Check Point Harmony Mobile Valuable Features

JG
Head of Special Projects Unit-RCJA (SANDETEL) at Junta de Andalucia

It has been very easy to implement and deploy. It's possible to scale the installation based on the policies defined for each profile. It's my understanding that maintaining these policies and updating them will be a fairly easy task through the options provided by the platform. I am convinced that it is an advantage that the network administrators and security officers of the companies will gladly accept. On the other hand, it is also very important to note that the end-user has not perceived any inconvenience in the application of this solution to their terminals: it is completely transparent and has not caused any rejection among users who already have it implemented.

View full review »
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS

The tool is excellent, however, it has some features that stand out a lot, for example, it has a very intuitive interface. 

The search capacity allows you to find information quickly and concisely. 

It generates reports and precise analysis, quickly in real-time allowing the technology department to focus. 

We can automate many of the tasks. 

It has notifications and reminders that help us be aware of each event or vulnerability that may arise in our organization.

View full review »
Nurullah Kazar - PeerSpot reviewer
Network Security Group Manager at Cyberwise

First of all cloud-based management is easy to use and you never deal with software upgrades. If you want to use another product from Check Point you can still use the same management console. 

This product is difficult to explain if people are not mature enough for mobile security. Sometimes people think if they use MDM solutions they also cover mobile security, however, the fact is not like that. 

Mobile security needs effort from the admins because it is a continuous process. You can block infected devices from accessing corporate data.

View full review »
Buyer's Guide
Check Point Harmony Mobile
April 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.
rb6k - PeerSpot reviewer
Business Co-Ordinator at Pentesec

The threatening app feature was super useful when I was on Android. There are so many copies on various app stores; it felt like the Wild West for me, and Harmony was able to help me feel comfortable that if I made a mistake, I wasn't going to hand over the keys to the kingdom. 

On the Apple App Store, it also surprised me by showing me apps that were malicious in ways that weren't flagged by Apple. I was able to report these and be more aware. I also like that when I want to use Wi-Fi in places, I can search for the official network; there's always a concern that it might be a spoofed network. Using this, I can quickly get an alert if things seem bad and I won't be able to accept or send data through that network if it isn't safe.

View full review »
Avesh Kumar - PeerSpot reviewer
Software Tester at a tech services company with 51-200 employees

Check Point's Sandblast Mobile solution integrates with Mobile Device Management and supports Android and iOS operating systems. Two profiles are created for each mobile device when it is configured. There are two types of profiles - personal and professional - and various security guidelines can be applied to each. 

Real-time scanning is only one of the amazing capabilities offered by this tool. 

The simple navigation offered by the graphical user interface is excellent. 

We value the centralization it brings about.

View full review »
JJ
Project Manager at Junta de Andalucia

The Check Point SandBlast Mobile solution supports Android and iOS operating systems and allows for integration with Mobile Device Management (MDM).

It has APIs to carry out operations in applications that connect to mobile terminals and performs the tasks that are specified. For example, avoid activating Wi-Fi or installing applications.

When mobile devices are configured, two profiles are created for each of them. There is the personal profile and the professional profile, which means that different security policies can be applied to each profile.

View full review »
Prateek Agarwal - PeerSpot reviewer
Manager at Indian Institute of Management Visakhapatnam

The solution is very user-friendly. It has a very nice and rich user interface. The employees are very happy with the product because they can use it on the go. They need not use their laptop or workstations to analyze the security threats on their emails.

The product has SSL and HTTPS features, which make mobile devices more secure. It doesn’t allow sharing information with third-party tools or any suspicious person. We can stop everything. The compatibility with iOS and Android is very good.

The tool gives real-time notifications. If we have enabled the push notifications, the app will send a notification when there’s a phishing attack or security breach on the mobile devices. We can easily check and stop that conversation easily.

View full review »
RA
Founder - Director at a tech services company with 1-10 employees

If we revisit all possible IT compliance whether it is PCI-DSS, HIPAA, GDPR, and more, they all talk about protecting the 'data' and/or leading to privacy. And mobile devices are some of the most vulnerable devices which can be misused in many ways, so protecting the device from malicious traffic is the key when it would be supported with manual configurable controls then it would be the best fit!

View full review »
LW
IT Security Manager at Telecommunications Services of Trinidad & Tobago Limited (TSTT)

We like Harmony's ability to encrypt transactions between mobile devices. All the user's transactions are encrypted. That's an excellent feature. We can detect, quarantine, and address any issues in the handset itself. 

View full review »
KP
Network Engineer at LTTS

In Check Point Mobile access, we are using the SSL VPN for our onsite/work from home users/employees, and in this scenario, we have to secure our organization as well as our users.

In this SSL VPN, multifactor authentication (MFA) is one of the very good and valuable features for us. We have applied MFA so that no one can bypass this security and the users/employees can access their resources very easily, securely, and seamlessly. This feature is the most valuable for Remote Access

View full review »
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution

The most effective features of the product stem from its ability to deal with areas like data security and application security while also being useful to users who use mobiles in roaming mode and those who use a personal mobile phone with corporate applications in it.

View full review »
Jessica Muñoz - PeerSpot reviewer
Account Manager at a tech vendor with 11-50 employees

I like the product's ability to offer IPS protections for mobile security.

View full review »
Dave Eversden - PeerSpot reviewer
Managing Director at Forever Group

The integration with Microsoft Intune scoped to the security group made deployment a breeze. Certainly, once the initial configuration was in place the process was smooth and devices began to appear in the Check Point Harmony portal automatically. Adding web and link protection was considered to be a valuable security enhancement and is a key benefit of using mobile threat defense. The fact that the product can also highlight changes in public IP addresses for known corporate WiFi SSIDs also helps to alert or prevent spoofing of internal WiFi networks.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

Harmony Mobile introduces many innovative features. One of them is URL filtering, which is very valuable in this tool. It offers to filter apps, protect privacy, and reject malicious or unauthorized downloads. It allows us to get an idea of how it protects the application through certain security levels that are threats, network applications and devices. Its administration and configuration is very simple. It is easy to use with its friendly interface, the solutions helped a lot to the security of the company.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

Check Point Harmony offers an almost intuitive implementation. The use and management of our portal is easy. It is integrating six security products in a unified way to protect all users, connections, devices, and access. Users get protection regardless of where they are, applications they access, or any device they use. Users face endless cyber threats such as malware, phishing, malicious emails, or ransomware zero-day attacks. In addition to detecting unauthorized use of SaaS applications and preventing data leakage, we get instant threat visibility.

View full review »
reviewer1523535 - PeerSpot reviewer
IP LAN and Integrity Specialist at Chevron

I really like the application scanning feature that scans all of the installed applications, and not only what appears in the Add or Remove Apps section, and then reports the results in the console.

The performance of this solution is absolutely impressive, especially in terms of battery consumption. It has less consumption than I was expecting

It is a very stable solution that integrates well with the most standard MDM solutions in the current market.

It offers good support for Apple devices and multiple Android versions, which is quite important if you have a disparate set of devices.

View full review »
BD
Senior Manager at a financial services firm with 10,001+ employees

Enrollment is based on the user name and the admin needs to create an enrollment policy. The enrollment email goes to users who are entitled to enrollment via Capsule. Each user needs to manually click and add the Token, which is sent via email and used for providing and restricting access.

Licenses are taken from Check Point for the number of users who need to be enrolled via Capsule. 

No additional hardware or setup is required for Capsule configuration, as it can be enabled on the same security gateway. This reduces any additional hardware cost, as well as for setup and connectivity.

Configuration is straightforward and can be controlled on the same NGFW as Capsule. This is used for providing access to users.

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

A very important feature that is outstanding and helps our organization is the ability to protect the business data stored on each device. This is especially important since these devices are used to create information, catalogs, products, customer information, and inventory. Every time they are outside the company, the solution provides us with a secure connection from the devices to the database, thereby keeping data safe. In addition, we can improve the productivity of each of the employees remotely. This benefits to the company in terms of sales or productivity even from different locations. 

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo

The most valuable feature is being able to encrypt corporate data on devices that are not company devices (like personal cell phones), and being able to manage it remotely. This way, fired users can be removed and eliminated corporate data without affecting the personal data of its other users, thus being an efficient way to safely manage and administer the information that belongs to the corporation. 

We can easily secure the information of the company and the user's device so that if we find a vulnerability or some insecurity breach in these cell phones, the solution will indicate that the device is compromised and it will remove the corporate data to ensure the integrity of the data.

View full review »
Adam Coulibaly - PeerSpot reviewer
Suporta engineer at Novasys

Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage.

View full review »
LW
IT Security Manager at Telecommunications Services of Trinidad & Tobago Limited (TSTT)

We like the URL content filtering, that is one of the most valuable features. 

It also enables us to see where privacy is a concern, apps that are leaking privacy. Having an idea of how these apps are being protected offers some level of security to the device and back into our corporate network.

The protection provided by the solution for all three threat vectors, application, network, and device, is pretty okay the way they're doing it. Their solution does not work the traditional way that endpoints used to be protected using local resources, when it's doing its scan. Sandblast is comparing the app to the app store and that is a very good feature. It's not resource-intensive. In terms of the networking, it does a pretty okay job. From the device side, we're able to see that backend information, including the app information, into the portal itself. 

It's also very easy to deploy and easy to manage.

When it comes to applications and network specifically, the solution's comprehensiveness and accuracy is pretty good. For applications, it has features pertaining to things like GDPR compliance. It is not leaking an end-user's personal information. There are some good features there. The only way we are able to see a user being identified is if there is a threat. Then that user comes up in that report, but that's only for those incidents. It's a very small minority. But it does a very good job in terms of breadth of protection.

The dashboard is pretty okay in terms of how you go in and you create your policies. And it comes with a very comprehensive policy. You have checkboxes or radio buttons to select the additional features. That's very intuitive. They just recently added some new features to their dashboard as well. It's pretty straightforward when it comes to where you: 

  • look for the threats, versus the administration aspect of it 
  • how do you drill down, the analytics
  • if there are any events, how you go all the way down. 

I find the dashboard is pretty intuitive and simple, compared to how Check Point has been deploying the SmartConsole.

And when it comes to blocking attempted attacks it's also pretty intuitive and simple. Suppose we see an app that has a particular threat. We're able to select and apply policies or rules on that particular app or device, and that can prevent the threat from propagating. We can quarantine it and address the issue. It's pretty simple in being able to manage threats, from a mobile perspective.

View full review »
OP
Senior Network/Security Engineer at Skywind Group

The users in our company like that the VPN client is supported on the different platforms and operational systems, e.g. Android smartphones and tablets, Windows and MacOS PCs and laptops.

The most impressive thing is the SSL VPN Portal. With it, you don't even need any client software, just a browser is enough to connect. We have integrated the SSL VPN Portal with the Microsoft Exchange server, and this covers the needs of 95% of our users regarding remote access to the office.

The authentication is performed via integration with Active Directory, so the employees use the same credentials. It is super easy and everybody likes that.

View full review »
Hendrik-Du Plooy - PeerSpot reviewer
Regional Manager at Saber1

The ease of use, along with comprehensive protection for all devices, is a key advantage. It provides visibility into malicious applications installed on the phone.

View full review »
MS
Senior Information Technologist at a energy/utilities company with 1,001-5,000 employees

The zero-touch deployment system process has been the most valuable feature thus far. The ability to deploy and configure the application with the help of Microsoft's Endpoint Management (our mobile device management solution) has been seamless and has given us the ability to deploy with zero user interaction. 

The other most valuable service so far has been the assistance provided to us by the Check Point Harmony mobile engineers. They have been so awesome and helpful to us during the setup process. 

View full review »
GS
Manager, Infrastructure Services at a energy/utilities company with 1,001-5,000 employees

The app just runs in the background and keeps the device safe. The real-time scan is awesome and really delivers that value-add component to threat defense and a holistic approach to mobile device protection. The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly. Tracking users, seeing devices and their current state at a glance is very helpful. Reporting is also a great value add to this product. Seeing the areas of concern and making adjustments to tighten the gaps is very helpful and a value add.

View full review »
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees

Check Point Harmony Mobile helped us to cover vulnerable spaces in our infrastructure that were visited from mobile devices. One of the greatest advantages is its installation agent that is available through the portal. In addition to not requiring much mobile performance, it does not disturb the user.

It also has the ability to encrypt device units, avoiding loss of information in the event of theft or loss of the same.

The environment is managed and administered centrally in Check Point Infinity which provides a lot of stability with its other features.

View full review »
MK
Founder at Softnetx

The solution's most valuable features are scanning for malware prevention and threat identification. 

View full review »
LD
Cloud Support at a tech company with 1-10 employees

The costs are adjusted to the organization for each user that is implemented and is really competitive for the features that are implemented.

It is essential to rely on a good vendor so that the provisioning and implementation of security are the best.

View full review »
Rodrigo Nalda - PeerSpot reviewer
Responsable de Ciberseguridad. CISO at a printing company with 501-1,000 employees

The best thing about the product is that it is transparent and does not impact the users. After analyzing the battery consumption and resource load, we found that it is practically negligible.

On some occasions, we have had to contact the user to solve a problem with the system. It is quite simple, which facilitates the resolution of problems.

View full review »
JK
Security Consultant at Synergy

The feature I find the most valuable is the confirmation of all the apps on your mobile, which is clean.

View full review »
RA
Security Sales Engineer at BT - British Telecom

The easy deployment is the key for us. I can simply send a link through email to a user, then they install the software and are protected.

View full review »
SD
Information Technology Security Specialist at Telecommunications Services of Trinidad & Tobago Limited (TSTT)

Harmony Mobile's most valuable feature is the variety of capabilities in the platform, including allowing you to track device status.

View full review »
OP
Senior Network/Security Engineer at Skywind Group
  1. The solution has clients for both Android and Apple devices, so all of our employees' devices are protected.
  2. The client allows us to detect the rooting/jailbreaking of the OS and prevents the connection of such devices to the corporate network VPN.
  3. The client detects and prevents the various types of the phishing attacks, malicious sites in the browsers, and checks them with the help of the Check Point database (ThreatCloud).
  4. The centralized management portal is rich in configuration options, monitoring, reporting capabilities.
View full review »
KC
IT Security Analyst at a energy/utilities company with 1,001-5,000 employees

I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious.

It does an active scan of all applications.

Time and time again, you read that applications have been removed from the Play Store because they are from a malicious vendor or they have been compromised. Having an extra layer of security where it scans to ensure that your device has a more secure and stable version of the application is very valuable.

View full review »
CS
Systems Administrator at a retailer with 201-500 employees

I would say the most valuable aspect is just the offering itself. We don't have a lot of offerings out there in the mobile world right now to put on cell phones and they filled that gap. Having a really good security control on a mobile device is its greatest asset.

The protection provided by this solution for all three threat vectors, application, network, and device is really good. It's in-depth on all accounts.

It monitors all the URLs that a user goes to on their phone so we can see what they're looking at and we can limit it. Certain topics are not allowed to be accessed. They're monitoring their apps and they rate them based upon how big of a security risk that individual app is based on their ratings. And so we're able to limit apps as well and allow people to have some that may be a low risk, but still a risk, but we may allow that for our users whereas we block medium and high risk.

The device itself checks to see if the device is jailbroken yet and so that's a good security control they have. It also watches your SMS text messages for phishing so that's another way it's securing the device.

The detection and prevention mechanisms seem very accurate. I remember about a year and a half ago, there was an app that had been found to be malicious, it instantly switched its rating, and was reacting to that change in the vulnerability of that app rather swiftly so it seems to be very accurate and in-depth.

It's super comprehensive. The networking part watches all of its networking and it does a man in the middle attack to be able to see that, but it is extremely comprehensive in being able to see everything that the phone is doing network-wise.

It has a pretty good dashboard. You can maneuver around it quickly and be able to see what you want to see and get to the information you need.

The ease of use is good. It does allow you to send email alerts and I get email alerts when something's going on so I don't have to be watching it all the time and then I'm able to go and work with that user to resolve it. It seems to be a pretty well-built tool.

I haven't seen many false positives, they've all seemed to be pretty accurate.

View full review »
ST
Technology consultant at a tech services company with 501-1,000 employees

First, the granular visibility of apps & traffic which we get through Check Point SandBlast Mobile is good. We can see each & every installed app & information for each app about severity & risk.

URL filtering has a wide variety of URL categories to choose from. We can also add whitelist & blacklist domains as per our requirements.

Another great thing about Check Point SandBlast Mobile is the ease of deployment. We can deploy a solution in an hour or two. 

Check Point SandBlast Mobile android application is very easy and simple. The interface & all processes are automated.

View full review »
HV
Engineer at Caldoo

What I like is that the user experience of your mobile device is not compromised by SandBlast Mobile. The end-user doesn't see anything like an extra app on your device. The app is working in the background, scanning for all kinds of cyberattacks, and seeking out phishing, malware, bots, et cetera. 

Once something is detected, the end-user gets an alert, and can immediately command an action. When they go to open, let's say, a phishing e-mail, they get an alert that says something to the effect of "Beware, this is a phishing mail. Don't open it." The user has the possibility then to open it, however, it would be quite foolish to do so when they are told not to do it. The app gives you very good warnings in terms of malicious attacks.

There is good integration with mobile device management systems.

There is a potential for reporting if you need it.

The solution scales very well.

We've found that the product is quite stable.

Technical support is helpful.

View full review »
JK
Business Tranformation Project Manager at a financial services firm with 501-1,000 employees

The usability is the most valuable feature. It's really easy to use. It's a durable solution. I don't have any breaches. It is a good solution from that angle. 

View full review »
it_user1288029 - PeerSpot reviewer
Security Engineer at DGIT

The anti-phishing and scanning of SMS are the most valuable aspects of the solution. Sometimes we will get some SMS and they will try to redirect you to malicious links. If you have SandBlast Mobile, it helps you prevent clicking on those malicious links.

View full review »
SB
Senior Engineer at Spacertron

The most valuable features of this solution are the: 

  • Filtering 
  • Interface configuration
  • Threat management. 
View full review »
it_user967395 - PeerSpot reviewer
In-Charge (IT Support) at a financial services firm with 501-1,000 employees

The antimalware feature has been valuable. 

View full review »
Buyer's Guide
Check Point Harmony Mobile
April 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.