Anuraj Nair - PeerSpot reviewer
Presales Engineer at SNSIN
Reseller
Top 5Leaderboard
Provides good threat detection and prevention, but it lacks MDM capabilities present in other MDM products
Pros and Cons
  • "The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS."
  • "Check Point Harmony Mobile lacks MDM capabilities, which are present in other MDM products, like IBM Security MaaS360, AirWatch, and Google Workspace."

What is most valuable?

The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS. Check Point Harmony Mobile is a good option for users who want only incoming and outgoing traffic security for their Android and iOS devices.

What needs improvement?

Check Point Harmony Mobile lacks MDM capabilities, which are present in other MDM products, like IBM Security MaaS360, AirWatch, and Google Workspace.

For how long have I used the solution?


What do I think about the stability of the solution?

Check Point Harmony Mobile is a stable solution.

I rate the solution a nine out of ten for stability.

Buyer's Guide
Check Point Harmony Mobile
May 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
771,170 professionals have used our research since 2012.

What do I think about the scalability of the solution?

Around two to three customers are using Check Point Harmony Mobile.

I rate the solution’s scalability a six out of ten.

How are customer service and support?

The technical support team's response time should be faster. Also, the engineers should come up with a proper solution plan, which is currently missing.

Which solution did I use previously and why did I switch?

I have previously worked with Azure MDM, IBM Security MaaS360, and VMware AirWatch. The solution has better threat detection capabilities and catch rates than other mobile security vendors.

What about the implementation team?

The solution’s deployment takes around five minutes. To deploy the solution, you need to deploy the agent to the endpoint Android. It will then be listed in the Infinity portal, and you can start configuring.

You need to download the agent from the Infinity portal, put it on your mobile, install it, and activate it. It will be reflected in the Infinity portal, and you can then configure the policy.

What was our ROI?

Check Point Harmony Mobile can help you with regulation compliance. Customers will secure all infrastructure that belongs to them because they are managing that infrastructure. However, they don't have any control over mobile devices connected to their network. Any threats to those particular devices can also affect your infrastructure if they are connected without any protection.

Check Point Harmony Mobile will ensure the device is clean in such cases. Even if the device gets connected to your infrastructure, there won't be any infection or any impact happening to your infrastructure.

What's my experience with pricing, setup cost, and licensing?

Users have to pay a yearly licensing fee for each device, which is cheap.

What other advice do I have?

Check Point Harmony Mobile is not so attractive and provides security only for mobile devices. Customers can use Check Point Harmony Mobile to secure their mobile devices, such as Android or Mac smartphones. However, it has less capability than an MDM (Mobile device management).

Check Point Harmony Mobile has a good advantage in terms of security posture and security threat detection and prevention. Check Point Harmony Mobile will help prevent 99% of attacks on mobile devices. It is easy to manage Check Point Harmony Mobile.

People bring their own devices and connect them to all the other unwanted networks. This causes traffic to flow to these devices from any network source, such as Wi-Fi, LAN, or other public networks. Deploying Check Point Harmony Mobile can ensure the endpoint is sanitized and clean for use at home and the workplace.

Overall, I rate the solution a six out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
Flag as inappropriate
PeerSpot user
Avesh Kumar - PeerSpot reviewer
Software Tester at a tech services company with 51-200 employees
Real User
Top 10
Works with mobile, protects against vulnerabilities, and offers real-time scanning
Pros and Cons
  • "The simple navigation offered by the graphical user interface is excellent."
  • "The ability to integrate local and cloud technologies to create a hybrid scenario would be an upgrade."

What is our primary use case?

We require a tool that could control and monitor mobile devices, which was one of the primary factors in our decision to adopt Check Point Harmony Mobile. With this tool, we had that capability. We were able to shut down a security hole that was harming our company. The user can connect to the company and access corporate data via this technology, enabling them to adhere to a more secure standard. With the help of the Harmony Mobile panel, each mobile has implemented policies that govern access. It is used by us to control mobile connections. It is a cloud-based solution that is installed on Check Point's cloud.

How has it helped my organization?

Prior to having this solution, our users were vulnerable to infections of any kind on tablets and mobile devices used for business. We have reduced these dangers by utilizing Harmony Mobile's security, which helps both the user and the administrator. With the help of Check Point Harmony, mobile users also have the same level of protection as the business's computers and laptops do and users are also secure to use on both iOS and Android. Observe Point Mobile devices used by employees are protected from dangerous software and attacks on their network or operating system.

What is most valuable?

Check Point's Sandblast Mobile solution integrates with Mobile Device Management and supports Android and iOS operating systems. Two profiles are created for each mobile device when it is configured. There are two types of profiles - personal and professional - and various security guidelines can be applied to each. 

Real-time scanning is only one of the amazing capabilities offered by this tool. 

The simple navigation offered by the graphical user interface is excellent. 

We value the centralization it brings about.

What needs improvement?

The tool is excellent for security purposes, and it gives a lot of information. That said, there needs to be some improvement in everything related to administration and assistance. 

The ability to integrate local and cloud technologies to create a hybrid scenario would be an upgrade. 

Making this tool compatible with Google MDM is one of the enhancements that must be made. 

The increased load on an outdated terminal, which slows them down, is another item to consider. 

It would be preferable if they could incorporate application vulnerability management.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony Mobile
May 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
771,170 professionals have used our research since 2012.
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Real User
Top 5Leaderboard
Offers ease of management and can be installed effortlessly
Pros and Cons
  • "The product's initial setup phase is very straightforward."
  • "At times, when configuring policies, the tool takes some time to apply the policy."

What is our primary use case?

I use the solution in my company so that whoever the mobile users are and those who use the corporate applications, we can secure communication from the corporate application to the outside network. My company uses Check Point Harmony Mobile through the browser to secure our applications, as well as to secure the communication between customers and other users.

What is most valuable?

The most effective features of the product stem from its ability to deal with areas like data security and application security while also being useful to users who use mobiles in roaming mode and those who use a personal mobile phone with corporate applications in it.

What needs improvement?

At times, when configuring policies, the tool takes some time to apply the policy. If I configure a new policy and apply it to the management console, it may take time. The product should work on policy enforcement so that users can quickly enforce the policies within a fraction of a second.

For how long have I used the solution?

I have been using Check Point Harmony Mobile for three years.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a nine out of ten. Some customers of the tool face some issues in their environment with respect to policy enforcement.

What do I think about the scalability of the solution?

It is a very easily scalable solution. 

My company deals with a very limited set of customers of the product. The tool's competitors have been very aggressive with the mobile browser part, especially the ones offering MDM solutions. Those who use firewall products from Check Point are very happy to acquire and use Check Point Harmony Mobile.

How are customer service and support?

As and when required, the solution's technical support helps users with troubleshooting. The solution's technical support is good, and it responds quickly.

How was the initial setup?

The product's initial setup phase is very straightforward.

For the product's deployment phase, you just need to install the agent to the end user and configure the policy on the cloud management console.

The solution's deployment phase is a one-day task.

What was our ROI?

In terms of ROI, the product helps secure your application, mobile, and data.

What's my experience with pricing, setup cost, and licensing?

There is a need to make yearly payments towards the licensing costs attached to the product. You can opt for a one-year, three-year, or five-year license. There is a separate team that handles the pricing part of the product, and depending on the customers or order quantity they handle, I believe that 60 or 70 percent discounts on the prices are offered. There are no additional costs attached to the product.

What other advice do I have?

The tool helped prevent potential security threats whenever some users communicate from their mobile with someone outside our company since, at such a time, the product secures the communication as well as the data. With the tool, no confidential data goes outside from the inside of our company. Our company can block data leakage from mobile phones to the outside environment of our organization.

The threat detection and response capabilities of the tool benefit the company in scenarios where a user wants to send out some confidential data outside the company through the browser, which would not be possible If the organization uses Check Point Harmony Mobile. The tool shows how our company can secure the user, as well as how we can prevent data leakage from the inside to the outside of the organization.

The product provides users with ease of management. It is a simple tool that allows users to configure some of the policies for a user or a user-based group and apply them to the solution.

According to Gartner's website, the tool's stability and support as a security provider places it in the leader category.

The tool helps respond to emerging corporate threats, especially those who use corporate applications on their personal devices. If you want to secure your corporate applications, you have to adopt Check Point Harmony Mobile.

If you use corporate applications on your personal mobile device and you want to secure your applications and data, then you have to use Check Point Harmony Mobile.

I rate the tool a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Jessica Muñoz - PeerSpot reviewer
Account Manager at a tech vendor with 11-50 employees
Reseller
Top 5
User-friendly and offers complete protection to mobile devices
Pros and Cons
  • "It is very easy for my company to get information from the product's support team."
  • "There are certain shortcomings in the integration capabilities that a product offers."

What is most valuable?

I like the product's ability to offer IPS protections for mobile security.

What needs improvement?

There are certain shortcomings in the integration capabilities that a product offers. In the future, I would like to see the product offer more integration features.

For how long have I used the solution?

I have experience with Check Point Harmony Mobile. My company has a partnership with Check Point.

What do I think about the stability of the solution?

Considering that the product is easy to use, user-friendly, and offers complete protection, I rate the product's stability an eight out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a nine out of ten.

How are customer service and support?

It is very easy for my company to get information from the product's support team. I rate the technical support a nine out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The product's deployment is easy. You only deploy the tool on the mobile device for the client or customer who wants to use it.

What's my experience with pricing, setup cost, and licensing?

When I purchased the product for one of our company's clients, I realized that the price of the product was competitive.

What other advice do I have?

I need to check with the clients in the industry who use Check Point Harmony Mobile and integrate it with other mobile management solutions. I simply managed the product and used it to protect and ensure that scanning processes were in progress while also checking the branch office security, reviewing CVEs, checking the implementation and interventions with the tool. The product offers ease of blocking. The solution also offers integration with Samsung, Microsoft, BlackBerry, and other solutions. The solution can be used for mobile protection and to protect applications.

The product is user-friendly for its customers. The solution also offers complete protection and simple management. The tool provides its users with the capacity to prevent malicious activities and phishing threats while also checking the mobile for malware or any other attacks on the device.

The solution is easy to deploy and to check for attacks in mobile devices.

The product's ability to adapt and offer security against the evolving threat landscape is good because it is easy for a user since there is only one application that they need to use.

I rate the overall tool an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Flag as inappropriate
PeerSpot user
Cyber Security Consultant at Wirespeed
Reseller
Top 5
Works seamlessly with mobile devices and has good detection capabilities without interrupting your daily phone use
Pros and Cons
  • "I would rate the stability a ten out of ten."
  • "While it's great, there's always room for improvement. Adding capabilities for automatic deployment in an enterprise environment would be useful."

What is our primary use case?

Mobile security, on top of MDM, is the primary use case. Some clients use mobile device management, and we provide additional common security capabilities. This includes vendor locking, where the end solution restricts access to corporate resources based on app management. Check Point does this very well, without issues on mobile devices. There aren't many players in this space, so it's a good, stable solution. You get the results you expect, and it's very quick to set up (around 5 minutes).

What needs improvement?

While it's great, there's always room for improvement. Adding capabilities for automatic deployment in an enterprise environment would be useful. Also, the ability to see licenses per mobile device would be handy.

So, in future releases, the ability to see the environment and licensing per device would be good.

For how long have I used the solution?

I have been working with this solution for three years. It's the best solution I have at the moment.

What do I think about the stability of the solution?

I would rate the stability a ten out of ten. 

What do I think about the scalability of the solution?

It is a scalable solution. I would rate the scalability a ten out of ten. We have enterprise-level customers. 

How are customer service and support?

The solution doesn't require much support. 

How was the initial setup?

I would rate my experience with the initial setup a ten out of ten, where one is difficult and ten is easy.

The management console is on the cloud. The deployment takes around five to ten minutes. 

What about the implementation team?

For the deployment process, you basically create your account in the Harmony Mobile portal (Infiniti Portal on Check Point). 

Then, you configure the user and send them an email containing a QR code for app installation instructions. They download the app from the App Store or Play Store, scan the code, and it configures itself, appearing on the cloud portal. Very quick.

What's my experience with pricing, setup cost, and licensing?

The price is okay. Per user, it should be something like five or ten dollars. But, we usually get discounts that drive the cost down.

What other advice do I have?

It's a very good mobile security solution for protecting phones. It works seamlessly with mobile devices and has good detection capabilities without interrupting your daily phone use. It gives you a lot of visibility into security aspects, including rating every application. 

On the cloud portal, you can see a security rating for every application on the phone and get low-level details of what that application has access to on your phone. Overall, it's a very good solution.

Overall, I would rate the solution a ten out of ten. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:
Flag as inappropriate
PeerSpot user
Dave Eversden - PeerSpot reviewer
Managing Director at Forever Group
MSP
Top 10
Enhances security and is easy to deploy and configure
Pros and Cons
  • "The solution was easy to deploy and provided a useful security enhancement for mobile devices."
  • "We had some issues with loopback VPN DNS filtering stopping working periodically, however, this is something that we could probably iron out with support."

What is our primary use case?

We used the solution to provide mobile threat defense for mobile devices (predominantly Apple iPhone/iPad). We evaluated numerous solutions from competitors including IBM, Better Mobile, Trend Micro, and others. Check Point is attractive since they are a market-leading firewall vendor and therefore we trust their filtering in terms of web and link protection beyond others who may rely on smaller or third-party feeds. We also found that the breadth of protections including app analysis and WiFi spoofing validation were helpful.

How has it helped my organization?

The solution was easy to deploy and provided a useful security enhancement for mobile devices. It allowed us to extend filtering technologies that we would generally expect to be available within an edge firewall to mobile devices - such as web content filtering and URL protection. With the prevalence of mobile phishing (including SMS phish which circumvents email filters), we felt that this was a useful security layer. Check Point is also a provider that we felt we could trust when adding products to our security stack.

What is most valuable?

The integration with Microsoft Intune scoped to the security group made deployment a breeze. Certainly, once the initial configuration was in place the process was smooth and devices began to appear in the Check Point Harmony portal automatically. Adding web and link protection was considered to be a valuable security enhancement and is a key benefit of using mobile threat defense. The fact that the product can also highlight changes in public IP addresses for known corporate WiFi SSIDs also helps to alert or prevent spoofing of internal WiFi networks.

What needs improvement?

We had some issues with loopback VPN DNS filtering stopping working periodically, however, this is something that we could probably iron out with support. In the end, we ended up disabling this feature and using Umbrella (which we also use). It is of course highly possible that we could have addressed this with their support team but in our scenario, it was easier to disable the functionality and run with a separate product that we already had available. Certainly, everything else worked fine and the alerts were very useful.

For how long have I used the solution?

I first used the solution several years ago.

What do I think about the stability of the solution?

We had no stability issues with the solution save for the periodic VPN loopback internet outages with iOS agents that I'm sure could be resolved with support.

What do I think about the scalability of the solution?

We don't foresee any obvious limits with the scalability of the solution for all but the largest of organizations.

How are customer service and support?

Support engineers were friendly and communicable.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We had previously trialed better mobile but the minimum onboarding/barrier of entry costs were too steep. We are also more familiar with the Check Point brand. We've also used Trend Micro before yet found the feature set for iOS devices to be slim.

How was the initial setup?

The solution has a straightforward setup - especially with Intune integration.

What about the implementation team?

We did an in-house implementation.

What was our ROI?

ROI is impossible to compute.

What's my experience with pricing, setup cost, and licensing?

Setup and recurring costs seemed reasonable and in line with other Check Point products.

Which other solutions did I evaluate?

We did evaluate IBM, Trend Micro, Better Mobile, and others.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Easy to use with great URL filtering and protects from unauthorized downloads
Pros and Cons
  • "Harmony Mobile presents many innovative features."
  • "One of the improvements that can be made is that they become compatible with Google MDM."

What is our primary use case?

One of the main reasons why the implementation of Check Point Harmony Mobile was chosen was due to the fact that we needed a tool that had control and monitoring over mobile devices. Harmony Mobile provided us with that functionality. In this way, we were able to close a security gap that was affecting our organization. 

With this solution, users could connect to the organization and access the corporate data and thus comply with a more secure standard. 

Each mobile has applied policies through the Harmony Mobile panel and control the access

How has it helped my organization?

One of the great improvements that Harmony Mobile gave us is that it was possible to protect the mobile devices of each one of the users and thus not depend on the users to implement adequate security themselves. With a simple mistake or moment of carelessness, a user can accidentally cause great damage to sensitive company information.

With Harmony Mobile, users do not worry. It transmits all the security to this tool. Currently, with what has been happening in the world with Covid, many workers are working from home and with this solution, we can limit third-party access to devices.

It's important for it to have the main functions of Mobile Device Management (MDM), such as task automation, automatic application updates, they should also improve compatibility with other mobile device management (MDM) products on the market, ensuring correct operation between SandBlast Mobile and MDM. It's important for Point Harmony Mobile to be included in a broader offering so that it is not just a standalone product.

What is most valuable?

Harmony Mobile introduces many innovative features. One of them is URL filtering, which is very valuable in this tool. It offers to filter apps, protect privacy, and reject malicious or unauthorized downloads. It allows us to get an idea of how it protects the application through certain security levels that are threats, network applications and devices. Its administration and configuration is very simple. It is easy to use with its friendly interface, the solutions helped a lot to the security of the company.

What needs improvement?

Harmony Mobile is one of the first tools that we implemented in the organization when we entered into the protection of mobile devices. For many years all our staff did not have any restrictions on mobile devices. 

An improvement would be the compatibility of linking local and cloud solutions to create a hybrid scenario. They should allow adding a SIEM for additional functions. That said, in relation to the characteristics that it currently presents, it satisfactorily complies with the security of mobile devices.

One of the improvements that can be made is that they become compatible with Google MDM. 

When it comes to scanning the network, sometimes my SSI ID does not appear; it would also be a great plus if they could make a unified console where you can manage several Check Point products and thus not be opening different consoles to manage different products.

For how long have I used the solution?

I have been using about three years.

What do I think about the stability of the solution?

The stability of the product is very good and it generates an excellent amount of monitoring reports.

What do I think about the scalability of the solution?

It is a very scalable tool.

How are customer service and support?

With the support, we have had good and bad experiences. Sometimes they take time to respond. Sometimes they give an accurate solution to the error presented.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

A mobile device solution had not previously been implemented.

How was the initial setup?

One of the parts that worried us was its configuration and administration, however, it was extremely simple.

What about the implementation team?

The installation was done with a seller who demonstrated his ability and handling of the tool.

What was our ROI?

The investment made with this tool is very good. The information will be guaranteed, therefore, every penny invested is a good investment.

What's my experience with pricing, setup cost, and licensing?

The cost is affordable. It competes with other technologies and the installation is easy to implement.

Which other solutions did I evaluate?

We have not opted for other technologies since we have implemented the Check Point line into our company.

What other advice do I have?

It is a good tool that can be implemented in the organization and be sure that it will protect your mobile devices.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Top 5Leaderboard
Good protection and integration capabilities with an intuitive implementation
Pros and Cons
  • "The use and management of our portal is easy."
  • "We know that for many companies, the management and administration of device and data security have been complex."

What is our primary use case?

Mobile device security is a top concern for our company today - and for good reason. In the new normal, remote workers increasingly access corporate data from their mobile devices, which means the company is more exposed to data breaches than ever before.

This product keeps corporate information safe by protecting employee mobile devices from all areas of attack: applications, networks, and operating systems. Check Point Harmony Mobile has enabled easy-to-manage, scalable security for any mobility management team.

How has it helped my organization?

Our companies have seen the need to give their collaborators the flexibility to work remotely yet the number of cyberattacks has increased in recent years due to the complexity of the administration and visibility of cross-device risks for security managers. This is where Check Point Harmony Mobile is supporting us very closely. With this solution, it is immediately securing the equipment that is connected outside of our organization and thus protects the equipment and data.

What is most valuable?

Check Point Harmony offers an almost intuitive implementation. The use and management of our portal is easy. It is integrating six security products in a unified way to protect all users, connections, devices, and access. Users get protection regardless of where they are, applications they access, or any device they use. Users face endless cyber threats such as malware, phishing, malicious emails, or ransomware zero-day attacks. In addition to detecting unauthorized use of SaaS applications and preventing data leakage, we get instant threat visibility.

What needs improvement?

Having a unified solution developed by one of the most reliable brands in the market gives our organization the peace of mind that data is safe anytime, anywhere. 

We know that for many companies, the management and administration of device and data security have been complex. However, Check Point Harmony Mobile solves and supports is in all this with solutions made for this need. At the moment, I would not change anything; from my perspective, it is complete.

Something that could be improved is the compatibility with older versions. In distribution centers where Android devices with version 4.4.0 used, the solution gives many errors. In newer versions, the tool complies with its proper functioning.

For how long have I used the solution?

I've used the solution for one year.

How are customer service and support?

With the support teams, it is a bit complex due to the absence of support in Spanish. Also, the guides that the support service provides us in many cases are complex and make it difficult to solve problems.

How would you rate customer service and support?

Positive

What other advice do I have?

Harmony is not only great security for devices, it is a great analytics network that protects us from various attacks and that you can try with a simple and easy-to-configure agent on mobile devices.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2024
Product Categories
Mobile Threat Defense
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.