No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point Harmony Mobile vs Jamf Connect comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Mobile
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
61
Ranking in other categories
Mobile Threat Defense (1st)
Jamf Connect
Average Rating
9.0
Reviews Sentiment
6.1
Number of Reviews
18
Ranking in other categories
ZTNA as a Service (11th), AI Customer Experience Personalization (13th)
 

Mindshare comparison

Check Point Harmony Mobile and Jamf Connect aren’t in the same category and serve different purposes. Check Point Harmony Mobile is designed for Mobile Threat Defense and holds a mindshare of 11.4%, down 13.9% compared to last year.
Jamf Connect, on the other hand, focuses on ZTNA as a Service, holds 1.9% mindshare, up 1.9% since last year.
Mobile Threat Defense Mindshare Distribution
ProductMindshare (%)
Check Point Harmony Mobile11.4%
Zimperium26.1%
Lookout18.5%
Other44.0%
Mobile Threat Defense
ZTNA as a Service Mindshare Distribution
ProductMindshare (%)
Jamf Connect1.9%
Zscaler Zero Trust Exchange Platform13.3%
Prisma Access by Palo Alto Networks10.4%
Other74.4%
ZTNA as a Service
 

Featured Reviews

RL
TI at a security firm with 51-200 employees
Unified across devices and mobile threats are automatically blocked before damage occurs
The best feature of Check Point Harmony Mobile is the Mobile Threat Defense because it detects and blocks phishing attempts, malicious apps, man-in-the-middle attacks, and device exploits, which is especially critical in BYOD and remote work environments. The Mobile Threat Defense feature in Check Point Harmony Mobile has been very effective, especially in catching threats that target employees outside of traditional email channels. For example, there was a smishing attempt where a user received a text message with links disguised as package delivery updates. Check Point Harmony Mobile analyzed the link in real-time, flagged it as malicious, and blocked access before anyone could enter credentials, which prevented what could have been a widespread credential harvesting attack. Device Management and Remote Work Support are two additional aspects of Check Point Harmony Mobile that are especially valued. Device Management continuously checks device posture, including things like OS version, patch level, and whether a device is jailbroken or rooted. Remote Work Support allows employees to securely access email, collaboration tools, and files from anywhere without worrying about phishing links, malicious apps, and unsafe Wi-Fi networks. Check Point Harmony Mobile has positively impacted the organization, especially with phishing protections, as SMS or messaging-based phishing attempts are now blocked before users can click, preventing credential theft. Measurable outcomes since deploying Check Point Harmony Mobile highlight its impact on both security and compliance. Mobile-related security incidents have dropped by approximately 40 to 50 percent compared to before deployment.
Robert Ojok - PeerSpot reviewer
Systems Engineer Iii Apple Devices (Jamf Engineering) at a retailer with 10,001+ employees
Unified sign-on has simplified password management and now secures our mobile workforce
The ability to have a single password for the local device and the same password for the IDP is part of our security requirements. Jamf Connect integrates with multi-factor authentication from any IDP and facilitates initial device enrollment. It ensures that when a new user sets up the device, they sign in with their IDP username and password, which then creates the profile on the device. Furthermore, Jamf Connect is now integrated into Jamf Self Service Plus, providing a single dashboard for user password management and allowing users to sync and change their passwords. Additionally, Jamf Connect enhances security by offering two-factor authentication and permitting users to manage or seek help through support features directly within the app.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage."
"It has been very easy to implement and deploy."
"The best thing about the product is that it is transparent and does not impact the users."
"The usability is the most valuable feature. It's really easy to use. It's a durable solution. I don't have any breaches. It is a good solution from that angle."
"The blade is easy to enable and configure, and it provides great benefits with the help of the built-in SSL VPN Portal."
"It monitors all the URLs that a user goes to on their phone and so we can see what they're looking at and we can limit that. Certain topics are not allowed to be accessed. They're monitoring their apps and they rate them based upon how big of a security risk that individual app is based on their ratings. And so we're able to limit those as well and allow people to have some that may be a low risk, but still a risk, but we may allow that for our users whereas we block medium and high risk."
"I would rate the stability a ten out of ten."
"Our ROI has been great, as it really didn't come at a cost for us because we already had the Infinity in place so, at no cost, we had extra security benefits added and visibility into our users' devices that we didn't have before."
"It's a good and stable tool, so you should use it if you have a need."
"It has definitely reduced the IT support burden, as 31% of Mac tickets are password-related, costing an average of 70 or 80 dollars for just one ticket, and that has been drastically reduced with the automation of these tasks through Jamf Connect."
"The tool supports different types of authentication. It also integrates seamlessly if you are using other Jamf products."
"The solution is scalable."
"Jamf Connect is very simple for us to use, and it is oriented towards productivity."
"Jamf Connect allowed us to fully customize everything, offering a branded way to change passwords and manage integration with Entra instead of LDAP."
"Jamf Connect is a pretty simple and straightforward tool overall."
"Jamf Connect integrates with multi-factor authentication from any IDP and facilitates initial device enrollment, ensuring that when a new user sets up the device, they sign in with their IDP username and password, which then creates the profile on the device."
 

Cons

"There are certain shortcomings in the integration capabilities that a product offers."
"An area for improvement could be simpler deployment. Regarding easier deployment options, we would appreciate options that simplify the whole process."
"We can say that this is a very good solution but Check Point has to reduce the cost."
"Harmony has more support for Android OS as opposed to iOS. You need a third-party MDM solution to integrate with iOS. If you don't have an MDM, your app can't scan on an iOS device. The solution can scan everything on Android. It sees all your apps."
"Harmony Mobile could be improved with increased built-in DLP coverage."
"Integration needs improvement. We use Check Point for email. We use Check Point Capsule Workspace and I wish that it tied into that better and was integrated with their email application so that when it's secure, then they're able to access their email and it could be deployed as one group instead of two separate applications. It's a little bit more work for us to deploy both of those so it'd be nice if they could be integrated."
"The interface could be more user-friendly. They should improve the look and feel."
"The product does not provide deep capabilities for sharing specific data to users or groups separately, nor does it provide visibility as to whether a user has access to the data or not."
"The configuration could be faster."
"We've had some issues when users restart their devices because the device asks for credentials afterward. Jamf Connect asks for a username, password, and MFA."
"The solution’s technical support is bad and should be improved."
"The logs are an area with a shortcoming."
"We have faced issues with the product's configuration. If we use the tool with other business manager solutions, then there is the issue of naming conventions. The tool needs to be careful with newer updates so that it doesn't break any of the existing configurations."
"One area of Jamf Connect that I think could be improved is the recent merger with Self Service Plus, which is a solution we did not want."
"The solution's UI could be more user-friendly for the setup process."
"The solution needs to improve its licensing."
 

Pricing and Cost Advice

"Pricing is a little high."
"The cost is huge compared to other products, and it seems this solution is only for companies with a large budget."
"The price is not so high. I would rate the pricing a three or four out of ten."
"I rate the tool's pricing a three out of ten."
"There is a need to make yearly payments towards the licensing costs attached to the product. You can opt for a one-year, three-year, or five-year license."
"Check Point Harmony Mobile's pricing is good."
"Its cost depends upon the number of users."
"We pay between 300 and 600 Rupees per year, around seven dollars per month."
"We pay 2 dollars per device monthly. For the plus version, you have to pay 4 dollars per month. I think the product will give discounts based on the number of users and devices."
"I rate the cost as three out of ten, with ten being the highest."
"The pricing model could be improved, especially considering the availability of alternative MDM solutions like Kandji, which offers similar features for free or at a lower cost."
"Jamf Connect has a yearly licensing cost, which is expensive."
"The solution's price is reasonable."
"The pricing is definitely on the higher side."
"The pricing is good."
"It's relatively inexpensive."
report
Use our free recommendation engine to learn which Mobile Threat Defense solutions are best for your needs.
895,891 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Manufacturing Company
10%
Financial Services Firm
7%
Outsourcing Company
7%
Financial Services Firm
17%
Computer Software Company
11%
Healthcare Company
7%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business39
Midsize Enterprise14
Large Enterprise23
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise3
Large Enterprise12
 

Questions from the Community

What needs improvement with Check Point Harmony Mobile?
I have faced some issues with Check Point Harmony Mobile. We are trying to get some features developed into the app and it is taking long for it to be developed. The support sometimes is not as eff...
What is your primary use case for Check Point Harmony Mobile?
I am already using Check Point Harmony Mobile. I have been working with Check Point Harmony Mobile for mobile threat defense purposes.
What needs improvement with Jamf Connect?
I see a potential area of improvement for Jamf Connect from the commercial side, not from the technical side, because technically we do not have any issues. It is majorly the pricing. For the India...
What is your primary use case for Jamf Connect?
I am using Jamf Connect majorly for password synchronization. The idea behind Jamf Connect is to synchronize passwords between user accounts residing in my directory. This use case helps us to rece...
 

Also Known As

Check Point Mobile Access, Check Point SandBlast Mobile
Wandera, Wandera Private Access
 

Overview

 

Sample Customers

Samsung Research America, Mississippi Office of the Secretary of State
Mastercard, Deloitte, PayPal, Toshiba, BNP Paribas, EY, Otis, Rollins, Eurostar, Frontier, Sealy, Rolex, VITAS Healthcare
Find out what your peers are saying about Check Point Software Technologies, Zimperium, Lookout and others in Mobile Threat Defense. Updated: April 2026.
895,891 professionals have used our research since 2012.