Check Point Harmony Mobile Other Advice

JG
Head of Special Projects Unit-RCJA (SANDETEL) at Junta de Andalucia

As it is deployed in a greater number of devices and the maintenance and management tasks associated with the solution escalate, we will be able to make a future updated review.

View full review »
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS

It is a very useful tool for mobile security, thus providing security to the entire company.

View full review »
JJ
Project Manager at Junta de Andalucia

My advice is that before installing, a complete analysis of the requirements should be carried out. This should be done in order to correctly define user groups and the respective policies from the beginning. This will help to avoid individual policies.

View full review »
Buyer's Guide
Check Point Harmony Mobile
April 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.
Prateek Agarwal - PeerSpot reviewer
Manager at a university with 201-500 employees

If someone already uses the web version, Check Point Harmony Mobile will be useful to them due to the compatibility and user information. Everything will easily sync with each other. Overall, I rate the solution an eight out of ten.

View full review »
RA
Founder - Director at a tech services company with 1-10 employees

I give the solution an eight out of ten.

The reason we use this solution is primarily due to its availability in the Indian market. This plays a very important role. We then started reviewing many products based on Gartner's magic quadrants, IDC, and other big analytical companies that provide the reports and enough rationale and justification for our decision-making. We prefer to have a look at Moody's ratings for companies' performance.

We must first look at the different mobile applications consumer use. We check the type of issue/problem explained is covered by comprehensive writeups/reports/bug reports/FAQs/or on some relabel blogs or reviews matching our problem area, then we take sustainable solutions.

I recommend the product, but it has to be fine-tuned and tested by each organization.

View full review »
KP
Network Engineer at LTTS

This is a very good solution for WFX.

In the time that we have been using this product, we can say that there have been no major challenges or issues that we have faced. All of our clients' and employees' feedback is very positive and they are very satisfied with this solution.

They are accessing the company resources seamlessly, and we are also planning to better secure our clients. We are evaluating this feature with remote access, and it is effective.

View full review »
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution

The tool helped prevent potential security threats whenever some users communicate from their mobile with someone outside our company since, at such a time, the product secures the communication as well as the data. With the tool, no confidential data goes outside from the inside of our company. Our company can block data leakage from mobile phones to the outside environment of our organization.

The threat detection and response capabilities of the tool benefit the company in scenarios where a user wants to send out some confidential data outside the company through the browser, which would not be possible If the organization uses Check Point Harmony Mobile. The tool shows how our company can secure the user, as well as how we can prevent data leakage from the inside to the outside of the organization.

The product provides users with ease of management. It is a simple tool that allows users to configure some of the policies for a user or a user-based group and apply them to the solution.

According to Gartner's website, the tool's stability and support as a security provider places it in the leader category.

The tool helps respond to emerging corporate threats, especially those who use corporate applications on their personal devices. If you want to secure your corporate applications, you have to adopt Check Point Harmony Mobile.

If you use corporate applications on your personal mobile device and you want to secure your applications and data, then you have to use Check Point Harmony Mobile.

I rate the tool a nine out of ten.

View full review »
Jessica Muñoz - PeerSpot reviewer
Account Manager at a tech vendor with 11-50 employees

I need to check with the clients in the industry who use Check Point Harmony Mobile and integrate it with other mobile management solutions. I simply managed the product and used it to protect and ensure that scanning processes were in progress while also checking the branch office security, reviewing CVEs, checking the implementation and interventions with the tool. The product offers ease of blocking. The solution also offers integration with Samsung, Microsoft, BlackBerry, and other solutions. The solution can be used for mobile protection and to protect applications.

The product is user-friendly for its customers. The solution also offers complete protection and simple management. The tool provides its users with the capacity to prevent malicious activities and phishing threats while also checking the mobile for malware or any other attacks on the device.

The solution is easy to deploy and to check for attacks in mobile devices.

The product's ability to adapt and offer security against the evolving threat landscape is good because it is easy for a user since there is only one application that they need to use.

I rate the overall tool an eight out of ten.

View full review »
IE
Cyber Security Consultant at Wirespeed

It's a very good mobile security solution for protecting phones. It works seamlessly with mobile devices and has good detection capabilities without interrupting your daily phone use. It gives you a lot of visibility into security aspects, including rating every application. 

On the cloud portal, you can see a security rating for every application on the phone and get low-level details of what that application has access to on your phone. Overall, it's a very good solution.

Overall, I would rate the solution a ten out of ten. 

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

It is a good tool that can be implemented in the organization and be sure that it will protect your mobile devices.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

Harmony is not only great security for devices, it is a great analytics network that protects us from various attacks and that you can try with a simple and easy-to-configure agent on mobile devices.

View full review »
LW
IT Security Manager at Telecommunications Services of Trinidad & Tobago Limited (TSTT)

I rate Check Point Harmony eight out of 10.

My advice for enterprises thinking about Harmony is to consider your device type. If your users are predominantly on Android, it's a good solution. If it's primarily iOS users, you might need to deploy an MDM before buying it. An MDM that covers both operating systems is a significant factor to consider. It will determine how easy it is to deploy it and how much control you have over the profiles.

View full review »
reviewer1523535 - PeerSpot reviewer
IP LAN and Integrity Specialist at Chevron

In summary, this is a very good solution that works as expected, although it is very expensive.

View full review »
BD
Senior Manager at a financial services firm with 10,001+ employees

The organization should be clear on the requirements. If it is only for publishing a few web apps, URLs, email, or for a few shared drives, then the solution works absolutely fine. However, it is not a full-fledged MDM solution like VMware AirWatch/Citrix/Blackberry and more.

These solutions all provide more MDM capabilities than Capsule.

View full review »
Adam Coulibaly - PeerSpot reviewer
Suporta engineer at Novasys

I would recommend this solution to others. It is easy to implement, and it is easy to manage. It covers OS protection, network protection, file protection, and application protection. It provides the best protection.

I would rate it a nine out of ten.

View full review »
LW
IT Security Manager at Telecommunications Services of Trinidad & Tobago Limited (TSTT)

If you have the opportunity, explore competitors to see how their products work. Also, negotiate your price with Check Point as much as possible.

The things that stand out from my experience are the ease of the deployment and the education of the end-user regarding data privacy and those types of things.

We haven't had many cases of false positives. One that we saw was in the following scenario. Let's say we had an app that came up as a threat and we applied particular rules to quarantine it. After we applied the rules, it showed up on the handset as if the app no longer existed, whereas Sandblast was saying that it wasn't removing the app. It turns out it really wasn't removing it. It just removed the app from reporting within the rule itself. That was a little bit of a challenge in wrapping our heads around it. We worked with Check Point to iron out that issue. So that was a kind of false positive.

We had to do it a few times in order to understand that the app was not being removed. The solution claimed to be GDPR compliant and that it was not removing any information or apps from the end-user's handset. We had to check to make sure those features were in place.

View full review »
Hendrik-Du Plooy - PeerSpot reviewer
Regional Manager at Saber1

I rate the overall solution an eight out of ten. 

View full review »
GS
Manager, Infrastructure Services at a energy/utilities company with 1,001-5,000 employees

Harmony Protect is a great solution and really stands up to threat protection and device defense.  

View full review »
MK
Founder at Softnetx

I advise others to deploy the solution for advanced automation features. I rate it a nine out of ten.

View full review »
Rodrigo Nalda - PeerSpot reviewer
Responsable de Ciberseguridad. CISO at a printing company with 501-1,000 employees

At the moment, we have not detected a specific need for new features within our environment. With the last update, the possibility of analyzing applications developed by us or even requesting an analysis of an application already published in stores was incorporated, which is a great improvement. It is good, for example, to anticipate possible problems with third-party applications, as well as for checking the security status of our applications.

In any case, we trust that in the next versions that Check Point publishes, useful functionalities will appear.

View full review »
JK
Security Consultant at Synergy

Overall, I would rate the solution a seven out of ten just because I think that certain aspects could be improved.

View full review »
RA
Security Sales Engineer at BT - British Telecom

I would rate it a nine of ten because of the ease of installing it. Using it on a daily basis, the administration is quite easy. 

I would advise someone considering SandBlast to have some definite use cases in mind before deploying it. That way you can deploy it very specifically towards what you are going to be using it for.

View full review »
SD
Information Technology Security Specialist at Telecommunications Services of Trinidad & Tobago Limited (TSTT)

Because of its ease of use and the coverage you get for the blurred boundary of mobile devices, Harmony Mobile gives you coverage whether you're using a BYOD, COPE, or COBO framework. I would give Harmony Mobile a rating of nine out of ten.

View full review »
OP
Senior Network/Security Engineer at Skywind Group

The solution is modern and easy to onboard.

View full review »
KC
IT Security Analyst at a energy/utilities company with 1,001-5,000 employees

This solution checks so many of our boxes already, anything new added would just be the icing on the cake.

My advice would be to do your homework. Ensure that this is the right product for you. Request a demo and test it out. 

Don't purchase more licenses than you need because it will become costly.

Before this, I didn't realize that there were so many malicious applications out there in the world. So, it was a bit eye-opening to see some of what your phone can access without you even realizing what you were clicking.

I would rate this solution a nine out of ten.

View full review »
CS
Systems Administrator at a retailer with 201-500 employees

Having Check Point, at least for us, they implemented two different hosted platforms so that we could have different policies for different users, and that was really helpful to us because we did have privacy concerns from a lot of users. We were able to lock down the network on some devices and other devices we didn't monitor the network.

I would rate it a nine out of ten. It's really in-depth for what it does.

View full review »
ND
Security officer at a construction company with 11-50 employees

I would rate the overall solution a ten out of ten.

View full review »
HV
Engineer at Caldoo

We're both a reseller as well as an end-user of the solution. We're partners with Check Point.

The product is in the SaaS environment.

I'd recommend the solution. With cybersecurity on the rise due to COVID, and people working on devices from home, off secure networks, it's important to protect your devices, now more than ever. I'd advise that organizations look at this solution and consider implementing it.

I'd rate the solution nine out of ten.

However, if this solution is right for a company depends on the environment. The capability of the standalone product is very good. 

When there's a supplier who buys Check Point SandBlast Mobile and incorporates it into their larger solution, I will give it a ten out of ten. Then you have a solution that really fits not only your mobile devices but also the security part of your organization. While, right now, it's a great standalone product, there's a lot of possibilities for it when it integrates with a larger security offering.

View full review »
JK
Business Tranformation Project Manager at a financial services firm with 501-1,000 employees

We had initial problems because our requirements were not well defined. You should define your use case. You should also look into other options to see what else there is out there and what they offer. 

I would rate it a seven out of ten. 

View full review »
it_user1288029 - PeerSpot reviewer
Security Engineer at DGIT

We're a distributor of Check Point and Check Point partners. 

We have a good understanding of what kind of security our clients need to stay safe in our country.

We both use it ourselves, so we can demonstrate the solution, and offer it as a solution to our clients. It's easy because it's on mobile so we can show clients on our phone.

I'd advise others to use the solution. It's a modern technology that really combats today's cyber threats on mobile devices.

I'd rate the solution nine out of ten. In terms of usage, it's given me everything I need. In Nigeria, we don't have many solutions that do what Check Point does.

View full review »
SB
Senior Engineer at Spacertron

I would rate it an eight out of ten. Not a perfect ten because of the pricing and web interface. 

In the next release, I would like for there to be better integration with other products. 

View full review »
it_user967395 - PeerSpot reviewer
In-Charge (IT Support) at a financial services firm with 501-1,000 employees

This is a must-go solution if you want mobile device security. 

I would rate this solution an eight out of ten.

View full review »
Buyer's Guide
Check Point Harmony Mobile
April 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.