Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Mobile vs Zimperium comparison

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Mobile
Ranking in Mobile Threat Defense
1st
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
46
Ranking in other categories
No ranking in other categories
Zimperium
Ranking in Mobile Threat Defense
3rd
Average Rating
9.0
Reviews Sentiment
8.1
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2025, in the Mobile Threat Defense category, the mindshare of Check Point Harmony Mobile is 17.0%, down from 19.8% compared to the previous year. The mindshare of Zimperium is 27.2%, up from 20.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Mobile Threat Defense
 

Featured Reviews

Anuraj Nair - PeerSpot reviewer
Provides good threat detection and prevention, but it lacks MDM capabilities present in other MDM products
Check Point Harmony Mobile is not so attractive and provides security only for mobile devices. Customers can use Check Point Harmony Mobile to secure their mobile devices, such as Android or Mac smartphones. However, it has less capability than an MDM (Mobile device management). Check Point Harmony Mobile has a good advantage in terms of security posture and security threat detection and prevention. Check Point Harmony Mobile will help prevent 99% of attacks on mobile devices. It is easy to manage Check Point Harmony Mobile. People bring their own devices and connect them to all the other unwanted networks. This causes traffic to flow to these devices from any network source, such as Wi-Fi, LAN, or other public networks. Deploying Check Point Harmony Mobile can ensure the endpoint is sanitized and clean for use at home and the workplace. Overall, I rate the solution a six out of ten.
user5010 - PeerSpot reviewer
Straightforward initial setup, it took less than a week to get everybody up and running
We are using the latest version of this solution. My primary use case is for mobile device protection The middleman protection and the WiFi protection are the most valuable features.  General reporting can be improved. The logs only last a short period of time so reporting could be improved,…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It doesn't allow you to activate some of the applications until your mobile is malware free. That way we come to know that the device secure and only then do we deploy the business application."
"One of the features that have given us additional value is being able to encrypt and block how data is shared within cell phones or mobile devices."
"Harmony Mobile presents many innovative features."
"The anti-phishing and scanning of SMS are the most valuable aspects of the solution. Sometimes we will get some SMS and they will try to redirect you to malicious links. If you have SandBlast Mobile, it helps you prevent clicking on those malicious links."
"I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious."
"The product's VPN solution is super efficient, and our clients highly value ransomware protection on mobile. These two features are probably the most valuable aspects of this product. Check Point Harmony Mobile responds very fast to any cybersecurity attack. With that product, your mobile response is super fast."
"As a security solution for devices, it can benefit us in many ways, including providing us with data security, access control, network security, and more."
"First, the granular visibility of apps & traffic which we get through Check Point SandBlast Mobile are good. We can see each & every installed app & information for each app about severity & risk."
"Look at other options but ultimately, this solution offers possibly one of the best solutions out there."
 

Cons

"Integration needs improvement. We use Check Point for email. We use Check Point Capsule Workspace and I wish that it tied into that better and was integrated with their email application so that when it's secure, then they're able to access their email and it could be deployed as one group instead of two separate applications. It's a little bit more work for us to deploy both of those so it'd be nice if they could be integrated."
"The interface could be more user-friendly. They should improve the look and feel."
"Some configuration options inside the management console are a little confusing because the interface is not always user-friendly."
"The solution should improve passive scanning and provide regular updates. Also, during business hours, users should not experience any slowdown on their devices."
"The deployment in the Android system is very simple but in the case of iOS, it is more complicated so the users require attention from our CAU."
"If possible, it would be better if they can include vulnerability management for applications. When a user installs many applications, if there is a way to manage a pack of applications, it would be helpful."
"The solution's false positive detection could be improved to reduce unnecessary alerts, the app's performance optimized to minimize device impact, and policy management simplified for easier deployment."
"Also, we found configuring device groups & mapping a policy is quite confusing. There should be a simpler interface."
"General reporting can be improved. The logs only last a short period of time, so reporting could be improved."
 

Pricing and Cost Advice

"We didn't actually purchase the software. It was given to us by Check Point. We are using it as a test bed for possible future customers."
"I rate the tool's pricing a three out of ten."
"When I purchased the product for one of our company's clients, I realized that the price of the product was competitive."
"We pay between 300 and 600 Rupees per year, around seven dollars per month."
"Check Point provides a separate license in cases where organizations want to use this only on mobile devices, or laptops/desktops."
"The quality, price, and support ratio are very good."
"Its cost depends upon the number of users."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"There could be more clarity regarding the pricing."
report
Use our free recommendation engine to learn which Mobile Threat Defense solutions are best for your needs.
848,716 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
25%
Financial Services Firm
11%
Government
7%
Manufacturing Company
6%
Computer Software Company
17%
Financial Services Firm
16%
Manufacturing Company
11%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Check Point Harmony Mobile?
The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS.
What needs improvement with Check Point Harmony Mobile?
The solution should improve passive scanning and provide regular updates. Also, during business hours, users should not experience any slowdown on their devices.
Ask a question
Earn 20 points
 

Also Known As

Check Point Mobile Access, Check Point SandBlast Mobile
No data available
 

Overview

 

Sample Customers

Samsung Research America, Mississippi Office of the Secretary of State
Large global telco, global leader in financial services