Check Point Harmony Mobile Overview

Check Point Harmony Mobile is the #1 ranked solution in our list of top Mobile Threat Defense tools. It is most often compared to Lookout: Check Point Harmony Mobile vs Lookout

What is Check Point Harmony Mobile?

Mobile Security: Robust, Agile & Transparent

In the new normal, while employees are increasingly accessing corporate data from their smartphones, your business is exposed to breaches more than ever.

Harmony Mobile* delivers complete protection for your mobile workforce that is simple to deploy, manage and scale.

Check Point Harmony Mobile is also known as Check Point Mobile Access, Check Point SandBlast Mobile.

Check Point Harmony Mobile Buyer's Guide

Download the Check Point Harmony Mobile Buyer's Guide including reviews and more. Updated: June 2021

Check Point Harmony Mobile Customers

Samsung Research America, Mississippi Office of the Secretary of State

Check Point Harmony Mobile Video

Filter Archived Reviews (More than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
RA
Security Sales Engineer at BT Global Services AMEA
Easy deployment: We simply send a link through email to a user, they install the software and are protected

What is our primary use case?

We use SandBlast to protect our mobile devices, as well as our iPads and Samsung tablets.

Pros and Cons

  • "The easy deployment is the key for us. I can simply send a link through email to a user, then they install the software and are protected."
  • "I would like to see more visibility into the actual devices that it's protecting. In some cases, you don't want to see a lot. However, for our purposes, I would like to see more information about the applications which are installed, then have more control over what can and what cannot be installed."

What other advice do I have?

I would rate it a nine of ten because of the ease of installing it. Using it on a daily basis, the administration is quite easy. I would advise someone considering SandBlast to have some definite use cases in mind before deploying it. That way you can deploy it very specifically towards what you are going to be using it for.
KK
In-Charge (IT Support) at a financial services firm with 501-1,000 employees
Real User
Doesn't allow you to activate some applications until your mobile is malware free

What is our primary use case?

My primary use case for this solution is to integrate with mobile device management.

Pros and Cons

  • "It doesn't allow you to activate some of the applications until your mobile is malware free. That way we come to know that the device secure and only then do we deploy the business application."
  • "It does the process in the background and it does a wonderful job but the methodologies don't pop up. They should make it more interactive."

What other advice do I have?

This is a must-go solution if you want mobile device security. I would rate this solution an eight out of ten.