Check Point Harmony Mobile Competitors and Alternatives

Find out what your peers are saying about Check Point Harmony Mobile vs. Symantec Endpoint Protection Mobile and other solutions. Updated: May 2021.
509,820 professionals have used our research since 2012.

Read reviews of Check Point Harmony Mobile competitors and alternatives

KC
IT Security Analyst at a energy/utilities company with 1,001-5,000 employees
Real User
Top 5Leaderboard
Has good application scanning that it stable and has helpful technical support

What is our primary use case?

The primary use case of this solution is for mobile threat prevention. We integrate it with an MDM and push it to our managed devices to protect the company's phone.

Pros and Cons

  • "I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious."
  • "In the next release, I would like to see a Wi-Fi scanner to be able to identify whether a wireless network is malicious before you join it."

What other advice do I have?

This solution checks so many of our boxes already, anything new added would just be the icing on the cake. My advice would be to do your homework. Ensure that this is the right product for you. Request a demo and test it out. Don't purchase more licenses than you need because it will become costly. Before this, I didn't realize that there were so many malicious applications out there in the world. So, it was a bit eye-opening to see some of what your phone can access without you even realizing what you were clicking. I would rate this solution a nine out of ten.
Project Manager at Junta de Andalucia
Real User
Top 5Leaderboard
Easy to set up, good support, and allows for both personal and professional device profiles

What is our primary use case?

We have implemented Check Point Harmony Mobile due to the numerous phishing attacks that our users were suffering, both by email and by fake text messages, pretending to be the Post Office, Amazon, banks, etc... With this product, we have tried to avoid this type of attack and therefore have our business environment more secure. Currently, we have users in various territorial locations and we were looking for a solution that would allow us to secure their mobile devices with a minimum level of intrusiveness in the terminals. The solution should be for both Android and iOS.

Pros and Cons

  • "The Check Point SandBlast Mobile solution supports Android and iOS operating systems and allows for integration with Mobile Device Management (MDM)."
  • "Compatibility with other Mobile Device Management (MDM) products on the market should be improved, ensuring correct operation between SandBlast Mobile and MDM."

What other advice do I have?

My advice is that before installing, a complete analysis of the requirements should be carried out. This should be done in order to correctly define user groups and the respective policies from the beginning. This will help to avoid individual policies.
Find out what your peers are saying about Check Point Harmony Mobile vs. Symantec Endpoint Protection Mobile and other solutions. Updated: May 2021.
509,820 professionals have used our research since 2012.