For how long have I used the solution?

I have been using Harmony Mobile for about two years.

What do I think about the stability of the solution?

The solution is stable. I have not had any downtime while using it. The management server only controls the policy changes, so even if the management is down, the app works.

What do I think about the scalability of the solution?

It is a scalable solution.

How are customer service and support?

The technical support is great. I would give it an eight out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup was quite easy for me. It was deployed within one day.

What's my experience with pricing, setup cost, and licensing?

I think that the pricing is neither cheap nor expensive. I would say it's average.

What other advice do I have?

Overall, I would rate the solution a seven out of ten just because I think that certain aspects could be improved.

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementor
PeerSpot user
Buyer's Guide
Check Point Harmony Mobile
November 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
814,763 professionals have used our research since 2012.
Security Sales Engineer at BT - British Telecom
MSP
Easy deployment: We simply send a link through email to a user, they install the software and are protected
Pros and Cons
  • "The easy deployment is the key for us. I can simply send a link through email to a user, then they install the software and are protected."
  • "I would like to see more visibility into the actual devices that it's protecting. In some cases, you don't want to see a lot. However, for our purposes, I would like to see more information about the applications which are installed, then have more control over what can and what cannot be installed."

What is our primary use case?

We use SandBlast to protect our mobile devices, as well as our iPads and Samsung tablets. 

How has it helped my organization?

We use SandBlast, internally, as a test bed so we can go out and sell it. The ease of the deployment to users has been key, and most beneficial for us.

What is most valuable?

The easy deployment is the key for us. I can simply send a link through email to a user, then they install the software and are protected.

What needs improvement?

I would like to see more visibility into the actual devices that it's protecting. In some cases, you don't want to see a lot. However, for our purposes, I would like to see more information about the applications which are installed, then have more control over what can and what cannot be installed. That would be very useful for us.

The GUI could be a bit more intuitive, as far as going from page to page and understanding what you're looking in the beginning. After you use it for a while, you get used it.

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

We've had it deployed for about three years now. We have had no hiccups nor issues with it at all going down. Also, we have not experienced any difficulties with it protecting devices.

What do I think about the scalability of the solution?

In terms of the scalability, we have not pushed the limits of the product yet. We only have around 20 users deployed at this time.

How are customer service and technical support?

We deal directly with the Sales Engineers (SEs) for SandBlast. So, we're not a typical user where we are using technical support from Check Point. Therefore, we haven't used their technical support.

How was the initial setup?

The initial setup was very straightforward, not complex at all. For us, it was simply sending out an email link to our users. They installed it from the App Store, and that's it.

What about the implementation team?

Check Point deployed it for us. The experience was simple and easy. Check Point was helpful, as far as explaining the deployment and showing us how to use the software with the GUI.

I was the administrator of the deployment.

What's my experience with pricing, setup cost, and licensing?

We didn't actually purchase the software. It was given to us by Check Point. We are using it as a test bed for possible future customers. 

What other advice do I have?

I would rate it a nine of ten because of the ease of installing it. Using it on a daily basis, the administration is quite easy. 

I would advise someone considering SandBlast to have some definite use cases in mind before deploying it. That way you can deploy it very specifically towards what you are going to be using it for.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
PeerSpot user
Information Technology Security Specialist at Telecommunications Services of Trinidad & Tobago Limited (TSTT)
Real User
Easy to use with an excellent variety of capabilities
Pros and Cons
  • "Harmony Mobile's most valuable feature is the variety of capabilities in the platform, including allowing you to track device status."
  • "Harmony Mobile could be improved with increased built-in DLP coverage."

What is our primary use case?

I use Harmony Mobile integrated with our MDM platform to manage mobile devices.

What is most valuable?

Harmony Mobile's most valuable feature is the variety of capabilities in the platform, including allowing you to track device status.

What needs improvement?

Harmony Mobile could be improved with increased built-in DLP coverage.

For how long have I used the solution?

I've been using Check Point Harmony Mobile for two and a half years.

What do I think about the stability of the solution?

Harmony Mobile is stable.

What do I think about the scalability of the solution?

Harmony Mobile is scalable.

How was the initial setup?

The initial setup is easy, and deployment takes just a couple of minutes.

What about the implementation team?

We used an in-house team.

Which other solutions did I evaluate?

I also evaluated VMware AirWatch, but I find Harmony Mobile to be a better solution.

What other advice do I have?

Because of its ease of use and the coverage you get for the blurred boundary of mobile devices, Harmony Mobile gives you coverage whether you're using a BYOD, COPE, or COBO framework. I would give Harmony Mobile a rating of nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
PeerSpot user
Senior Network/Security Engineer at Skywind Group
Real User
Centralized management with good monitoring and reporting features
Pros and Cons
  • "The solution has clients for both Android and Apple devices, so all of our employees' devices are protected."
  • "The feature set between the Android and Apple devices is not fully equal."

What is our primary use case?

Having the Check Point SandBlast Mobile application installed is mandatory for any smartphone or tablet PC provided to the employees by our company, and for any BYOD device if it is going to be connected to the corporate network. Currently, there are about 500 devices that are running on both Android and Apple devices. 

We decided not to self-host the management center, and onboarded the cloud management solution provided by the Check Point. This runs in their own datacenter, with the SLA provided.

How has it helped my organization?

Before implementing the Check Point SandBlast Mobile, we didn't have any mandatory security software being installed on the corporate mobile devices, and it was a huge security gap we needed to close ASAP because smartphones and tablets are connected to the office Wi-Fi networks on a daily basis, and to the corporate VPN resources occasionally (depending on the user's access level). 

The implementation of the Check Point SandBlast Mobile, as the centralized security solution for the mobile devices, improved the overall security of our network by providing the additional protecting layer on the user devices. 

The management overhead is minimal since there is a central management point, where all the policies are configured and then pushed to the smartphones and tablets when they are online.

What is most valuable?

  1. The solution has clients for both Android and Apple devices, so all of our employees' devices are protected.
  2. The client allows us to detect the rooting/jailbreaking of the OS and prevents the connection of such devices to the corporate network VPN.
  3. The client detects and prevents the various types of the phishing attacks, malicious sites in the browsers, and checks them with the help of the Check Point database (ThreatCloud).
  4. The centralized management portal is rich in configuration options, monitoring, reporting capabilities.

What needs improvement?

  1. Some of our employees reported slow performance of the application on the old Android devices (Android version 2.4 and less), but I think it is mostly connected with the poor hardware resources on the older devices.
  2. The feature set between the Android and Apple devices is not fully equal. For example, with Android, it is possible to configure in the policy the file system tampering and keylogging and credential theft detection options. This is unavailable for the Apple devices. I don't think it is the fault of Check Point, but rather restrictions based on the different operating system capabilities. Nonetheless, I would like the policies to be more alike.

For how long have I used the solution?

We have been using Check Point SandBlast Mobile for about two years.

What do I think about the stability of the solution?

The clients for both Android and Apple operating systems are stable and mature.

What do I think about the scalability of the solution?

The solution is scalable. Now we manage about 500 devices and see no downgrade in the performance of centralized management.

How are customer service and technical support?

We didn't have any support cases opened for Check Point SandBlast Mobile.

Which solution did I use previously and why did I switch?

We did not use another solution prior to this one.

What about the implementation team?

The solution was implemented by the in-house team of security engineers and system administrators.

Which other solutions did I evaluate?

We decided to purchase the Check Point SandBlast Mobile after the demo with the vendor.

What other advice do I have?

The solution is modern and easy to onboard.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Founder at Softnetx
Real User
Top 5
Scalable solution with efficient scanning features
Pros and Cons
  • "It is a stable solution."
  • "There could be more automation features for the solution."

What is our primary use case?

We use the solution for security purposes. It helps us scan mobile apps for malware prevention.

What is most valuable?

The solution's most valuable features are scanning for malware prevention and threat identification. 

What needs improvement?

There could be more automation features for the solution.

For how long have I used the solution?

I have been using the solution for more than a year.

What do I think about the stability of the solution?

I rate the solution's stability a nine out of ten.

What do I think about the scalability of the solution?

It is a scalable solution. We have 5000 users in our organization.

How was the initial setup?

I rate the solution's initial setup process a nine out of ten. We take help from its documentation and execute the implementation manually. Although, the documentation needs to include a few crucial steps for onboarding users.

What's my experience with pricing, setup cost, and licensing?

The solution's cost depends upon the number of users. Its price reduces in case of a larger number of users.

What other advice do I have?

I advise others to deploy the solution for advanced automation features. I rate it a nine out of ten.

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
HM is a excellent security tool, modern and infinity portal is great.
Pros and Cons
  • "We have had a lot fewer attacks thanks to this solution."
  • "The only language that is available is English."

What is our primary use case?

They can access the information from anywhere, which had to be covered with security to safeguard the company data, for which we obtained the use of Check Point Harmony Mobile to be able to provide this layer of security in a simple way.

How has it helped my organization?

The security provided has helped us to shield the information accessible to mobiles from anywhere, this was a risk to vulnerabilities, which is why the implementation of the Harmony Mobile Check Point solution has been quite important to improve security.

With it, we have been able to establish policies for use, access and anti-malware protection, and modern protection so that the equipment is covered.

We have had a lot fewer attacks thanks to this solution, achieving the main objective.

Users are quite happy with the solution.

What is most valuable?

The costs are adjusted to the organization for each user that is implemented and is really competitive for the features that are implemented.

It is essential to rely on a good vendor so that the provisioning and implementation of security are the best.

What needs improvement?

I feel that the implementation of users in a massive way should improve so that we can easily load some Excel, which can provide all the users that are required to be implemented.

Also, the solution or support service must improve, its newer applications are a little more difficult for the support teams since they take longer to solve.

The only language that is available is English. The hours of attention are somewhat uncomfortable as they are generally on the other side of the world, which is why they are not compatible with Latin America.

For how long have I used the solution?

It has helped us a lot with the issue of controlling the security of both internal and using mobile devices since, through the agent, we can carry out this security governance.

Which solution did I use previously and why did I switch?

It is our first implementation since previously we used an antivirus solution, but they did not meet the requirements of the company or modern threats.

What's my experience with pricing, setup cost, and licensing?

It is important to always implement demo environments to test first before doing it in production so that we can have more experience when migrating it to the most important environment.

The cost is accessible.

Which other solutions did I evaluate?

We really do not doubt the capacity of Check Point. We validate reviews in addition to validating their characteristics, for which we are convinced of their potential. Check Point Harmony Mobile is one of the best.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
IT Security Analyst at a energy/utilities company with 1,001-5,000 employees
Real User
Has good application scanning that it stable and has helpful technical support
Pros and Cons
  • "I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious."
  • "In the next release, I would like to see a Wi-Fi scanner to be able to identify whether a wireless network is malicious before you join it."

What is our primary use case?

The primary use case of this solution is for mobile threat prevention. We integrate it with an MDM and push it to our managed devices to protect the company's phone.

How has it helped my organization?

It prevents you from visiting phishing sites. It will scan the URL and let you know whether or not it's a malicious location or not.

It helps to reduce the person from just clicking away.

Users always feel disconnected from the network when they are using their mobile phone and we felt the need to be protected, just as much as our laptops. Sometimes you can click on something without realizing it. Having that extra added layer of security and support helps to keep the person safe from malicious actors.

We were looking for a solution with application scanning, phishing detection, and has the ability to whitelist and blacklist websites or a URL.

What is most valuable?

I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious.

It does an active scan of all applications.

Time and time again, you read that applications have been removed from the Play Store because they are from a malicious vendor or they have been compromised. Having an extra layer of security where it scans to ensure that your device has a more secure and stable version of the application is very valuable.

What needs improvement?

In the next release, I would like to see a Wi-Fi scanner to be able to identify whether a wireless network is malicious before you join it. That would be very valuable.

For how long have I used the solution?

I have been using this product for more than two years.

What do I think about the stability of the solution?

It's a stable solution and I don't recall any outages or access issues. The uptime is high.

What do I think about the scalability of the solution?

Currently, we have not exhausted our license, and haven't had the need to scale it up or down.

We have approximately 800 users who range from customer service to the CEO. Once you have a mobile device, it will be managed.

I am a security analyst and my manager and I are the only two interacting with the solution. We reach out to Check Point for any maintenance that is needed.

How are customer service and technical support?

Technical support was very helpful and not difficult to connect with them. As soon as we sent them the email, there we always ready and available to arrange a meeting to get things done.

The process is the same before and after deployment. Just sent an email with the issues and they will contact to arrange a meeting to resolve the issue.

I would say that they are very helpful and always just an email away.

How was the initial setup?

The initial setup is straightforward. It's an easy setup with just a flip of a switch.

We were set up and ready to go very quickly. Because it's a cloud offering and hosted online, it's made to be much quicker.

The deployment was less than a week. We installed it manually on the devices then integrated with an MDM that automates the process for all manual devices.

What about the implementation team?

We had support from Check Point to assist us and they were very helpful.

What was our ROI?

The fact that we have not had any mobile breaches is a return on investment.

What's my experience with pricing, setup cost, and licensing?

Check Point pricing is better than Symantec.

Which other solutions did I evaluate?

We also evaluated Symantec Endpoint protection Mobile.

Symantec does not do everything that Check Point does and furthermore, Check Point pricing is better. Budgetary-wise, it was the right choice for us.

What other advice do I have?

This solution checks so many of our boxes already, anything new added would just be the icing on the cake.

My advice would be to do your homework. Ensure that this is the right product for you. Request a demo and test it out. 

Don't purchase more licenses than you need because it will become costly.

Before this, I didn't realize that there were so many malicious applications out there in the world. So, it was a bit eye-opening to see some of what your phone can access without you even realizing what you were clicking.

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Product Categories
Mobile Threat Defense
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.