"The solution was easy to deploy and provided a useful security enhancement for mobile devices."
"You can block infected devices from accessing corporate data."
"The most valuable features of this solution are the filtering, interface configuration, and threat management."
"We have applied MFA so that no one can bypass this security and the users/employees can access their resources very easily, securely, and seamlessly."
"As a security solution for devices, it can benefit us in many ways, including providing us with data security, access control, network security, and more."
"We've found that the product is quite stable."
"It monitors all the URLs that a user goes to on their phone and so we can see what they're looking at and we can limit that. Certain topics are not allowed to be accessed. They're monitoring their apps and they rate them based upon how big of a security risk that individual app is based on their ratings. And so we're able to limit those as well and allow people to have some that may be a low risk, but still a risk, but we may allow that for our users whereas we block medium and high risk."
"The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly."
"The technical support team provides good services and faster response times."
"The service provided by Check Point at the technical support level is somewhat slow, and they only provide help in English, which limits some clients."
"From a user's perspective, of course, it is always better when it is cheaper in price."
"For SandBlast Mobile, the only thing that is lacking is that it wasn't available for all types of users. However, Check Point has since fixed this, with ZoneAlarm."
"One of the improvements that can be made is that they become compatible with Google MDM."
"We know that for many companies, the management and administration of device and data security have been complex."
"There are certain shortcomings in the integration capabilities that a product offers."
"If possible, it would be better if they can include vulnerability management for applications. When a user installs many applications, if there is a way to manage a pack of applications, it would be helpful."
"I would like to see management and remote administration functions in the same portal."
"The product's interface needs improvement."
Check Point Harmony Mobile is ranked 1st in Mobile Threat Defense with 45 reviews while Ivanti Tunnel is ranked 19th in Enterprise Infrastructure VPN with 1 review. Check Point Harmony Mobile is rated 8.8, while Ivanti Tunnel is rated 10.0. The top reviewer of Check Point Harmony Mobile writes "Easy to implement, simple to maintain policies, and does not disrupt end-user functionality". On the other hand, the top reviewer of Ivanti Tunnel writes "Provides efficient data security and good technical support services ". Check Point Harmony Mobile is most compared with Check Point Remote Access VPN, Lookout, Cisco AnyConnect Secure Mobility Client, Fortinet FortiClient and VMware Workspace ONE, whereas Ivanti Tunnel is most compared with Ivanti Connect Secure, Cisco AnyConnect Secure Mobility Client and OpenVPN Access Server.
We monitor all Mobile Threat Defense reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.