No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point Harmony Mobile vs Jamf Connect comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Mobile
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
61
Ranking in other categories
Mobile Threat Defense (1st)
Jamf Connect
Average Rating
9.0
Reviews Sentiment
6.1
Number of Reviews
18
Ranking in other categories
ZTNA as a Service (11th), AI Customer Experience Personalization (13th)
 

Mindshare comparison

Check Point Harmony Mobile and Jamf Connect aren’t in the same category and serve different purposes. Check Point Harmony Mobile is designed for Mobile Threat Defense and holds a mindshare of 11.4%, down 13.9% compared to last year.
Jamf Connect, on the other hand, focuses on ZTNA as a Service, holds 1.9% mindshare, up 1.9% since last year.
Mobile Threat Defense Mindshare Distribution
ProductMindshare (%)
Check Point Harmony Mobile11.4%
Zimperium26.1%
Lookout18.5%
Other44.0%
Mobile Threat Defense
ZTNA as a Service Mindshare Distribution
ProductMindshare (%)
Jamf Connect1.9%
Zscaler Zero Trust Exchange Platform13.3%
Prisma Access by Palo Alto Networks10.4%
Other74.4%
ZTNA as a Service
 

Featured Reviews

RL
TI at a security firm with 51-200 employees
Unified across devices and mobile threats are automatically blocked before damage occurs
The best feature of Check Point Harmony Mobile is the Mobile Threat Defense because it detects and blocks phishing attempts, malicious apps, man-in-the-middle attacks, and device exploits, which is especially critical in BYOD and remote work environments. The Mobile Threat Defense feature in Check Point Harmony Mobile has been very effective, especially in catching threats that target employees outside of traditional email channels. For example, there was a smishing attempt where a user received a text message with links disguised as package delivery updates. Check Point Harmony Mobile analyzed the link in real-time, flagged it as malicious, and blocked access before anyone could enter credentials, which prevented what could have been a widespread credential harvesting attack. Device Management and Remote Work Support are two additional aspects of Check Point Harmony Mobile that are especially valued. Device Management continuously checks device posture, including things like OS version, patch level, and whether a device is jailbroken or rooted. Remote Work Support allows employees to securely access email, collaboration tools, and files from anywhere without worrying about phishing links, malicious apps, and unsafe Wi-Fi networks. Check Point Harmony Mobile has positively impacted the organization, especially with phishing protections, as SMS or messaging-based phishing attempts are now blocked before users can click, preventing credential theft. Measurable outcomes since deploying Check Point Harmony Mobile highlight its impact on both security and compliance. Mobile-related security incidents have dropped by approximately 40 to 50 percent compared to before deployment.
Robert Ojok - PeerSpot reviewer
Systems Engineer Iii Apple Devices (Jamf Engineering) at a retailer with 10,001+ employees
Unified sign-on has simplified password management and now secures our mobile workforce
The ability to have a single password for the local device and the same password for the IDP is part of our security requirements. Jamf Connect integrates with multi-factor authentication from any IDP and facilitates initial device enrollment. It ensures that when a new user sets up the device, they sign in with their IDP username and password, which then creates the profile on the device. Furthermore, Jamf Connect is now integrated into Jamf Self Service Plus, providing a single dashboard for user password management and allowing users to sync and change their passwords. Additionally, Jamf Connect enhances security by offering two-factor authentication and permitting users to manage or seek help through support features directly within the app.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious."
"The best part of Check Point Harmony Mobile is its ability to deliver real-time on-device threat detection without compromising device performance."
"We have had a lot fewer attacks thanks to this solution."
"After deploying Check Point Harmony Mobile, I saw a noticeable drop in mobile-related security alerts, around 30 to 40%, fewer phishing and risky application incidents, and better user awareness."
"We like Harmony's ability to encrypt transactions between mobile devices. All the user's transactions are encrypted. That's an excellent feature. We can detect, quarantine, and address any issues in the handset itself."
"Check Point Harmony Mobile proactively blocks these threats before they reach the user, which has improved the overall security posture."
"One of the strengths of Check Point Harmony Mobile is how it balances usability with enterprise-grade protection, as the app runs silently in the background, protecting against threats without slowing down devices or interfering with personal use."
"I really like the application scanning feature that scans all of the installed applications, and not only what appears in the add or remove apps, and then reports the results in the console."
"The most valuable feature of Jamf Connect is the dual login screen, which has simplified the login process and eliminated the need for users to enter their password multiple times."
"It's connection with Azure is the most valuable. It is easy to deploy and connect."
"Jamf Connect allowed us to fully customize everything, offering a branded way to change passwords and manage integration with Entra instead of LDAP."
"Jamf Connect allows for easy and seamless joining of Mac devices to Azure AD, eliminating the need for third-party involvement or support engineer assistance."
"The solution is scalable."
"The tool supports different types of authentication. It also integrates seamlessly if you are using other Jamf products."
"It is easy to integrate into any existing IT workflow."
"The most valuable feature is ease of access. It's convenient to do things like resetting passwords. Previously, users were bound to their domain. We had to bind the user to the domain and log them in through the AD. Now, using Jamf Connect, we don't face any of these challenges. Resetting passwords is hassle-free so we can regularly rotate passwords according to best practices."
 

Cons

"Some of our employees reported slow performance of the application on the old Android devices (Android version 2.4 and less), but I think it is mostly connected with the poor hardware resources on the older devices."
"Technical support should include other languages, such as Spanish or others, as currently it is only available in English."
"Compatibility with other Mobile Device Management (MDM) products on the market should be improved, ensuring correct operation between SandBlast Mobile and MDM."
"The errors should be more visible to admin users."
"We can say that this is a very good solution but Check Point has to reduce the cost."
"Check Point Harmony Mobile is strong but could improve in reducing alert fatigue, sometimes we get too many notifications which can overwhelm users and IT staff."
"Harmony has more support for Android OS as opposed to iOS. You need a third-party MDM solution to integrate with iOS."
"The cost is a bit high. While it is worth the investment given the increased security and improved user experience, it is definitely a significant expense."
"I see a potential area of improvement for Jamf Connect from the commercial side, not from the technical side, because technically we do not have any issues."
"The solution's UI could be more user-friendly for the setup process."
"What can be improved is the login banner resizing. Currently, it is not fully compatible and could benefit from being a full-screen size banner on the Mac device."
"The logs are an area with a shortcoming."
"User training has room for improvement. This improvement would benefit from more documentation, and I would appreciate seeing more automation pieces as well."
"The configuration could be faster."
"The main use case for Jamf Connect was to synchronize local accounts with the identity provider, like Entra. However, due to some limitations with the enrollment sequence and user limitations, we decided to discontinue using it."
"There is room for improvement with Jamf Connect in reducing its cost and overcoming limitations during pre-stage enrollment, which prevent it from creating MDM-capable users."
 

Pricing and Cost Advice

"Users have to pay a yearly licensing fee for each device, which is cheap."
"The cost is huge compared to other products, and it seems this solution is only for companies with a large budget."
"I rate the tool's pricing a three out of ten."
"Pricing is a little high."
"Check Point pricing is better than Symantec."
"When I purchased the product for one of our company's clients, I realized that the price of the product was competitive."
"The quality, price, and support ratio are very good."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"Jamf Connect has a yearly licensing cost, which is expensive."
"The pricing is definitely on the higher side."
"The solution's price is reasonable."
"It's relatively inexpensive."
"The pricing model could be improved, especially considering the availability of alternative MDM solutions like Kandji, which offers similar features for free or at a lower cost."
"I rate the cost as three out of ten, with ten being the highest."
"The pricing is good."
"We pay 2 dollars per device monthly. For the plus version, you have to pay 4 dollars per month. I think the product will give discounts based on the number of users and devices."
report
Use our free recommendation engine to learn which Mobile Threat Defense solutions are best for your needs.
893,164 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Manufacturing Company
10%
Outsourcing Company
7%
Financial Services Firm
7%
Financial Services Firm
17%
Computer Software Company
12%
Healthcare Company
7%
Construction Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business38
Midsize Enterprise14
Large Enterprise23
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise3
Large Enterprise12
 

Questions from the Community

What do you like most about Check Point Harmony Mobile?
The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS.
What needs improvement with Check Point Harmony Mobile?
I have faced some issues with Check Point Harmony Mobile. We are trying to get some features developed into the app and it is taking long for it to be developed. The support sometimes is not as eff...
What needs improvement with Jamf Connect?
I see a potential area of improvement for Jamf Connect from the commercial side, not from the technical side, because technically we do not have any issues. It is majorly the pricing. For the India...
What is your primary use case for Jamf Connect?
I am using Jamf Connect majorly for password synchronization. The idea behind Jamf Connect is to synchronize passwords between user accounts residing in my directory. This use case helps us to rece...
 

Also Known As

Check Point Mobile Access, Check Point SandBlast Mobile
Wandera, Wandera Private Access
 

Overview

 

Sample Customers

Samsung Research America, Mississippi Office of the Secretary of State
Mastercard, Deloitte, PayPal, Toshiba, BNP Paribas, EY, Otis, Rollins, Eurostar, Frontier, Sealy, Rolex, VITAS Healthcare
Find out what your peers are saying about Check Point Software Technologies, Zimperium, Lookout and others in Mobile Threat Defense. Updated: April 2026.
893,164 professionals have used our research since 2012.