Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Mobile vs Check Point Remote Access VPN comparison

 

Categories and Ranking

Check Point Harmony Mobile
Average Rating
8.8
Reviews Sentiment
7.5
Number of Reviews
47
Ranking in other categories
Mobile Threat Defense (1st)
Check Point Remote Access VPN
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
67
Ranking in other categories
Remote Access (6th), Enterprise Infrastructure VPN (6th)
 

Mindshare comparison

Check Point Harmony Mobile and Check Point Remote Access VPN aren’t in the same category and serve different purposes. Check Point Harmony Mobile is designed for Mobile Threat Defense and holds a mindshare of 20.1%, up 17.9% compared to last year.
Check Point Remote Access VPN, on the other hand, focuses on Remote Access, holds 2.1% mindshare, down 3.3% since last year.
Mobile Threat Defense
Remote Access
 

Featured Reviews

Vikas Gawali - PeerSpot reviewer
Provides security for mobile devices, safeguarding against threats
Check Point Harmony Mobile offers several advantages. It ensures your mobile device is highly secure for accessing Teams, Zoom calls, Outlook, and other business-related applications. Its robust security features protect your device comprehensively. Additionally, Harmony Mobile allows you to access office files, web files, and other services directly from your mobile device. Install the agent on your mobile, scan with Check Point, and apply the policy. After this setup, you can securely access all these services via your mobile device. It provides pre-detection, pre-emulation, encrypted file access, and decrypted file access features.
Ozan Durmus - PeerSpot reviewer
Is easy to use and has a nice interface, but the scalability needs to improve
The deployment takes around two to three hours. If you manage the product, one person could be enough, but if you need some kind of additional integrations like ADA integration, you need someone from ADT to access products. One person is enough, but one or two additional personnel may be included. To deploy Check Point Remote Access VPN, you must purchase a license, enable the blade, and purchase client access licenses. You can then follow the instructions to deploy the product, write the necessary rules, make the integrations, deploy the agent to the clients, and provide them with a login solution. I rate the initial setup an eight on a scale of ten, where one is difficult, and ten is easy.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS."
"We like Harmony's ability to encrypt transactions between mobile devices. All the user's transactions are encrypted. That's an excellent feature. We can detect, quarantine, and address any issues in the handset itself."
"First, the granular visibility of apps & traffic which we get through Check Point SandBlast Mobile are good. We can see each & every installed app & information for each app about severity & risk."
"Internal applications, data, and folders are published on enrolled mobile devices in a secure way without publishing any of the resources over the internet."
"The easy deployment is the key for us. I can simply send a link through email to a user, then they install the software and are protected."
"It is a scalable solution. Up to three hundred users are using the solution. I rate the scalability a ten out of ten."
"The ease of use, along with comprehensive protection for all devices, is a key advantage. It provides visibility into malicious applications installed on the phone."
"The product's VPN solution is super efficient, and our clients highly value ransomware protection on mobile. These two features are probably the most valuable aspects of this product. Check Point Harmony Mobile responds very fast to any cybersecurity attack. With that product, your mobile response is super fast."
"The solution is easy for administrators because you can check logs and write rules on the same page."
"We use it to connect our sites. We have a couple of sites that need to interconnect."
"Our users find the interface very comfortable to use."
"The solution offers high scalability as far as adding more users."
"The complexity is hidden within a full mesh network, allowing seamless user-to-application connectivity with minimal delay."
"The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage."
"The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet."
"Setting policies allow, block, and limit users' access."
 

Cons

"It does the process in the background and it does a wonderful job but the methodologies don't pop up. They should make it more interactive."
"Harmony Mobile could be improved with increased built-in DLP coverage."
"I would like to see management and remote administration functions in the same portal."
"The feature set between the Android and Apple devices is not fully equal."
"There are certain shortcomings in the integration capabilities that a product offers."
"There could be more automation features for the solution."
"The remote configuration has room for improvement."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"The ability to allow split-tunneling while still following our corporate policy needs to be on the table."
"Sometimes the application slows down the computing device, and this affects workflows."
"We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved."
"The connection has gotten less smooth as the number of users increases. The issue is that the logs fill up quickly. Too many users are connecting remotely. It worked great when we only had a few remote connections. Now, it is disconnecting people and dropping the internet connection."
"The provisioning of VPN users has room for improvement."
"There are some issues with the Check Point VPN, such as its complexity compared to other VPN clients."
"The product’s architecture is a bit distributed."
"They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20. If you don't get on your phone right away and check on your authentications, it will kick you out."
 

Pricing and Cost Advice

"When I purchased the product for one of our company's clients, I realized that the price of the product was competitive."
"I rate the tool's pricing a three out of ten."
"Regarding the cost of licenses, each device consumes one, even if it has both professional and personal profiles."
"Pricing is a little high."
"The quality, price, and support ratio are very good."
"Check Point provides a separate license in cases where organizations want to use this only on mobile devices, or laptops/desktops."
"Check Point Harmony Mobile's pricing is good."
"The price is okay. Per user, it should be something like five or ten dollars. But, we usually get discounts that drive the cost down."
"Regarding pricing, as a global customer, we get a big discount. For us, it's a good return on investment. We need to pay for additional features we want to enable. It seems cheaper than other vendors, but I can't say what it would cost an average customer."
"My company makes yearly payments only towards the licensing costs attached to Check Point Remote Access VPN, as there are no extra costs attached to the product."
"Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality."
"The price of this product is good."
"My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers."
"Check Point Remote Access VPN is not expensive and the cost is annual."
"The product is expensive. I rate its pricing a ten out of ten. For the cost of one product, we could purchase two or three Fortinet solutions with the same amount of money."
"I give the price of the solution a five out of ten."
report
Use our free recommendation engine to learn which Mobile Threat Defense solutions are best for your needs.
823,875 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
27%
Financial Services Firm
13%
Government
7%
Manufacturing Company
5%
Computer Software Company
13%
Financial Services Firm
9%
Manufacturing Company
8%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Harmony Mobile?
The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS.
What is your experience regarding pricing and costs for Check Point Harmony Mobile?
It is very cheap. It costs around one point eight dollars per user.
What needs improvement with Check Point Harmony Mobile?
Harmony Mobile has some limitations. For instance, you can only access it via Check Point's platform. After installation, two profiles may be created: a business profile and a personal profile.
What needs improvement with Check Point Endpoint Remote Access VPN?
There are some issues with the Check Point VPN, such as its complexity compared to other VPN clients. Another downside is related to performance, which lags behind similarly priced products like th...
What is your primary use case for Check Point Endpoint Remote Access VPN?
For remote work, Check Point Remote Access VPN connects, creates the site, and gathers information about the site in terms of the VPN domain, the public IP at that time, and so on.
 

Also Known As

Check Point Mobile Access, Check Point SandBlast Mobile
Check Point Remote Access VPN, Check Point Endpoint Remote Access VPN
 

Overview

 

Sample Customers

Samsung Research America, Mississippi Office of the Secretary of State
Osmose, International Fund for Animal Welfare (IFAW)