One of our clients has committed to deploying these features. We are working on deploying Check Point Harmony Mobile and preparing a proposal for the bank. Once they accept, we can proceed, which will enhance Harmony Mobile's security features. Clients are very impressed with Harmony Mobile's threat intelligence capabilities, especially the live, real-time updates. The bank's administrators were particularly amazed by the features of advanced threat intelligence. Harmony Mobile adds numerous security features and simplifies the work for both administrative and security staff. Due to its significant benefits, we encourage other microfinance and financial institutions to adopt this technology. By deploying Harmony Mobile, they gain enhanced security, reduced workload, and overall efficiency, all at a lower cost than other solutions. The technology is proving to be both valuable and cost-effective for users. We recommend that financial institutions use Harmony Mobile because it is highly effective in blocking threats like phishing and malware, which are significant concerns in today's market. Financial institutions are major targets for these attacks, so Harmony Mobile's specialized features are precious. We are encouraging them to adopt this solution for enhanced security. Two engineers are enough for the solution's maintenance. Overall, I rate the solution a nine out of ten.
Regarding AI features, it utilizes threat cloud technology supported by dedicated threat cloud engineers. This infrastructure forms the basis for integrating AI and ML capabilities into the platform. Before buying, you need to have your mobile device ready, such as an Android or iOS device. This makes it very easy to manage your connectivity and security. Overall, I rate the solution a ten out of ten.
Harmony Mobile is highly effective for protecting mobile devices. Much information and data are shared over the cloud using mobile devices and laptops. Many mobile attacks target devices without robust security features, making them vulnerable to malicious files and bots. However, if a device is configured with Check Point Harmony Protection, these threats, including encrypted and malicious files, will be detected and neutralized based on the configuration settings. This protection ensures the safety of business data and other critical information. Additionally, Harmony Mobile is easy to install and requires minimal intervention on mobile devices, making it a very effective security solution. Nowadays, everything is integrated with AI, which benefits various use cases and users. For example, if a malicious code is detected by the device, it should send an alert message to the user. Harmony Mobile can notify the user by saying, "Malicious code detected. Please take appropriate action." This kind of artificial intelligence support ensures that even if users do not see the message, they can be alerted through a voice message. We recommend the solution. Overall, I rate the solution a nine out of ten.
Check Point Harmony Mobile is not so attractive and provides security only for mobile devices. Customers can use Check Point Harmony Mobile to secure their mobile devices, such as Android or Mac smartphones. However, it has less capability than an MDM (Mobile device management). Check Point Harmony Mobile has a good advantage in terms of security posture and security threat detection and prevention. Check Point Harmony Mobile will help prevent 99% of attacks on mobile devices. It is easy to manage Check Point Harmony Mobile. People bring their own devices and connect them to all the other unwanted networks. This causes traffic to flow to these devices from any network source, such as Wi-Fi, LAN, or other public networks. Deploying Check Point Harmony Mobile can ensure the endpoint is sanitized and clean for use at home and the workplace. Overall, I rate the solution a six out of ten.
The tool helped prevent potential security threats whenever some users communicate from their mobile with someone outside our company since, at such a time, the product secures the communication as well as the data. With the tool, no confidential data goes outside from the inside of our company. Our company can block data leakage from mobile phones to the outside environment of our organization. The threat detection and response capabilities of the tool benefit the company in scenarios where a user wants to send out some confidential data outside the company through the browser, which would not be possible If the organization uses Check Point Harmony Mobile. The tool shows how our company can secure the user, as well as how we can prevent data leakage from the inside to the outside of the organization. The product provides users with ease of management. It is a simple tool that allows users to configure some of the policies for a user or a user-based group and apply them to the solution. According to Gartner's website, the tool's stability and support as a security provider places it in the leader category. The tool helps respond to emerging corporate threats, especially those who use corporate applications on their personal devices. If you want to secure your corporate applications, you have to adopt Check Point Harmony Mobile. If you use corporate applications on your personal mobile device and you want to secure your applications and data, then you have to use Check Point Harmony Mobile. I rate the tool a nine out of ten.
Account Manager at a tech vendor with 11-50 employees
Reseller
Top 5
2024-02-22T15:03:05Z
Feb 22, 2024
I need to check with the clients in the industry who use Check Point Harmony Mobile and integrate it with other mobile management solutions. I simply managed the product and used it to protect and ensure that scanning processes were in progress while also checking the branch office security, reviewing CVEs, checking the implementation and interventions with the tool. The product offers ease of blocking. The solution also offers integration with Samsung, Microsoft, BlackBerry, and other solutions. The solution can be used for mobile protection and to protect applications. The product is user-friendly for its customers. The solution also offers complete protection and simple management. The tool provides its users with the capacity to prevent malicious activities and phishing threats while also checking the mobile for malware or any other attacks on the device. The solution is easy to deploy and to check for attacks in mobile devices. The product's ability to adapt and offer security against the evolving threat landscape is good because it is easy for a user since there is only one application that they need to use. I rate the overall tool an eight out of ten.
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
It's a very good mobile security solution for protecting phones. It works seamlessly with mobile devices and has good detection capabilities without interrupting your daily phone use. It gives you a lot of visibility into security aspects, including rating every application. On the cloud portal, you can see a security rating for every application on the phone and get low-level details of what that application has access to on your phone. Overall, it's a very good solution. Overall, I would rate the solution a ten out of ten.
Founder - Director (Technology Business) at a tech services company with 1-10 employees
Real User
Top 5
2023-03-09T11:57:00Z
Mar 9, 2023
I give the solution an eight out of ten. The reason we use this solution is primarily due to its availability in the Indian market. This plays a very important role. We then started reviewing many products based on Gartner's magic quadrants, IDC, and other big analytical companies that provide the reports and enough rationale and justification for our decision-making. We prefer to have a look at Moody's ratings for companies' performance. We must first look at the different mobile applications consumer use. We check the type of issue/problem explained is covered by comprehensive writeups/reports/bug reports/FAQs/or on some relabel blogs or reviews matching our problem area, then we take sustainable solutions. I recommend the product, but it has to be fine-tuned and tested by each organization.
I would recommend this solution to others. It is easy to implement, and it is easy to manage. It covers OS protection, network protection, file protection, and application protection. It provides the best protection. I would rate it a nine out of ten.
Information Technology Security Specialist at Telecommunications Services of Trinidad & Tobago Limited (TSTT)
Real User
2022-06-01T17:36:37Z
Jun 1, 2022
Because of its ease of use and the coverage you get for the blurred boundary of mobile devices, Harmony Mobile gives you coverage whether you're using a BYOD, COPE, or COBO framework. I would give Harmony Mobile a rating of nine out of ten.
IT Security Manager at Telecommunications Services of Trinidad & Tobago Limited (TSTT)
Real User
2022-04-11T23:07:08Z
Apr 11, 2022
I rate Check Point Harmony eight out of 10. My advice for enterprises thinking about Harmony is to consider your device type. If your users are predominantly on Android, it's a good solution. If it's primarily iOS users, you might need to deploy an MDM before buying it. An MDM that covers both operating systems is a significant factor to consider. It will determine how easy it is to deploy it and how much control you have over the profiles.
Head of Special Projects Unit-RCJA (SANDETEL) at Junta de Andalucia
User
2021-07-27T09:49:00Z
Jul 27, 2021
As it is deployed in a greater number of devices and the maintenance and management tasks associated with the solution escalate, we will be able to make a future updated review.
Senior Manager at a financial services firm with 10,001+ employees
Real User
2021-03-29T14:34:00Z
Mar 29, 2021
The organization should be clear on the requirements. If it is only for publishing a few web apps, URLs, email, or for a few shared drives, then the solution works absolutely fine. However, it is not a full-fledged MDM solution like VMware AirWatch/Citrix/Blackberry and more. These solutions all provide more MDM capabilities than Capsule.
My advice is that before installing, a complete analysis of the requirements should be carried out. This should be done in order to correctly define user groups and the respective policies from the beginning. This will help to avoid individual policies.
We're both a reseller as well as an end-user of the solution. We're partners with Check Point. The product is in the SaaS environment. I'd recommend the solution. With cybersecurity on the rise due to COVID, and people working on devices from home, off secure networks, it's important to protect your devices, now more than ever. I'd advise that organizations look at this solution and consider implementing it. I'd rate the solution nine out of ten. However, if this solution is right for a company depends on the environment. The capability of the standalone product is very good. When there's a supplier who buys Check Point SandBlast Mobile and incorporates it into their larger solution, I will give it a ten out of ten. Then you have a solution that really fits not only your mobile devices but also the security part of your organization. While, right now, it's a great standalone product, there's a lot of possibilities for it when it integrates with a larger security offering.
This is a very good solution for WFX. In the time that we have been using this product, we can say that there have been no major challenges or issues that we have faced. All of our clients' and employees' feedback is very positive and they are very satisfied with this solution. They are accessing the company resources seamlessly, and we are also planning to better secure our clients. We are evaluating this feature with remote access, and it is effective.
IT Security Manager at Telecommunications Services of Trinidad & Tobago Limited (TSTT)
Real User
2020-09-07T05:57:00Z
Sep 7, 2020
If you have the opportunity, explore competitors to see how their products work. Also, negotiate your price with Check Point as much as possible. The things that stand out from my experience are the ease of the deployment and the education of the end-user regarding data privacy and those types of things. We haven't had many cases of false positives. One that we saw was in the following scenario. Let's say we had an app that came up as a threat and we applied particular rules to quarantine it. After we applied the rules, it showed up on the handset as if the app no longer existed, whereas Sandblast was saying that it wasn't removing the app. It turns out it really wasn't removing it. It just removed the app from reporting within the rule itself. That was a little bit of a challenge in wrapping our heads around it. We worked with Check Point to iron out that issue. So that was a kind of false positive. We had to do it a few times in order to understand that the app was not being removed. The solution claimed to be GDPR compliant and that it was not removing any information or apps from the end-user's handset. We had to check to make sure those features were in place.
Systems Administrator at a wholesaler/distributor with 201-500 employees
Real User
2020-08-05T06:59:00Z
Aug 5, 2020
Having Check Point, at least for us, they implemented two different hosted platforms so that we could have different policies for different users, and that was really helpful to us because we did have privacy concerns from a lot of users. We were able to lock down the network on some devices and other devices we didn't monitor the network. I would rate it a nine out of ten. It's really in-depth for what it does.
IT Security Analyst at a energy/utilities company with 1,001-5,000 employees
Real User
2020-07-28T06:50:00Z
Jul 28, 2020
This solution checks so many of our boxes already, anything new added would just be the icing on the cake. My advice would be to do your homework. Ensure that this is the right product for you. Request a demo and test it out. Don't purchase more licenses than you need because it will become costly. Before this, I didn't realize that there were so many malicious applications out there in the world. So, it was a bit eye-opening to see some of what your phone can access without you even realizing what you were clicking. I would rate this solution a nine out of ten.
I would rate it an eight out of ten. Not a perfect ten because of the pricing and web interface. In the next release, I would like for there to be better integration with other products.
We're a distributor of Check Point and Check Point partners. We have a good understanding of what kind of security our clients need to stay safe in our country. We both use it ourselves, so we can demonstrate the solution, and offer it as a solution to our clients. It's easy because it's on mobile so we can show clients on our phone. I'd advise others to use the solution. It's a modern technology that really combats today's cyber threats on mobile devices. I'd rate the solution nine out of ten. In terms of usage, it's given me everything I need. In Nigeria, we don't have many solutions that do what Check Point does.
Business Tranformation Project Manager at a financial services firm with 501-1,000 employees
Real User
2019-09-24T05:43:00Z
Sep 24, 2019
We had initial problems because our requirements were not well defined. You should define your use case. You should also look into other options to see what else there is out there and what they offer. I would rate it a seven out of ten.
Check Point Harmony Mobile is a unified security solution for user devices and access. It is a complete threat defense solution for mobile devices that prevents cyberattacks and enforces security for remote workers and users. It prevents threats on apps, networks, and OS while enhancing the user experience and preventing the disruption of device performance.
Check Point Harmony Mobile Benefits
Some benefits of Harmony Mobile include:
Advanced app analysis that detects known and...
One of our clients has committed to deploying these features. We are working on deploying Check Point Harmony Mobile and preparing a proposal for the bank. Once they accept, we can proceed, which will enhance Harmony Mobile's security features. Clients are very impressed with Harmony Mobile's threat intelligence capabilities, especially the live, real-time updates. The bank's administrators were particularly amazed by the features of advanced threat intelligence. Harmony Mobile adds numerous security features and simplifies the work for both administrative and security staff. Due to its significant benefits, we encourage other microfinance and financial institutions to adopt this technology. By deploying Harmony Mobile, they gain enhanced security, reduced workload, and overall efficiency, all at a lower cost than other solutions. The technology is proving to be both valuable and cost-effective for users. We recommend that financial institutions use Harmony Mobile because it is highly effective in blocking threats like phishing and malware, which are significant concerns in today's market. Financial institutions are major targets for these attacks, so Harmony Mobile's specialized features are precious. We are encouraging them to adopt this solution for enhanced security. Two engineers are enough for the solution's maintenance. Overall, I rate the solution a nine out of ten.
Regarding AI features, it utilizes threat cloud technology supported by dedicated threat cloud engineers. This infrastructure forms the basis for integrating AI and ML capabilities into the platform. Before buying, you need to have your mobile device ready, such as an Android or iOS device. This makes it very easy to manage your connectivity and security. Overall, I rate the solution a ten out of ten.
Harmony Mobile is highly effective for protecting mobile devices. Much information and data are shared over the cloud using mobile devices and laptops. Many mobile attacks target devices without robust security features, making them vulnerable to malicious files and bots. However, if a device is configured with Check Point Harmony Protection, these threats, including encrypted and malicious files, will be detected and neutralized based on the configuration settings. This protection ensures the safety of business data and other critical information. Additionally, Harmony Mobile is easy to install and requires minimal intervention on mobile devices, making it a very effective security solution. Nowadays, everything is integrated with AI, which benefits various use cases and users. For example, if a malicious code is detected by the device, it should send an alert message to the user. Harmony Mobile can notify the user by saying, "Malicious code detected. Please take appropriate action." This kind of artificial intelligence support ensures that even if users do not see the message, they can be alerted through a voice message. We recommend the solution. Overall, I rate the solution a nine out of ten.
Check Point Harmony Mobile is not so attractive and provides security only for mobile devices. Customers can use Check Point Harmony Mobile to secure their mobile devices, such as Android or Mac smartphones. However, it has less capability than an MDM (Mobile device management). Check Point Harmony Mobile has a good advantage in terms of security posture and security threat detection and prevention. Check Point Harmony Mobile will help prevent 99% of attacks on mobile devices. It is easy to manage Check Point Harmony Mobile. People bring their own devices and connect them to all the other unwanted networks. This causes traffic to flow to these devices from any network source, such as Wi-Fi, LAN, or other public networks. Deploying Check Point Harmony Mobile can ensure the endpoint is sanitized and clean for use at home and the workplace. Overall, I rate the solution a six out of ten.
The tool helped prevent potential security threats whenever some users communicate from their mobile with someone outside our company since, at such a time, the product secures the communication as well as the data. With the tool, no confidential data goes outside from the inside of our company. Our company can block data leakage from mobile phones to the outside environment of our organization. The threat detection and response capabilities of the tool benefit the company in scenarios where a user wants to send out some confidential data outside the company through the browser, which would not be possible If the organization uses Check Point Harmony Mobile. The tool shows how our company can secure the user, as well as how we can prevent data leakage from the inside to the outside of the organization. The product provides users with ease of management. It is a simple tool that allows users to configure some of the policies for a user or a user-based group and apply them to the solution. According to Gartner's website, the tool's stability and support as a security provider places it in the leader category. The tool helps respond to emerging corporate threats, especially those who use corporate applications on their personal devices. If you want to secure your corporate applications, you have to adopt Check Point Harmony Mobile. If you use corporate applications on your personal mobile device and you want to secure your applications and data, then you have to use Check Point Harmony Mobile. I rate the tool a nine out of ten.
I need to check with the clients in the industry who use Check Point Harmony Mobile and integrate it with other mobile management solutions. I simply managed the product and used it to protect and ensure that scanning processes were in progress while also checking the branch office security, reviewing CVEs, checking the implementation and interventions with the tool. The product offers ease of blocking. The solution also offers integration with Samsung, Microsoft, BlackBerry, and other solutions. The solution can be used for mobile protection and to protect applications. The product is user-friendly for its customers. The solution also offers complete protection and simple management. The tool provides its users with the capacity to prevent malicious activities and phishing threats while also checking the mobile for malware or any other attacks on the device. The solution is easy to deploy and to check for attacks in mobile devices. The product's ability to adapt and offer security against the evolving threat landscape is good because it is easy for a user since there is only one application that they need to use. I rate the overall tool an eight out of ten.
It's a very good mobile security solution for protecting phones. It works seamlessly with mobile devices and has good detection capabilities without interrupting your daily phone use. It gives you a lot of visibility into security aspects, including rating every application. On the cloud portal, you can see a security rating for every application on the phone and get low-level details of what that application has access to on your phone. Overall, it's a very good solution. Overall, I would rate the solution a ten out of ten.
It is a very useful tool for mobile security, thus providing security to the entire company.
I would rate the overall solution a ten out of ten.
Overall, I would rate the solution a seven out of ten just because I think that certain aspects could be improved.
I advise others to deploy the solution for advanced automation features. I rate it a nine out of ten.
I give the solution an eight out of ten. The reason we use this solution is primarily due to its availability in the Indian market. This plays a very important role. We then started reviewing many products based on Gartner's magic quadrants, IDC, and other big analytical companies that provide the reports and enough rationale and justification for our decision-making. We prefer to have a look at Moody's ratings for companies' performance. We must first look at the different mobile applications consumer use. We check the type of issue/problem explained is covered by comprehensive writeups/reports/bug reports/FAQs/or on some relabel blogs or reviews matching our problem area, then we take sustainable solutions. I recommend the product, but it has to be fine-tuned and tested by each organization.
The solution is an excellent tool that provides secure connections.
I would recommend this solution to others. It is easy to implement, and it is easy to manage. It covers OS protection, network protection, file protection, and application protection. It provides the best protection. I would rate it a nine out of ten.
Because of its ease of use and the coverage you get for the blurred boundary of mobile devices, Harmony Mobile gives you coverage whether you're using a BYOD, COPE, or COBO framework. I would give Harmony Mobile a rating of nine out of ten.
It is a good tool that can be implemented in the organization and be sure that it will protect your mobile devices.
This is a very good option.
I rate Check Point Harmony eight out of 10. My advice for enterprises thinking about Harmony is to consider your device type. If your users are predominantly on Android, it's a good solution. If it's primarily iOS users, you might need to deploy an MDM before buying it. An MDM that covers both operating systems is a significant factor to consider. It will determine how easy it is to deploy it and how much control you have over the profiles.
As it is deployed in a greater number of devices and the maintenance and management tasks associated with the solution escalate, we will be able to make a future updated review.
Harmony Protect is a great solution and really stands up to threat protection and device defense.
The organization should be clear on the requirements. If it is only for publishing a few web apps, URLs, email, or for a few shared drives, then the solution works absolutely fine. However, it is not a full-fledged MDM solution like VMware AirWatch/Citrix/Blackberry and more. These solutions all provide more MDM capabilities than Capsule.
My advice is that before installing, a complete analysis of the requirements should be carried out. This should be done in order to correctly define user groups and the respective policies from the beginning. This will help to avoid individual policies.
In summary, this is a very good solution that works as expected, although it is very expensive.
We're both a reseller as well as an end-user of the solution. We're partners with Check Point. The product is in the SaaS environment. I'd recommend the solution. With cybersecurity on the rise due to COVID, and people working on devices from home, off secure networks, it's important to protect your devices, now more than ever. I'd advise that organizations look at this solution and consider implementing it. I'd rate the solution nine out of ten. However, if this solution is right for a company depends on the environment. The capability of the standalone product is very good. When there's a supplier who buys Check Point SandBlast Mobile and incorporates it into their larger solution, I will give it a ten out of ten. Then you have a solution that really fits not only your mobile devices but also the security part of your organization. While, right now, it's a great standalone product, there's a lot of possibilities for it when it integrates with a larger security offering.
This is a very good solution for WFX. In the time that we have been using this product, we can say that there have been no major challenges or issues that we have faced. All of our clients' and employees' feedback is very positive and they are very satisfied with this solution. They are accessing the company resources seamlessly, and we are also planning to better secure our clients. We are evaluating this feature with remote access, and it is effective.
If you have the opportunity, explore competitors to see how their products work. Also, negotiate your price with Check Point as much as possible. The things that stand out from my experience are the ease of the deployment and the education of the end-user regarding data privacy and those types of things. We haven't had many cases of false positives. One that we saw was in the following scenario. Let's say we had an app that came up as a threat and we applied particular rules to quarantine it. After we applied the rules, it showed up on the handset as if the app no longer existed, whereas Sandblast was saying that it wasn't removing the app. It turns out it really wasn't removing it. It just removed the app from reporting within the rule itself. That was a little bit of a challenge in wrapping our heads around it. We worked with Check Point to iron out that issue. So that was a kind of false positive. We had to do it a few times in order to understand that the app was not being removed. The solution claimed to be GDPR compliant and that it was not removing any information or apps from the end-user's handset. We had to check to make sure those features were in place.
The solution is modern and easy to onboard.
Having Check Point, at least for us, they implemented two different hosted platforms so that we could have different policies for different users, and that was really helpful to us because we did have privacy concerns from a lot of users. We were able to lock down the network on some devices and other devices we didn't monitor the network. I would rate it a nine out of ten. It's really in-depth for what it does.
This solution checks so many of our boxes already, anything new added would just be the icing on the cake. My advice would be to do your homework. Ensure that this is the right product for you. Request a demo and test it out. Don't purchase more licenses than you need because it will become costly. Before this, I didn't realize that there were so many malicious applications out there in the world. So, it was a bit eye-opening to see some of what your phone can access without you even realizing what you were clicking. I would rate this solution a nine out of ten.
I would rate it an eight out of ten. Not a perfect ten because of the pricing and web interface. In the next release, I would like for there to be better integration with other products.
We're a distributor of Check Point and Check Point partners. We have a good understanding of what kind of security our clients need to stay safe in our country. We both use it ourselves, so we can demonstrate the solution, and offer it as a solution to our clients. It's easy because it's on mobile so we can show clients on our phone. I'd advise others to use the solution. It's a modern technology that really combats today's cyber threats on mobile devices. I'd rate the solution nine out of ten. In terms of usage, it's given me everything I need. In Nigeria, we don't have many solutions that do what Check Point does.
We had initial problems because our requirements were not well defined. You should define your use case. You should also look into other options to see what else there is out there and what they offer. I would rate it a seven out of ten.