Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Mobile vs Jamf Connect comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Mobile
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
60
Ranking in other categories
Mobile Threat Defense (1st)
Jamf Connect
Average Rating
9.0
Reviews Sentiment
6.4
Number of Reviews
17
Ranking in other categories
ZTNA as a Service (13th), AI Customer Experience Personalization (62nd)
 

Mindshare comparison

Check Point Harmony Mobile and Jamf Connect aren’t in the same category and serve different purposes. Check Point Harmony Mobile is designed for Mobile Threat Defense and holds a mindshare of 12.0%, down 13.7% compared to last year.
Jamf Connect, on the other hand, focuses on ZTNA as a Service, holds 2.0% mindshare, down 2.1% since last year.
Mobile Threat Defense Mindshare Distribution
ProductMindshare (%)
Check Point Harmony Mobile12.0%
Zimperium27.6%
Lookout19.4%
Other41.0%
Mobile Threat Defense
ZTNA as a Service Mindshare Distribution
ProductMindshare (%)
Jamf Connect2.0%
Zscaler Zero Trust Exchange Platform14.8%
Prisma Access by Palo Alto Networks11.3%
Other71.9%
ZTNA as a Service
 

Featured Reviews

RL
TI at a security firm with 51-200 employees
Unified across devices and mobile threats are automatically blocked before damage occurs
The best feature of Check Point Harmony Mobile is the Mobile Threat Defense because it detects and blocks phishing attempts, malicious apps, man-in-the-middle attacks, and device exploits, which is especially critical in BYOD and remote work environments. The Mobile Threat Defense feature in Check Point Harmony Mobile has been very effective, especially in catching threats that target employees outside of traditional email channels. For example, there was a smishing attempt where a user received a text message with links disguised as package delivery updates. Check Point Harmony Mobile analyzed the link in real-time, flagged it as malicious, and blocked access before anyone could enter credentials, which prevented what could have been a widespread credential harvesting attack. Device Management and Remote Work Support are two additional aspects of Check Point Harmony Mobile that are especially valued. Device Management continuously checks device posture, including things like OS version, patch level, and whether a device is jailbroken or rooted. Remote Work Support allows employees to securely access email, collaboration tools, and files from anywhere without worrying about phishing links, malicious apps, and unsafe Wi-Fi networks. Check Point Harmony Mobile has positively impacted the organization, especially with phishing protections, as SMS or messaging-based phishing attempts are now blocked before users can click, preventing credential theft. Measurable outcomes since deploying Check Point Harmony Mobile highlight its impact on both security and compliance. Mobile-related security incidents have dropped by approximately 40 to 50 percent compared to before deployment.
Robert Ojok - PeerSpot reviewer
Systems Engineer Iii Apple Devices (Jamf Engineering) at a retailer with 10,001+ employees
Unified sign-on has simplified password management and now secures our mobile workforce
The ability to have a single password for the local device and the same password for the IDP is part of our security requirements. Jamf Connect integrates with multi-factor authentication from any IDP and facilitates initial device enrollment. It ensures that when a new user sets up the device, they sign in with their IDP username and password, which then creates the profile on the device. Furthermore, Jamf Connect is now integrated into Jamf Self Service Plus, providing a single dashboard for user password management and allowing users to sync and change their passwords. Additionally, Jamf Connect enhances security by offering two-factor authentication and permitting users to manage or seek help through support features directly within the app.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Check Point Harmony Mobile has significantly improved our mobile security posture."
"The simple navigation offered by the graphical user interface is excellent."
"Check Point Harmony Mobile has positively impacted my organization by improving compliance in the customer's environment and helps remind the customer that there is protection on the devices."
"It monitors all the URLs that a user goes to on their phone and so we can see what they're looking at and we can limit that. Certain topics are not allowed to be accessed. They're monitoring their apps and they rate them based upon how big of a security risk that individual app is based on their ratings. And so we're able to limit those as well and allow people to have some that may be a low risk, but still a risk, but we may allow that for our users whereas we block medium and high risk."
"It doesn't allow you to activate some of the applications until your mobile is malware free. That way we come to know that the device secure and only then do we deploy the business application."
"It has provided us with an easy-to-use solution that protects our corporate data on all our iPhone mobile devices."
"We've found that the product is quite stable."
"It is very easy for my company to get information from the product's support team."
"For those kinds of users, it is an awesome solution because it syncs their password across the devices they are using, which was not the case previously."
"It is easy to integrate into any existing IT workflow."
"Jamf Connect has quite a nice interface, and the password synchronization and SSO elements are particularly good."
"Jamf Connect integrates with multi-factor authentication from any IDP and facilitates initial device enrollment, ensuring that when a new user sets up the device, they sign in with their IDP username and password, which then creates the profile on the device."
"The tool supports different types of authentication. It also integrates seamlessly if you are using other Jamf products."
"The initial setup of Jamf Connect was straightforward with clear instructions provided in the documentation."
"Jamf Connect is very simple for us to use, and it is oriented towards productivity."
"It's a good and stable tool, so you should use it if you have a need."
 

Cons

"The admin portal is slightly clunky and sometimes shows a different status than what the device is actually doing."
"In terms of what needs improvement, the web interface should be simplified. It should be more user-friendly. It's too technical."
"If possible, it would be better if they can include vulnerability management for applications."
"Check Point Harmony Mobile lacks MDM capabilities, which are present in other MDM products, like IBM Security MaaS360, AirWatch, and Google Workspace."
"Some areas that could be improved with Check Point Harmony Mobile include embedding SD-WAN in mobile device products. Our clients are interested in this feature, so it could be a good idea if Check Point Harmony Mobile includes it in the mobile product."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"The area that I find could use the most improvement would be in the forensics section of the administrator console."
"Harmony Mobile could be improved with increased built-in DLP coverage."
"The solution needs to improve its licensing."
"Jamf Connect is beginning to implement Multi-Factor Authentication for offline authentication, but the setup documentation is insufficient."
"The solution’s technical support is bad and should be improved."
"There is room for improvement with Jamf Connect in reducing its cost and overcoming limitations during pre-stage enrollment, which prevent it from creating MDM-capable users."
"User training has room for improvement. This improvement would benefit from more documentation, and I would appreciate seeing more automation pieces as well."
"The logs are an area with a shortcoming."
"I see a potential area of improvement for Jamf Connect from the commercial side, not from the technical side, because technically we do not have any issues."
"The configuration could be faster."
 

Pricing and Cost Advice

"There is a need to make yearly payments towards the licensing costs attached to the product. You can opt for a one-year, three-year, or five-year license."
"We didn't actually purchase the software. It was given to us by Check Point. We are using it as a test bed for possible future customers."
"The product pricing is reasonable for the security it provides."
"We pay between 300 and 600 Rupees per year, around seven dollars per month."
"I rate the tool's pricing a three out of ten."
"Pricing is a little high."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"Check Point provides a separate license in cases where organizations want to use this only on mobile devices, or laptops/desktops."
"We pay 2 dollars per device monthly. For the plus version, you have to pay 4 dollars per month. I think the product will give discounts based on the number of users and devices."
"Jamf Connect has a yearly licensing cost, which is expensive."
"The solution's price is reasonable."
"I rate the cost as three out of ten, with ten being the highest."
"It's relatively inexpensive."
"The pricing model could be improved, especially considering the availability of alternative MDM solutions like Kandji, which offers similar features for free or at a lower cost."
"The pricing is definitely on the higher side."
"The pricing is good."
report
Use our free recommendation engine to learn which Mobile Threat Defense solutions are best for your needs.
885,286 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Manufacturing Company
10%
Outsourcing Company
8%
Security Firm
7%
Financial Services Firm
14%
Computer Software Company
13%
Healthcare Company
8%
Marketing Services Firm
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business38
Midsize Enterprise14
Large Enterprise22
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise3
Large Enterprise11
 

Questions from the Community

What do you like most about Check Point Harmony Mobile?
The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS.
What is your experience regarding pricing and costs for Check Point Harmony Mobile?
My experience with pricing, setup cost, and licensing for Check Point Harmony Mobile is that pricing can be a little bit lower, which would be good because other antivirus solutions are significant...
What needs improvement with Check Point Harmony Mobile?
While Check Point Harmony Mobile is a strong solution, there are a few areas where improvement could make it even more effective and user-friendly, such as more granular policy controls.
What is your experience regarding pricing and costs for Jamf Connect?
Jamf Connect requires a per-device license fee, which becomes quite expensive given our large company size. Each device that gets enrolled with Jamf Connect requires a monthly license payment.
What needs improvement with Jamf Connect?
One area of Jamf Connect that I think could be improved is the recent merger with Self Service Plus, which is a solution we did not want. As a technical person, I do not want to see that because th...
What is your primary use case for Jamf Connect?
Jamf Connect is valuable for new users who are Mac users but have never worked in an Active Directory domain or have independent Macs. Initially, there was skepticism about this feature, but after ...
 

Also Known As

Check Point Mobile Access, Check Point SandBlast Mobile
Wandera, Wandera Private Access
 

Overview

 

Sample Customers

Samsung Research America, Mississippi Office of the Secretary of State
Mastercard, Deloitte, PayPal, Toshiba, BNP Paribas, EY, Otis, Rollins, Eurostar, Frontier, Sealy, Rolex, VITAS Healthcare
Find out what your peers are saying about Check Point Software Technologies, Zimperium, Lookout and others in Mobile Threat Defense. Updated: March 2026.
885,286 professionals have used our research since 2012.