Check Point Harmony Mobile vs Symantec Endpoint Protection Mobile comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Harmony Mobile and Symantec Endpoint Protection Mobile based on real PeerSpot user reviews.

Find out in this report how the two Mobile Threat Defense solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Check Point Harmony Mobile vs. Symantec Endpoint Protection Mobile Report (Updated: March 2024).
770,428 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It has been very easy to implement and deploy.""The simple navigation offered by the graphical user interface is excellent.""The usability is the most valuable feature. It's really easy to use. It's a durable solution. I don't have any breaches. It is a good solution from that angle.""First, the granular visibility of apps & traffic which we get through Check Point SandBlast Mobile are good. We can see each & every installed app & information for each app about severity & risk.""I really like the application scanning feature that scans all of the installed applications, and not only what appears in the add or remove apps, and then reports the results in the console.""The use and management of our portal is easy.""The most valuable features of this solution are the filtering, interface configuration, and threat management.""The most impressive thing is the SSL VPN Portal."

More Check Point Harmony Mobile Pros →

"Integration is good. You can integrate them with an off-brand endpoint solution. It has quite a few integration features you can use.""Symantec Endpoint Protection Mobile is very easy to deploy, and it is really easy to set up the policies.""One of the features I found very nice in Symantec Endpoint Protection Mobile is that it's good at scanning and fixing issues on its own. The solution is very good at finding a lot of applications and notifying you about systems that have issues. Symantec Endpoint Protection Mobile can run headless without having to report back which I found very nice about it. I also like that the solution would create alerts when a certain amount of time lapsed for systems, and it would recommend going through and scanning the systems. As an actual endpoint protection product, Symantec Endpoint Protection Mobile is good.""The biggest advantage it has is the VPN product that is incorporated into the solution.""The most valuable feature is to be able to power up a device and wipe the data remotely.""The user interface is good. Managing and monitoring tools are also good.""Your endpoint protection depends on the signature piece, so it's mainly for virus and malware protection, as well as also to control devices and applications."

More Symantec Endpoint Protection Mobile Pros →

Cons
"In the next release, I would like to see a Wi-Fi scanner to be able to identify whether a wireless network is malicious before you join it.""The interface could be more user-friendly. They should improve the look and feel.""I would like to see management and remote administration functions in the same portal.""The remote configuration has room for improvement.""The errors should be more visible to admin users.""I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain.""The service provided by Check Point at the technical support level is somewhat slow, and they only provide help in English, which limits some clients.""Harmony Mobile could be improved with increased built-in DLP coverage."

More Check Point Harmony Mobile Cons →

"The price is too expensive for the Egyptian market here. Compared to other products or the other competition here in the local market, they need to be more competitive cost-wise.""Having better, real-time support would be an improvement over having to send an email.""When there is an attack attempt on mobile, there doesn't seem to be much of a notification.""I'm not sure if there's anything lacking; I personally don't use the solution too much, so I'd have to look at it a bit and do some more research. I'm more on the operation side of things.""For a lot of the issues my team experienced from Symantec Endpoint Protection Mobile, Symantec said that getting the issues resolved would mean going through the partner that sold the product and creating an incident report to get the team to work on the actual company environment. A lot of the problems my team has been having from Symantec Endpoint Protection Mobile were associated with Outlook for endpoint users who were being locked out of the Outlook application. Another area for improvement in Symantec Endpoint Protection Mobile is its central web hub, where you're supposed to be able to update all of the endpoints because it wasn't reaching the endpoints. For example, even if the central web hub was able to see the endpoints and do the required scans, whenever you'd go to do a policy change, the policy change wouldn't propagate down to the endpoints. The central web hub allows you to monitor all of your endpoints and allows you to choose actions you'd want to do to each of the endpoints such as pushing down on updates or scanning the system. The problem my team usually gets is that majority of the time, whenever my team would do policy updates, the updates won't propagate down to the users, so it was very inconsistent. Needing to manually go through and scan systems is also an area for improvement in Symantec Endpoint Protection Mobile. Currently, there's no way to automate its scanning process. A lot of the other issues started appearing in Symantec Endpoint Protection Mobile during situations when people wanted to customize different applications. Symantec doesn't like people doing a lot of customizations. For example, the main problem in my company is users losing access to Outlook, but then my team discovered that there was a specific policy set that you could disable, and it would fix a lot of the Outlook issues. However, when you'd go to change that policy set and attach that to a user to overwrite policies on the user side, it just wouldn't do anything for that user. It wouldn't even show that the policy was updated, so this is what needs to be improved in Symantec Endpoint Protection Mobile.""It would be nice to have more flexibility regarding deployment.""Application and device control needs to be improved. We also need to enhance login features for management to have good visibility of the events."

More Symantec Endpoint Protection Mobile Cons →

Pricing and Cost Advice
  • "Pricing is a little high."
  • "We didn't actually purchase the software. It was given to us by Check Point. We are using it as a test bed for possible future customers."
  • "Check Point pricing is better than Symantec."
  • "Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
  • "The cost is huge compared to other products, and it seems this solution is only for companies with a large budget."
  • "This is a very expensive product."
  • "The quality, price, and support ratio are very good."
  • "Regarding the cost of licenses, each device consumes one, even if it has both professional and personal profiles."
  • More Check Point Harmony Mobile Pricing and Cost Advice →

  • "You get the solution for free if you purchase the complete endpoint security licensing."
  • More Symantec Endpoint Protection Mobile Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Mobile Threat Defense solutions are best for your needs.
    770,428 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The product's initial setup phase is very straightforward.
    Top Answer:There is a need to make yearly payments towards the licensing costs attached to the product. You can opt for a one-year, three-year, or five-year license. There is a separate team that handles the… more »
    Top Answer:At times, when configuring policies, the tool takes some time to apply the policy. If I configure a new policy and apply it to the management console, it may take time. The product should work on… more »
    Top Answer:Symantec Endpoint Protection Mobile is very easy to deploy, and it is really easy to set up the policies.
    Top Answer:Symantec Endpoint Protection Mobile comes inclusive of your endpoint security complete licensing. If you purchase complete licensing, Symantec Endpoint Protection Mobile is added to that. You get the… more »
    Top Answer:Since deploying to a mobile device is not your average deployment to a workstation endpoint or a server, I would like to see more functions. It would be nice to have more flexibility regarding… more »
    Ranking
    1st
    Views
    806
    Comparisons
    363
    Reviews
    18
    Average Words per Review
    533
    Rating
    8.7
    5th
    Views
    261
    Comparisons
    87
    Reviews
    3
    Average Words per Review
    641
    Rating
    7.7
    Comparisons
    Also Known As
    Check Point Mobile Access, Check Point SandBlast Mobile
    Skycure
    Learn More
    Overview

    Check Point Harmony Mobile is a unified security solution for user devices and access. It is a complete threat defense solution for mobile devices that prevents cyberattacks and enforces security for remote workers and users. It prevents threats on apps, networks, and OS while enhancing the user experience and preventing the disruption of device performance. 

    Check Point Harmony Mobile Benefits

    Some benefits of Harmony Mobile include: 

    • Advanced app analysis that detects known and unknown threats
    • Mitigates threats regardless of the mobile management platform or what the user is doing
    • Prevents infected devices to send data to botnets
    • Blocks phishing attacks on social media, email, and messaging

    Harmony Mobile integrates with UEM systems to assess the device’s level of risk. The UEM quarantines and activates security policies, such as blocking access to corporate assets. 

    Check Point Harmony Mobile Key Features

    Harmony Mobile's key features include: 

    • App protection: The platform detects and blocks the download of malicious applications in real-time. It runs the application in a cloud-based environment and tests it by leveraging techniques such as sandboxing, advanced static analysis, anomaly detection, and other techniques. By doing so, it prevents malware from infiltrating employees’ mobile devices. 
    • Network protection: The platform’s unique infrastructure extends Check Point security capabilities to mobile devices. It includes features such as anti-phishing, safe browsing, conditional access, anti bot, and URL filtering. 
    • Simple and easy to use management: Check Point Harmony Mobile integrates with almost all mobile management solutions (MDM/UEM), and supports BYOD programs and remote work settings. It delivers scalability and efficiency with zero-touch deployment. The system works for all Android deployment models. The management console is cloud-based, delivering visibility over the risk posture and enabling admins to roll granular policies. 
    • User friendly: The platform is easy to adopt, with no disruption of the user experience or the device's usability. The system delivers detailed threat notifications in real time as well as weekly reports. The platform doesn’t impact battery life or data consumption. Additionally, it keeps the user and corporate data private without collecting or analyzing personal information. Finally, the platform anonymizes the context metadata from apps and networks it uses for analysis.  

    Check Point Harmony Mobile Components 

    • Behavioral risk engine: The engine uses data received from the app about the network, configuration, and OS data integrity, detects and analyzes suspicious activity, and produces a risk score.
       
    • Mobile gateway: A multi-tenant architecture and mobile devices are registered. The gateway manages the solution communications with connected mobile devices and with the dashboard.
       
    • Management dashboard: The dashboard enables administration, provisioning, and monitoring of devices and policies. It integrates with Unified Endpoint Management.

    • Mobile Protect app: This lightweight app for iOS and Android collects data and analyzes threats to devices. It monitors the operating systems, applications, and network behavior and collects data to detect malicious behavior.

    • ThreatCloud: A database with real-time threat intelligence on indicators of compromise from hundreds of thousands of Check Point gateways and millions of endpoints worldwide.  

    Check Point Harmony Mobile Capabilities

    • Prevents malicious app downloads
    • Prevents phishing on applications
    • Prevents man-in-the-middle attacks
    • Stops infected devices from accessing corporate applications
    • Detects OS exploits

    Reviews from Real Users

    "The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly," says G.S., a Manager of Infrastructure Services at an energy/utilities company.

    Kadeem C., an IT Security Analyst at an energy/utilities company, says, "I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious."

    Oleg P., Senior Network/Security Engineer at Skywind Group, says, "The most impressive thing is the SSL VPN Portal."

    Hans V., an Engineer at Caldoo, adds that “We've found that the product is quite stable."

    Symantec Endpoint Protection Mobile helps predict, detect and prevent physical, malware, network and vulnerability exploits to protect businesses from mobile cyberattacks.

    Sample Customers
    Samsung Research America, Mississippi Office of the Secretary of State
    Samsung, Optiv, Exchange, MobileIron, Check Point, McAfee, AirWatch
    Top Industries
    REVIEWERS
    Comms Service Provider18%
    Financial Services Firm16%
    Security Firm13%
    Energy/Utilities Company11%
    VISITORS READING REVIEWS
    Computer Software Company21%
    Financial Services Firm12%
    Comms Service Provider8%
    Government7%
    VISITORS READING REVIEWS
    Educational Organization82%
    Computer Software Company4%
    Healthcare Company1%
    Energy/Utilities Company1%
    Company Size
    REVIEWERS
    Small Business49%
    Midsize Enterprise20%
    Large Enterprise31%
    VISITORS READING REVIEWS
    Small Business30%
    Midsize Enterprise23%
    Large Enterprise47%
    REVIEWERS
    Small Business29%
    Midsize Enterprise29%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business3%
    Midsize Enterprise86%
    Large Enterprise11%
    Buyer's Guide
    Check Point Harmony Mobile vs. Symantec Endpoint Protection Mobile
    March 2024
    Find out what your peers are saying about Check Point Harmony Mobile vs. Symantec Endpoint Protection Mobile and other solutions. Updated: March 2024.
    770,428 professionals have used our research since 2012.

    Check Point Harmony Mobile is ranked 1st in Mobile Threat Defense with 44 reviews while Symantec Endpoint Protection Mobile is ranked 5th in Mobile Threat Defense with 7 reviews. Check Point Harmony Mobile is rated 8.6, while Symantec Endpoint Protection Mobile is rated 7.2. The top reviewer of Check Point Harmony Mobile writes "Easy to implement, simple to maintain policies, and does not disrupt end-user functionality". On the other hand, the top reviewer of Symantec Endpoint Protection Mobile writes "An easy-to-deploy solution for mobile devices that has high stability and scalability". Check Point Harmony Mobile is most compared with Check Point Remote Access VPN, Lookout, Cisco AnyConnect Secure Mobility Client, Fortinet FortiClient and VMware Workspace ONE, whereas Symantec Endpoint Protection Mobile is most compared with VMware Workspace ONE. See our Check Point Harmony Mobile vs. Symantec Endpoint Protection Mobile report.

    See our list of best Mobile Threat Defense vendors.

    We monitor all Mobile Threat Defense reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.