Check Point Harmony Mobile Initial Setup

JG
Head of Special Projects Unit-RCJA (SANDETEL) at Junta de Andalucia

The initial start-up was fairly straightforward thanks to the specialist support of the vendor. No major incidents were detected.

View full review »
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS

The first implementation was difficult since the tool has a fairly high learning curve.

View full review »
Nurullah Kazar - PeerSpot reviewer
Network Security Group Manager at Cyberwise

If you are using all products as cloud, implementations are very easy. However, if you want to use on-premise for regulation purposes, the implementation becomes a little complex. You need to install a connector on your environment to encrypt the data in the cloud.

View full review »
Buyer's Guide
Check Point Harmony Mobile
April 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.
rb6k - PeerSpot reviewer
Business Co-Ordinator at Pentesec

The initial setup is extremely straightforward. We received an email saying to scan a QR code to install and set up the app. We input the login details provided, and we were done. From the company perspective, they had to log into the management suite, set the rules they wanted to activate, and send the emails. 

It was very brief and fast to set up, and extremely quick to review and ensure compliance was universal. As soon as threats were found they were flagged. Users could not use any malicious apps or networks. The devices are protected immediately. 

View full review »
JJ
Project Manager at Junta de Andalucia

The initial setup was relatively easy, with no issues to review.

View full review »
Prateek Agarwal - PeerSpot reviewer
Manager at Indian Institute of Management Visakhapatnam

The product can be easily deployed on our mobile devices. We can create login credentials and easily work on it.

View full review »
RA
Founder - Director at a tech services company with 1-10 employees

The initial setup is straightforward (though version to version - device to device it may vary) and the deployment takes no more than ten minutes, but when it comes to 'fine-tuning or customizations' (some specific need/business requirements) it takes time and a series of testing for its fitment.

View full review »
LW
IT Security Manager at Telecommunications Services of Trinidad & Tobago Limited (TSTT)

Deploying Harmony was straightforward.  You can deploy it using an MDM solution, but we didn't have one at the time. We deployed by email or SMS, and was relatively simple. 

We explored the MDM part with Google but ran into some issues because the feature required for this integration requires an enterprise license. We have three staff members responsible for implementing and managing the solution.  

View full review »
KP
Network Engineer at LTTS

The initial setup is very easy and straightforward.

View full review »
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution

The product's initial setup phase is very straightforward.

For the product's deployment phase, you just need to install the agent to the end user and configure the policy on the cloud management console.

The solution's deployment phase is a one-day task.

View full review »
Jessica Muñoz - PeerSpot reviewer
Account Manager at a tech vendor with 11-50 employees

The product's deployment is easy. You only deploy the tool on the mobile device for the client or customer who wants to use it.

View full review »
IE
Cyber Security Consultant at Wirespeed

I would rate my experience with the initial setup a ten out of ten, where one is difficult and ten is easy.

The management console is on the cloud. The deployment takes around five to ten minutes. 

View full review »
Dave Eversden - PeerSpot reviewer
Managing Director at Forever Group

The solution has a straightforward setup - especially with Intune integration.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

One of the parts that worried us was its configuration and administration, however, it was extremely simple.

View full review »
reviewer1523535 - PeerSpot reviewer
IP LAN and Integrity Specialist at Chevron

The initial setup is very easy. The cloud solution is easy to deploy and integrate with our MDM.

View full review »
BD
Senior Manager at a financial services firm with 10,001+ employees

The initial setup is straightforward.

The process involves getting a license from Check Point and enabling a module/blade on the security gateway. After this, start on the configuration (Published data, which needs to be made available on the endpoint to access).

View full review »
Adam Coulibaly - PeerSpot reviewer
Suporta engineer at Novasys

Its initial setup is very simple. If any additional configuration needs to be done, I just receive an email. When a user is added to the portal, you receive an email with information about the server and the password. You can just click and start the application. It is very easy.

It is pretty fast. It just takes one minute for the installation and the first scan.

View full review »
LW
IT Security Manager at Telecommunications Services of Trinidad & Tobago Limited (TSTT)

The initial setup was pretty straightforward. There were a couple of ways to handle the roll-out. We could send an email with a barcode for the users to install it and there was also an option to send an SMS. They could then install it and it was pretty straightforward.

Prior to that, we sent out a communication explaining that this was what we were embarking on, that it was an executive security initiative. We still had a few calls from users because it was a new area and people were very concerned. We had to keep reassuring the users that we were not spying on them, that we were just protecting the company assets. We explained that it was no different from a laptop or a workstation that the company issued. We had to continually reassure them that it wasn't an issue of privacy. In fact, we told the employees that apps were leaking privacy information and this would turn that off and prevent it from happening.

Initially, there were a lot of concerns about privacy with users saying, "This thing is going to spy on us." But we did not roll it out to every employee's handset. We rolled it out to the company-issued handsets. We took that approach and, at a later date, based on how we run this solution and how we get it to "soak in," we'll move to the other area. But there were a lot of concerns. 

We didn't find any complexity around the installation of the solution on end-user mobile devices. Without the MDM integration, we were not able to force the install and the user still had the option not to install, and if it was installed they still had the option to remove it. But it was straightforward. There weren't any complexities.

Our deployment took about a month or a month-and-a-half. The problem we had wasn't with the roll-out, rather it was about our being able to separate company-issued handsets from the list. We went to the team that issues the handsets and they did not have accurate lists. The audit they had done was a month or two prior so we only had accuracy in the list up to a month or two before. The challenge wasn't about the solution itself.

View full review »
OP
Senior Network/Security Engineer at Skywind Group

The setup was straightforward. The configuration was easy and understandable, and we relied heavily on built-in objects and groups.

View full review »
Hendrik-Du Plooy - PeerSpot reviewer
Regional Manager at Saber1

I rate Check Point Harmony Mobile's deployment an eight out of ten. 

View full review »
MS
Senior Information Technologist at a energy/utilities company with 1,001-5,000 employees

The initial setup was straightforward and the documentation was excellent. 

View full review »
GS
Manager, Infrastructure Services at a energy/utilities company with 1,001-5,000 employees

It was pretty straightforward. We had a solutions engineer walk us through things and helped us tie into our MDM, which went well.  

View full review »
MK
Founder at Softnetx

I rate the solution's initial setup process a nine out of ten. We take help from its documentation and execute the implementation manually. Although, the documentation needs to include a few crucial steps for onboarding users.

View full review »
Rodrigo Nalda - PeerSpot reviewer
Responsable de Ciberseguridad. CISO at a printing company with 501-1,000 employees

Not having an MDM is somewhat more complex as it cannot automate, and in the iOS environment, it is more complex than in Android.

View full review »
JK
Security Consultant at Synergy

The initial setup was quite easy for me. It was deployed within one day.

View full review »
RA
Security Sales Engineer at BT - British Telecom

The initial setup was very straightforward, not complex at all. For us, it was simply sending out an email link to our users. They installed it from the App Store, and that's it.

View full review »
SD
Information Technology Security Specialist at Telecommunications Services of Trinidad & Tobago Limited (TSTT)

The initial setup is easy, and deployment takes just a couple of minutes.

View full review »
KC
IT Security Analyst at a energy/utilities company with 1,001-5,000 employees

The initial setup is straightforward. It's an easy setup with just a flip of a switch.

We were set up and ready to go very quickly. Because it's a cloud offering and hosted online, it's made to be much quicker.

The deployment was less than a week. We installed it manually on the devices then integrated with an MDM that automates the process for all manual devices.

View full review »
CS
Systems Administrator at a retailer with 201-500 employees

The initial setup was pretty straightforward. Setting up individual networking is a little bit more complex besides depending on how granular your organization uses it, but for us, it was pretty straightforward.

The installation of the solution on end-user mobile devices was not complex. It's straightforward. It's very simple. Our end-users are able to install it themselves, we don't have to really be involved in that process so they're able to do it without help from IT for the most part. That is super helpful to not have to handhold as an IT team all of our users, they can just do it and it works. 

There is no enforcement mechanism that depends on the user if they installed it or not. We don't enforce it in that way, but we do enforce it based upon if they want to have email access. We require them to have it so we validate that it's installed before we install email, but we don't enforce it.

There was definitely concern from end-users about their privacy. Especially with the networking part, the way that it's able to see everywhere they go is a big security and privacy issue. We addressed it by not requiring all our users to have it, but if they want to email, they have to have it and so that's how we ended up getting around it. We had people that ended up using a company phone and a personal phone separately because of it.

The deployment is still in process actually, but that's mostly on our end, not really Check Point's end. We don't have all the policies in place to have that process set forth of how we're doing it so we're still kind of working on that. 

In terms of our implementation strategy, as of right now, we have emails set up on people's devices using a different application. That application is no longer working and so as users want email, we implement it, but we aren't pushing users to have email on their phone. And I think in the future that's going to be the case, but right now it's not because we don't have company policies in place for that.

I'm responsible for the deployment and maintenance and I'm a system administrator.

View full review »
ND
Security officer at a construction company with 11-50 employees

The initial setup is straightforward. 

View full review »
ST
Technology consultant at a tech services company with 501-1,000 employees

The initial setup is very simple & less time-consuming.

View full review »
JK
Business Tranformation Project Manager at a financial services firm with 501-1,000 employees

The deployment took around three months. 

View full review »
it_user1288029 - PeerSpot reviewer
Security Engineer at DGIT

The initial setup is pretty straightforward. It's easy to deploy.

View full review »
SB
Senior Engineer at Spacertron

I would say that the setup was fairly good enough. 

View full review »
it_user967395 - PeerSpot reviewer
In-Charge (IT Support) at a financial services firm with 501-1,000 employees

The initial setup was quite simple.

View full review »
Buyer's Guide
Check Point Harmony Mobile
April 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.