It provides security for mobile devices, safeguarding against threats like unauthorized app installations, VPN access, and other potential security breaches.
I use the solution in my company so that whoever the mobile users are and those who use the corporate applications, we can secure communication from the corporate application to the outside network. My company uses Check Point Harmony Mobile through the browser to secure our applications, as well as to secure the communication between customers and other users.
We wanted the mobile version because the team was distributed after the pandemic. Many people use the solution through their iPhones and Android-based mobile devices. We have installed and implemented the solution on mobile devices to ensure that all the contacts and messages are kept confidential and nothing compromises the data security.
Mobile security, on top of MDM, is the primary use case. Some clients use mobile device management, and we provide additional common security capabilities. This includes vendor locking, where the end solution restricts access to corporate resources based on app management. Check Point does this very well, without issues on mobile devices. There aren't many players in this space, so it's a good, stable solution. You get the results you expect, and it's very quick to set up (around 5 minutes).
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
We used the solution to provide mobile threat defense for mobile devices (predominantly Apple iPhone/iPad). We evaluated numerous solutions from competitors including IBM, Better Mobile, Trend Micro, and others. Check Point is attractive since they are a market-leading firewall vendor and therefore we trust their filtering in terms of web and link protection beyond others who may rely on smaller or third-party feeds. We also found that the breadth of protections including app analysis and WiFi spoofing validation were helpful.
All staff were told we had to use it on work devices - yet were allowed to use it on our personal devices also if we were interested in doing so. I accepted the offer and since doing so I have been able to depend on it to prevent me from accessing malicious Wi-Fi spots when someone pretending to be the carrier's Wi-Fi on the underground nearly had me connecting. It has warned me about and blocked malicious apps, which was more useful when I was on an Android device, however, it still flagged Apple apps for me also - which was a surprise to me as I had assumed these were vetted and controlled by the Apple App Store. Ultimately I feel better having this. I know I can be more laid back about connecting and using apps. The odd time it flags something, it isn't obtrusive - it just lets me know why.
Founder - Director (Technology Business) at a tech services company with 1-10 employees
Real User
Top 5
2023-03-09T11:57:00Z
Mar 9, 2023
We mainly use this solution to detect unwanted traffic or any applications which is installed from a reliable/unreliable source. However, when we install the solution, it begins to behave differently. This software is intelligent enough to understand the user interface and interact with it, determining whether it is doing good or asking for sensitive personal information. This capability must be present in any mobile security app.
Software Tester at a tech services company with 51-200 employees
Real User
Top 10
2023-02-21T18:16:00Z
Feb 21, 2023
We require a tool that could control and monitor mobile devices, which was one of the primary factors in our decision to adopt Check Point Harmony Mobile. With this tool, we had that capability. We were able to shut down a security hole that was harming our company. The user can connect to the company and access corporate data via this technology, enabling them to adhere to a more secure standard. With the help of the Harmony Mobile panel, each mobile has implemented policies that govern access. It is used by us to control mobile connections. It is a cloud-based solution that is installed on Check Point's cloud.
This solution is required for one of the internal needs of our organization. We need the product based on our need for the control of access to corporate resources. We were looking for a solution that allows us to generate the management of mobile network devices and something that could secure all systems in the best way possible, thus giving us a solution that allows for general device management. With this product, our organization will be able to monitor and control the devices used by each of our employees in the organization, which gives us an level of adequate security configuration and allows us to comply with internal policies.
Cloud Engineer at IT Quest Solutions|interglobalmsp
User
Top 5
2023-01-09T14:36:00Z
Jan 9, 2023
We have implemented Check Point Harmony Mobile for a long time in a local environment. Later, we decided to migrate to the Azure cloud and we needed to update the product to be able to integrate it into Azure to be able to enable all the corporate functions of mobile phones from the initial login. Having this tool already in the cloud and integrated into a hybrid cloud, it was possible to have the ability to grant access to corporate applications or data on mobile devices and provide security and confidence to all personnel.
We were busy protecting many of the devices used today by managers, sales teams, and those departments that have to be moving very frequently due to all these uncertainties. We were busy protecting the content, data, and information that was downloaded and all those objects or information that is shared with different departments to be secured in a simple way on the mobile devices to which access was given. For this reason, we have searched for solutions that could allow us to secure the departments' devices that have permissions outside the institution (based on the role or position they have).
In the company, our technical support department uses access to the company remotely to provide help or validations required due to their functions. We required a tool that would provide us with protection for both Mac and Android mobiles outside the perimeter against any type of threat that compromises the company's internal applications. Thanks to this solution, we were able to deploy in internal applications owned by the user without causing any inconvenience.
During this year, many of the users had access to applications and information of the company for which, being mobile devices, they can access the information from anywhere, which had to be covered with security to safeguard the company data, for which we obtained the use of checkpoint harmony mobile to be able to provide this layer of security in a simple way, customers were satisfied with the protection provided, simple policies and monitoring, logs and improvements provided for the security of both the company and the mobiles.
One of the main reasons why the implementation of Check Point Harmony Mobile was chosen was due to the fact that we needed a tool that had control and monitoring over mobile devices. Harmony Mobile provided us with that functionality. In this way, we were able to close a security gap that was affecting our organization. With this solution, users could connect to the organization and access the corporate data and thus comply with a more secure standard. Each mobile has applied policies through the Harmony Mobile panel and control the access
Cloud Support at a tech company with 51-200 employees
User
2022-05-17T04:41:00Z
May 17, 2022
We have used Check Point Harmony Mobile for approximately seven months. It helped us a lot with the mobility of the administrator users, their access to the infrastructure, and important company information. We managed to install a small agent on cell phones to provide more than necessary protection against current vulnerabilities without having great repercussions on mobile performance. That was incredible at the time of implementation.
IT Security Manager at Telecommunications Services of Trinidad & Tobago Limited (TSTT)
Real User
2022-04-11T23:07:08Z
Apr 11, 2022
We use Harmony Mobile to protect our workers' mobile devices. There are about 300 users, including everybody from executives to regular engineers. We plan to increase usage, but we are waiting on an executive decision. They'll decide whether to cut costs or increase use.
Head of Special Projects Unit-RCJA (SANDETEL) at Junta de Andalucia
User
2021-07-27T09:49:00Z
Jul 27, 2021
The goal is to implement Harmony Mobile in the entire fleet of devices of the Government of the Junta de Andalucia. We are talking about a total of about 60,000 terminals. A pilot of the solution has started and it will be implemented in all the terminals that are renewed in the corporate network. These devices correspond to different user profiles and include different browsing patterns and profiles and threat exposure from terminals for M2M communication to advanced user terminals with large traffic quotas.
Senior Information Technologist at a energy/utilities company with 1,001-5,000 employees
User
2021-07-20T20:18:00Z
Jul 20, 2021
The Checkpoint Harmony mobile application is used to protect and eliminate our corporate iPhone users from malicious attempts such as phishing, malware, malicious websites, anti-bots, and harmful applications. Many users receive malicious text messages and emails prompting them for credentials such as corporate active directory details, banking information, or credit card information. It is important to protect our corporate data on all mobile devices by using Check Point's Harmony Mobile Application.
Manager, Infrastructure Services at a energy/utilities company with 1,001-5,000 employees
User
2021-07-20T20:07:00Z
Jul 20, 2021
We were lacking threat detection and device-level protection in our mobile device space. We are an Apple shop exclusively and although Apple does a good job at vetting apps and developers in the Apple App Store, we were lacking protection beyond that. The Harmony Mobile Protect suite really gave us the confidence of protection and real-time threat level safeguards. Users have the confidence to know that the data on their devices is safe. It's a great solution that has a proven track record in the mobile space.
Senior Manager at a financial services firm with 10,001+ employees
Real User
2021-03-29T14:34:00Z
Mar 29, 2021
The primary use case is to enable access to any corporate application hosted on-premises or in the cloud using a mobile device with single sign-on (SSO) capabilities. It provides IT admins capabilities for granting access to corporate applications or data on mobile devices and should be able to securely monitor and manage the mobile devices that access sensitive business data. It includes storing essential information about mobile devices, deciding which apps can be present on the devices, and locating devices. This product should be able to remove corporate applications and data on enrolled devices remotely, known as an enterprise wipe, in case a device is stolen, lost, or if the user leaves the organization. Corporate data should be securely stored on mobile devices and the user should not be able to share data from corporate apps/data to personal storage.
We have implemented Check Point Harmony Mobile due to the numerous phishing attacks that our users were suffering, both by email and by fake text messages, pretending to be the Post Office, Amazon, banks, etc... With this product, we have tried to avoid this type of attack and therefore have our business environment more secure. Currently, we have users in various territorial locations and we were looking for a solution that would allow us to secure their mobile devices with a minimum level of intrusiveness in the terminals. The solution should be for both Android and iOS.
We use SandBlast Mobile, integrated with our MDM for automatic deployment of solutions on our devices. This is for our corporate mobile devices, and also for BYOD (Bring your own device) cases. This works well for the users that want access to our corporate repositories for accessing information. SandBlast is always monitoring their activity including the applications that are installed or they are trying to install, not allowing apps that are not 100% trusted, receiving logging alerts, etc., to take care of our devices and avoid their comprise.
We primarily use the solution for mobile threat defense. We protect our mobile devices with it, due to the fact that SandBlast Mobile detects phishing, malware, et cetera, and all mobile devices.
We are a technology services company and our clients and employees are working from across the world. We have Check Point as a perimeter Firewall device in all our offices and all the devices are with R80.30 with the latest hotfix. During this Covid-19 pandemic, we have enabled Check Point Remote access for our employees, so that they can access the office resources from their mobile device, home desktop, or laptop. Now, they are able to access our resources from their own machine or remote devices and we can say that our employees are doing work from anywhere.
IT Security Manager at Telecommunications Services of Trinidad & Tobago Limited (TSTT)
Real User
2020-09-07T05:57:00Z
Sep 7, 2020
One reason we use it is that we didn't really have any control on the mobile side. We do have Google MDM, but we didn't have a solution like the one Check Point offers to protect mobile devices. Even with Google MDM, there is not much we can do without having something that can enforce security on the endpoint. So there was a gap and that security gap was our main use case.
Having the Check Point SandBlast Mobile application installed is mandatory for any smartphone or tablet PC provided to the employees by our company, and for any BYOD device if it is going to be connected to the corporate network. Currently, there are about 500 devices that are running on both Android and Apple devices. We decided not to self-host the management center, and onboarded the cloud management solution provided by the Check Point. This runs in their own datacenter, with the SLA provided.
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Check Point Mobile Access software blade is one of the numerous blades activated on the NGFWs and serves for providing connectivity to the datacenter for the employees.
Technology consultant at a tech services company with 501-1,000 employees
Real User
2020-08-14T10:31:00Z
Aug 14, 2020
Our primary use case for using Check Point SandBlast Mobile solution was for securing (Bring your own device) BYOD mobile devices of users. With Check Point SandBlast Mobile we get full visibility of users' mobile activity, like installed apps. Users are only allowed to use permitted applications. We also have blacklisted some malicious URLs. Check Point SandBlast Mobile provides flexibility to BYOD users to access the restricted website as per the time specified by the company policy.
Systems Administrator at a wholesaler/distributor with 201-500 employees
Real User
2020-08-05T06:59:00Z
Aug 5, 2020
We use SandBlast Mobile to secure our BYOD devices for employees that want to have access to corporate information, as we require them to have SandBlast in order to do that. It is always monitoring their text messages for malicious stuff or their apps, to see if there's anything malicious, and then we receive the logging and alerts so we are able to react and take care of our users' security.
IT Security Analyst at a energy/utilities company with 1,001-5,000 employees
Real User
2020-07-28T06:50:00Z
Jul 28, 2020
The primary use case of this solution is for mobile threat prevention. We integrate it with an MDM and push it to our managed devices to protect the company's phone.
We primarily use the solution for mobile security, which is important in our part of the world. Using SandBlast Mobile, we're able to prove if a traditional antivirus has become embedded in some devices. It helps us to combat cybercrime. We're able to control things like SMS phishing and check for malicious links and malicious application downloads. For example, if my son downloads Angry Birds, and we don't know if the version he downloaded was malicious, we can trigger SandBlast to check it.
Business Tranformation Project Manager at a financial services firm with 501-1,000 employees
Real User
2019-09-24T05:43:00Z
Sep 24, 2019
We use the private cloud deployment model. We use AWS as our cloud provider. Our primary use case is for my users who are mobile. If I want them to connect from wherever they are and build connections to the emails. It's for my management that are usually very mobile.
Check Point Harmony Mobile is a unified security solution for user devices and access. It is a complete threat defense solution for mobile devices that prevents cyberattacks and enforces security for remote workers and users. It prevents threats on apps, networks, and OS while enhancing the user experience and preventing the disruption of device performance.
Check Point Harmony Mobile Benefits
Some benefits of Harmony Mobile include:
Advanced app analysis that detects known and...
It provides security for mobile devices, safeguarding against threats like unauthorized app installations, VPN access, and other potential security breaches.
We use the solution in the hospitality and aviation domains.
Many clients have the product on their Android and iOS cell phones.
I use the solution in my company so that whoever the mobile users are and those who use the corporate applications, we can secure communication from the corporate application to the outside network. My company uses Check Point Harmony Mobile through the browser to secure our applications, as well as to secure the communication between customers and other users.
We wanted the mobile version because the team was distributed after the pandemic. Many people use the solution through their iPhones and Android-based mobile devices. We have installed and implemented the solution on mobile devices to ensure that all the contacts and messages are kept confidential and nothing compromises the data security.
Mobile security, on top of MDM, is the primary use case. Some clients use mobile device management, and we provide additional common security capabilities. This includes vendor locking, where the end solution restricts access to corporate resources based on app management. Check Point does this very well, without issues on mobile devices. There aren't many players in this space, so it's a good, stable solution. You get the results you expect, and it's very quick to set up (around 5 minutes).
We use it for protecting mobile devices and have a few cases for integrating HEM mobile as it is the gate to some payment applications.
We used the solution to provide mobile threat defense for mobile devices (predominantly Apple iPhone/iPad). We evaluated numerous solutions from competitors including IBM, Better Mobile, Trend Micro, and others. Check Point is attractive since they are a market-leading firewall vendor and therefore we trust their filtering in terms of web and link protection beyond others who may rely on smaller or third-party feeds. We also found that the breadth of protections including app analysis and WiFi spoofing validation were helpful.
All staff were told we had to use it on work devices - yet were allowed to use it on our personal devices also if we were interested in doing so. I accepted the offer and since doing so I have been able to depend on it to prevent me from accessing malicious Wi-Fi spots when someone pretending to be the carrier's Wi-Fi on the underground nearly had me connecting. It has warned me about and blocked malicious apps, which was more useful when I was on an Android device, however, it still flagged Apple apps for me also - which was a surprise to me as I had assumed these were vetted and controlled by the Apple App Store. Ultimately I feel better having this. I know I can be more laid back about connecting and using apps. The odd time it flags something, it isn't obtrusive - it just lets me know why.
If you're looking for ways to ensure that your mobile is phishing-free and malware-free, then Harmony Mobile is a good choice.
We use the solution for security purposes. It helps us scan mobile apps for malware prevention.
We mainly use this solution to detect unwanted traffic or any applications which is installed from a reliable/unreliable source. However, when we install the solution, it begins to behave differently. This software is intelligent enough to understand the user interface and interact with it, determining whether it is doing good or asking for sensitive personal information. This capability must be present in any mobile security app.
We require a tool that could control and monitor mobile devices, which was one of the primary factors in our decision to adopt Check Point Harmony Mobile. With this tool, we had that capability. We were able to shut down a security hole that was harming our company. The user can connect to the company and access corporate data via this technology, enabling them to adhere to a more secure standard. With the help of the Harmony Mobile panel, each mobile has implemented policies that govern access. It is used by us to control mobile connections. It is a cloud-based solution that is installed on Check Point's cloud.
This solution is required for one of the internal needs of our organization. We need the product based on our need for the control of access to corporate resources. We were looking for a solution that allows us to generate the management of mobile network devices and something that could secure all systems in the best way possible, thus giving us a solution that allows for general device management. With this product, our organization will be able to monitor and control the devices used by each of our employees in the organization, which gives us an level of adequate security configuration and allows us to comply with internal policies.
We have implemented Check Point Harmony Mobile for a long time in a local environment. Later, we decided to migrate to the Azure cloud and we needed to update the product to be able to integrate it into Azure to be able to enable all the corporate functions of mobile phones from the initial login. Having this tool already in the cloud and integrated into a hybrid cloud, it was possible to have the ability to grant access to corporate applications or data on mobile devices and provide security and confidence to all personnel.
We were busy protecting many of the devices used today by managers, sales teams, and those departments that have to be moving very frequently due to all these uncertainties. We were busy protecting the content, data, and information that was downloaded and all those objects or information that is shared with different departments to be secured in a simple way on the mobile devices to which access was given. For this reason, we have searched for solutions that could allow us to secure the departments' devices that have permissions outside the institution (based on the role or position they have).
In the company, our technical support department uses access to the company remotely to provide help or validations required due to their functions. We required a tool that would provide us with protection for both Mac and Android mobiles outside the perimeter against any type of threat that compromises the company's internal applications. Thanks to this solution, we were able to deploy in internal applications owned by the user without causing any inconvenience.
During this year, many of the users had access to applications and information of the company for which, being mobile devices, they can access the information from anywhere, which had to be covered with security to safeguard the company data, for which we obtained the use of checkpoint harmony mobile to be able to provide this layer of security in a simple way, customers were satisfied with the protection provided, simple policies and monitoring, logs and improvements provided for the security of both the company and the mobiles.
We are mainly using it to manage mobile connections. It is a cloud solution, and it is deployed on the Check Point cloud.
I use Harmony Mobile integrated with our MDM platform to manage mobile devices.
One of the main reasons why the implementation of Check Point Harmony Mobile was chosen was due to the fact that we needed a tool that had control and monitoring over mobile devices. Harmony Mobile provided us with that functionality. In this way, we were able to close a security gap that was affecting our organization. With this solution, users could connect to the organization and access the corporate data and thus comply with a more secure standard. Each mobile has applied policies through the Harmony Mobile panel and control the access
We have used Check Point Harmony Mobile for approximately seven months. It helped us a lot with the mobility of the administrator users, their access to the infrastructure, and important company information. We managed to install a small agent on cell phones to provide more than necessary protection against current vulnerabilities without having great repercussions on mobile performance. That was incredible at the time of implementation.
We use Harmony Mobile to protect our workers' mobile devices. There are about 300 users, including everybody from executives to regular engineers. We plan to increase usage, but we are waiting on an executive decision. They'll decide whether to cut costs or increase use.
The goal is to implement Harmony Mobile in the entire fleet of devices of the Government of the Junta de Andalucia. We are talking about a total of about 60,000 terminals. A pilot of the solution has started and it will be implemented in all the terminals that are renewed in the corporate network. These devices correspond to different user profiles and include different browsing patterns and profiles and threat exposure from terminals for M2M communication to advanced user terminals with large traffic quotas.
The Checkpoint Harmony mobile application is used to protect and eliminate our corporate iPhone users from malicious attempts such as phishing, malware, malicious websites, anti-bots, and harmful applications. Many users receive malicious text messages and emails prompting them for credentials such as corporate active directory details, banking information, or credit card information. It is important to protect our corporate data on all mobile devices by using Check Point's Harmony Mobile Application.
We were lacking threat detection and device-level protection in our mobile device space. We are an Apple shop exclusively and although Apple does a good job at vetting apps and developers in the Apple App Store, we were lacking protection beyond that. The Harmony Mobile Protect suite really gave us the confidence of protection and real-time threat level safeguards. Users have the confidence to know that the data on their devices is safe. It's a great solution that has a proven track record in the mobile space.
The primary use case is to enable access to any corporate application hosted on-premises or in the cloud using a mobile device with single sign-on (SSO) capabilities. It provides IT admins capabilities for granting access to corporate applications or data on mobile devices and should be able to securely monitor and manage the mobile devices that access sensitive business data. It includes storing essential information about mobile devices, deciding which apps can be present on the devices, and locating devices. This product should be able to remove corporate applications and data on enrolled devices remotely, known as an enterprise wipe, in case a device is stolen, lost, or if the user leaves the organization. Corporate data should be securely stored on mobile devices and the user should not be able to share data from corporate apps/data to personal storage.
We have implemented Check Point Harmony Mobile due to the numerous phishing attacks that our users were suffering, both by email and by fake text messages, pretending to be the Post Office, Amazon, banks, etc... With this product, we have tried to avoid this type of attack and therefore have our business environment more secure. Currently, we have users in various territorial locations and we were looking for a solution that would allow us to secure their mobile devices with a minimum level of intrusiveness in the terminals. The solution should be for both Android and iOS.
We use SandBlast Mobile, integrated with our MDM for automatic deployment of solutions on our devices. This is for our corporate mobile devices, and also for BYOD (Bring your own device) cases. This works well for the users that want access to our corporate repositories for accessing information. SandBlast is always monitoring their activity including the applications that are installed or they are trying to install, not allowing apps that are not 100% trusted, receiving logging alerts, etc., to take care of our devices and avoid their comprise.
We primarily use the solution for mobile threat defense. We protect our mobile devices with it, due to the fact that SandBlast Mobile detects phishing, malware, et cetera, and all mobile devices.
We are a technology services company and our clients and employees are working from across the world. We have Check Point as a perimeter Firewall device in all our offices and all the devices are with R80.30 with the latest hotfix. During this Covid-19 pandemic, we have enabled Check Point Remote access for our employees, so that they can access the office resources from their mobile device, home desktop, or laptop. Now, they are able to access our resources from their own machine or remote devices and we can say that our employees are doing work from anywhere.
One reason we use it is that we didn't really have any control on the mobile side. We do have Google MDM, but we didn't have a solution like the one Check Point offers to protect mobile devices. Even with Google MDM, there is not much we can do without having something that can enforce security on the endpoint. So there was a gap and that security gap was our main use case.
Having the Check Point SandBlast Mobile application installed is mandatory for any smartphone or tablet PC provided to the employees by our company, and for any BYOD device if it is going to be connected to the corporate network. Currently, there are about 500 devices that are running on both Android and Apple devices. We decided not to self-host the management center, and onboarded the cloud management solution provided by the Check Point. This runs in their own datacenter, with the SLA provided.
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Check Point Mobile Access software blade is one of the numerous blades activated on the NGFWs and serves for providing connectivity to the datacenter for the employees.
Our primary use case for using Check Point SandBlast Mobile solution was for securing (Bring your own device) BYOD mobile devices of users. With Check Point SandBlast Mobile we get full visibility of users' mobile activity, like installed apps. Users are only allowed to use permitted applications. We also have blacklisted some malicious URLs. Check Point SandBlast Mobile provides flexibility to BYOD users to access the restricted website as per the time specified by the company policy.
We use SandBlast Mobile to secure our BYOD devices for employees that want to have access to corporate information, as we require them to have SandBlast in order to do that. It is always monitoring their text messages for malicious stuff or their apps, to see if there's anything malicious, and then we receive the logging and alerts so we are able to react and take care of our users' security.
The primary use case of this solution is for mobile threat prevention. We integrate it with an MDM and push it to our managed devices to protect the company's phone.
We primarily use the solution for mobile security, which is important in our part of the world. Using SandBlast Mobile, we're able to prove if a traditional antivirus has become embedded in some devices. It helps us to combat cybercrime. We're able to control things like SMS phishing and check for malicious links and malicious application downloads. For example, if my son downloads Angry Birds, and we don't know if the version he downloaded was malicious, we can trigger SandBlast to check it.
We use the private cloud deployment model. We use AWS as our cloud provider. Our primary use case is for my users who are mobile. If I want them to connect from wherever they are and build connections to the emails. It's for my management that are usually very mobile.