Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Mobile vs Jamf Connect comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Mobile
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
60
Ranking in other categories
Mobile Threat Defense (1st)
Jamf Connect
Average Rating
9.0
Reviews Sentiment
5.9
Number of Reviews
13
Ranking in other categories
ZTNA as a Service (15th), AI Customer Experience Personalization (62nd)
 

Mindshare comparison

Check Point Harmony Mobile and Jamf Connect aren’t in the same category and serve different purposes. Check Point Harmony Mobile is designed for Mobile Threat Defense and holds a mindshare of 11.9%, down 14.3% compared to last year.
Jamf Connect, on the other hand, focuses on ZTNA as a Service, holds 1.9% mindshare, down 2.1% since last year.
Mobile Threat Defense Market Share Distribution
ProductMarket Share (%)
Check Point Harmony Mobile11.9%
Zimperium26.9%
Lookout19.8%
Other41.400000000000006%
Mobile Threat Defense
ZTNA as a Service Market Share Distribution
ProductMarket Share (%)
Jamf Connect1.9%
Zscaler Zero Trust Exchange Platform15.3%
Prisma Access by Palo Alto Networks11.5%
Other71.3%
ZTNA as a Service
 

Featured Reviews

RL
TI at a security firm with 51-200 employees
Unified across devices and mobile threats are automatically blocked before damage occurs
The best feature of Check Point Harmony Mobile is the Mobile Threat Defense because it detects and blocks phishing attempts, malicious apps, man-in-the-middle attacks, and device exploits, which is especially critical in BYOD and remote work environments. The Mobile Threat Defense feature in Check Point Harmony Mobile has been very effective, especially in catching threats that target employees outside of traditional email channels. For example, there was a smishing attempt where a user received a text message with links disguised as package delivery updates. Check Point Harmony Mobile analyzed the link in real-time, flagged it as malicious, and blocked access before anyone could enter credentials, which prevented what could have been a widespread credential harvesting attack. Device Management and Remote Work Support are two additional aspects of Check Point Harmony Mobile that are especially valued. Device Management continuously checks device posture, including things like OS version, patch level, and whether a device is jailbroken or rooted. Remote Work Support allows employees to securely access email, collaboration tools, and files from anywhere without worrying about phishing links, malicious apps, and unsafe Wi-Fi networks. Check Point Harmony Mobile has positively impacted the organization, especially with phishing protections, as SMS or messaging-based phishing attempts are now blocked before users can click, preventing credential theft. Measurable outcomes since deploying Check Point Harmony Mobile highlight its impact on both security and compliance. Mobile-related security incidents have dropped by approximately 40 to 50 percent compared to before deployment.
Joost Van 'T Wout - PeerSpot reviewer
Senior Endpoint Engineer (macOS/Jamf) at PVH Corp.
Customizable and good password management but needs better user-level profile deployment
The main use case for Jamf Connect was to synchronize local accounts with the identity provider, like Entra. However, due to some limitations with the enrollment sequence and user limitations, we decided to discontinue using it We previously used Jamf Connect to synchronize local accounts with…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The best feature of Check Point Harmony Mobile is the Mobile Threat Defense because it detects and blocks phishing attempts, malicious apps, man-in-the-middle attacks, and device exploits, which is especially critical in BYOD and remote work environments."
"Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage."
"I really like the application scanning feature that scans all of the installed applications, and not only what appears in the add or remove apps, and then reports the results in the console."
"Check Point Harmony Mobile has positively impacted my organization by achieving a decrease in 50% in the cyber attacks."
"We like Harmony's ability to encrypt transactions between mobile devices. All the user's transactions are encrypted. That's an excellent feature. We can detect, quarantine, and address any issues in the handset itself."
"After deploying Check Point Harmony Mobile, I saw a noticeable drop in mobile-related security alerts, around 30 to 40%, fewer phishing and risky application incidents, and better user awareness."
"The best feature of Check Point Harmony Mobile is the Mobile Threat Defense because it detects and blocks phishing attempts, malicious apps, man-in-the-middle attacks, and device exploits, which is especially critical in BYOD and remote work environments."
"It is very easy for my company to get information from the product's support team."
"It's a good and stable tool, so you should use it if you have a need."
"The most valuable feature of Jamf Connect is the dual login screen, which has simplified the login process and eliminated the need for users to enter their password multiple times."
"The most valuable feature is the synchronization of passwords with a local password, which works well."
"Jamf Connect is an identity provider, and once you log in, you will have all the device's access."
"I would rate the product's scalability an eight out of ten."
"The solution is scalable."
"It is easy to integrate into any existing IT workflow."
"It's connection with Azure is the most valuable. It is easy to deploy and connect."
 

Cons

"At times, when configuring policies, the tool takes some time to apply the policy."
"The interface could be more user-friendly. They should improve the look and feel."
"Harmony has more support for Android OS as opposed to iOS. You need a third-party MDM solution to integrate with iOS. If you don't have an MDM, your app can't scan on an iOS device. The solution can scan everything on Android. It sees all your apps."
"Technical support should include other languages, such as Spanish or others, as currently it is only available in English."
"Check Point Harmony Mobile is strong but could improve in reducing alert fatigue, sometimes we get too many notifications which can overwhelm users and IT staff."
"Some areas that could be improved with Check Point Harmony Mobile include embedding SD-WAN in mobile device products. Our clients are interested in this feature, so it could be a good idea if Check Point Harmony Mobile includes it in the mobile product."
"The product needs to improve its user awareness."
"One area Check Point Harmony Mobile can improve is the cost for the solution itself, which I find a bit expensive, but other than that, most of it should be okay."
"Jamf's support could be improved."
"The solution needs to improve its licensing."
"Overall, there is a lack of consistent experience sometimes with some of their features."
"We've had some issues when users restart their devices because the device asks for credentials afterward. Jamf Connect asks for a username, password, and MFA."
"Jamf Connect is beginning to implement Multi-Factor Authentication for offline authentication, but the setup documentation is insufficient."
"We have faced issues with the product's configuration. If we use the tool with other business manager solutions, then there is the issue of naming conventions. The tool needs to be careful with newer updates so that it doesn't break any of the existing configurations."
"The solution's UI could be more user-friendly for the setup process."
"What can be improved is the login banner resizing. Currently, it is not fully compatible and could benefit from being a full-screen size banner on the Mac device."
 

Pricing and Cost Advice

"Users have to pay a yearly licensing fee for each device, which is cheap."
"Check Point provides a separate license in cases where organizations want to use this only on mobile devices, or laptops/desktops."
"The quality, price, and support ratio are very good."
"The price is okay. Per user, it should be something like five or ten dollars. But, we usually get discounts that drive the cost down."
"When I purchased the product for one of our company's clients, I realized that the price of the product was competitive."
"Its cost depends upon the number of users."
"Check Point pricing is better than Symantec."
"The cost is huge compared to other products, and it seems this solution is only for companies with a large budget."
"We pay 2 dollars per device monthly. For the plus version, you have to pay 4 dollars per month. I think the product will give discounts based on the number of users and devices."
"The pricing is good."
"Jamf Connect has a yearly licensing cost, which is expensive."
"The solution's price is reasonable."
"The pricing is definitely on the higher side."
"The pricing model could be improved, especially considering the availability of alternative MDM solutions like Kandji, which offers similar features for free or at a lower cost."
"It's relatively inexpensive."
"I rate the cost as three out of ten, with ten being the highest."
report
Use our free recommendation engine to learn which Mobile Threat Defense solutions are best for your needs.
882,160 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Manufacturing Company
10%
Outsourcing Company
7%
Security Firm
7%
Computer Software Company
16%
Financial Services Firm
13%
Healthcare Company
7%
Performing Arts
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business37
Midsize Enterprise15
Large Enterprise22
By reviewers
Company SizeCount
Small Business4
Midsize Enterprise2
Large Enterprise9
 

Questions from the Community

What do you like most about Check Point Harmony Mobile?
The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS.
What is your experience regarding pricing and costs for Check Point Harmony Mobile?
My experience with pricing, setup cost, and licensing for Check Point Harmony Mobile is that pricing can be a little bit lower, which would be good because other antivirus solutions are significant...
What needs improvement with Check Point Harmony Mobile?
While Check Point Harmony Mobile is a strong solution, there are a few areas where improvement could make it even more effective and user-friendly, such as more granular policy controls.
What is your experience regarding pricing and costs for Jamf Connect?
Jamf Connect requires a per-device license fee, which becomes quite expensive given our large company size. Each device that gets enrolled with Jamf Connect requires a monthly license payment.
What needs improvement with Jamf Connect?
There is room for improvement with Jamf Connect in reducing its cost and overcoming limitations during pre-stage enrollment, which prevent it from creating MDM-capable users. This limitation affect...
What is your primary use case for Jamf Connect?
The main use case for Jamf Connect was to synchronize local accounts with the identity provider, like Entra. However, due to some limitations with the enrollment sequence and user limitations, we d...
 

Also Known As

Check Point Mobile Access, Check Point SandBlast Mobile
Wandera, Wandera Private Access
 

Overview

 

Sample Customers

Samsung Research America, Mississippi Office of the Secretary of State
Mastercard, Deloitte, PayPal, Toshiba, BNP Paribas, EY, Otis, Rollins, Eurostar, Frontier, Sealy, Rolex, VITAS Healthcare
Find out what your peers are saying about Check Point Software Technologies, Zimperium, Lookout and others in Mobile Threat Defense. Updated: January 2026.
882,160 professionals have used our research since 2012.