Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
As a security solution for devices, it can benefit us in many ways, including providing us with data security, access control, network security, and more.
IT Security Manager at Telecommunications Services of Trinidad & Tobago Limited (TSTT)
Real User
2022-04-11T23:07:08Z
Apr 11, 2022
We like Harmony's ability to encrypt transactions between mobile devices. All the user's transactions are encrypted. That's an excellent feature. We can detect, quarantine, and address any issues in the handset itself.
Senior Information Technologist at a energy/utilities company with 1,001-5,000 employees
User
2021-07-20T20:18:00Z
Jul 20, 2021
The other most valuable service so far has been the assistance provided to us by the Check Point Harmony mobile engineers. They have been so awesome and helpful to us during the setup process.
Senior Manager at a financial services firm with 10,001+ employees
Real User
2021-03-29T14:34:00Z
Mar 29, 2021
Internal applications, data, and folders are published on enrolled mobile devices in a secure way without publishing any of the resources over the internet.
I really like the application scanning feature that scans all of the installed applications, and not only what appears in the add or remove apps, and then reports the results in the console.
Technology consultant at a tech services company with 501-1,000 employees
Real User
2020-08-14T10:31:00Z
Aug 14, 2020
First, the granular visibility of apps & traffic which we get through Check Point SandBlast Mobile are good. We can see each & every installed app & information for each app about severity & risk.
Systems Administrator at a wholesaler/distributor with 201-500 employees
Real User
2020-08-05T06:59:00Z
Aug 5, 2020
It monitors all the URLs that a user goes to on their phone and so we can see what they're looking at and we can limit that. Certain topics are not allowed to be accessed. They're monitoring their apps and they rate them based upon how big of a security risk that individual app is based on their ratings. And so we're able to limit those as well and allow people to have some that may be a low risk, but still a risk, but we may allow that for our users whereas we block medium and high risk.
IT Security Analyst at a energy/utilities company with 1,001-5,000 employees
Real User
2020-07-28T06:50:00Z
Jul 28, 2020
I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious.
The anti-phishing and scanning of SMS are the most valuable aspects of the solution. Sometimes we will get some SMS and they will try to redirect you to malicious links. If you have SandBlast Mobile, it helps you prevent clicking on those malicious links.
Business Tranformation Project Manager at a financial services firm with 501-1,000 employees
Real User
2019-09-24T05:43:00Z
Sep 24, 2019
The usability is the most valuable feature. It's really easy to use. It's a durable solution. I don't have any breaches. It is a good solution from that angle.
Check Point Harmony Mobile is a unified security solution for user devices and access. It is a complete threat defense solution for mobile devices that prevents cyberattacks and enforces security for remote workers and users. It prevents threats on apps, networks, and OS while enhancing the user experience and preventing the disruption of device performance.
Check Point Harmony Mobile Benefits
Some benefits of Harmony Mobile include:
Advanced app analysis that detects known and...
The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS.
The product's initial setup phase is very straightforward.
It is very easy for my company to get information from the product's support team.
I would rate the stability a ten out of ten.
It is a scalable solution. Up to three hundred users are using the solution. I rate the scalability a ten out of ten.
The solution was easy to deploy and provided a useful security enhancement for mobile devices.
Management can see all devices on one panel and easily highlight any devices under threat.
It is a stable solution.
The solution provides us with all the information in the log.
The simple navigation offered by the graphical user interface is excellent.
As a security solution for devices, it can benefit us in many ways, including providing us with data security, access control, network security, and more.
It has several types of DLP policies that can be configured to prevent data leaks.
One of the features that have given us additional value is being able to encrypt and block how data is shared within cell phones or mobile devices.
The environment is managed and administered centrally in Check Point Infinity which provides a lot of stability with its other features.
We have had a lot fewer attacks thanks to this solution.
Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage.
Harmony Mobile's most valuable feature is the variety of capabilities in the platform, including allowing you to track device status.
Harmony Mobile presents many innovative features.
Check Point Harmony Mobile has helped us a lot with security outside the perimeter through its mobile technology.
We like Harmony's ability to encrypt transactions between mobile devices. All the user's transactions are encrypted. That's an excellent feature. We can detect, quarantine, and address any issues in the handset itself.
It has been very easy to implement and deploy.
The other most valuable service so far has been the assistance provided to us by the Check Point Harmony mobile engineers. They have been so awesome and helpful to us during the setup process.
The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly.
Internal applications, data, and folders are published on enrolled mobile devices in a secure way without publishing any of the resources over the internet.
The Check Point SandBlast Mobile solution supports Android and iOS operating systems and allows for integration with Mobile Device Management (MDM).
I really like the application scanning feature that scans all of the installed applications, and not only what appears in the add or remove apps, and then reports the results in the console.
We've found that the product is quite stable.
We have applied MFA so that no one can bypass this security and the users/employees can access their resources very easily, securely, and seamlessly.
We like the URL content filtering, that is one of the most valuable features.
The solution has clients for both Android and Apple devices, so all of our employees' devices are protected.
The most impressive thing is the SSL VPN Portal.
First, the granular visibility of apps & traffic which we get through Check Point SandBlast Mobile are good. We can see each & every installed app & information for each app about severity & risk.
It monitors all the URLs that a user goes to on their phone and so we can see what they're looking at and we can limit that. Certain topics are not allowed to be accessed. They're monitoring their apps and they rate them based upon how big of a security risk that individual app is based on their ratings. And so we're able to limit those as well and allow people to have some that may be a low risk, but still a risk, but we may allow that for our users whereas we block medium and high risk.
I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious.
The most valuable features of this solution are the filtering, interface configuration, and threat management.
The anti-phishing and scanning of SMS are the most valuable aspects of the solution. Sometimes we will get some SMS and they will try to redirect you to malicious links. If you have SandBlast Mobile, it helps you prevent clicking on those malicious links.
The usability is the most valuable feature. It's really easy to use. It's a durable solution. I don't have any breaches. It is a good solution from that angle.