Check Point Harmony Mobile Primary Use Case

JG
Head of Special Projects Unit-RCJA (SANDETEL) at Junta de Andalucia

The goal is to implement Harmony Mobile in the entire fleet of devices of the Government of the Junta de Andalucia. We are talking about a total of about 60,000 terminals. A pilot of the solution has started and it will be implemented in all the terminals that are renewed in the corporate network. These devices correspond to different user profiles and include different browsing patterns and profiles and threat exposure from terminals for M2M communication to advanced user terminals with large traffic quotas.

View full review »
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS

With this, the company has been able to give many users access to the infrastructure of the company from their mobile phones. Several types of applications are used that must connect to the company network which accesses sensitive information. This has helped a lot to improve efficiency in day-to-day operations and be able to reach more customers. In addition, it has provided us with better administration of all devices and has them organized by security policies depending on the area where each employee works.

View full review »
Nurullah Kazar - PeerSpot reviewer
Network Security Group Manager at Cyberwise

After the pandemic, most organizations started working remotely and accessed corporate data from their mobile devices. This increased the risk of breaches from mobile attack surfaces. This product covers all mobile security subjects such as application security, network security, file security, and OS/Device protection. 

You can cover all attack vectors with Harmony Mobile. It is a good add on top of MDM solutions. Harmony Movie can detect jailbreaking and rooting techniques. Also, it can protect you from the latest phishing and zero-day phishing attacks.

View full review »
Buyer's Guide
Check Point Harmony Mobile
March 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
rb6k - PeerSpot reviewer
Business Co-Ordinator at Pentesec

All staff were told we had to use it on work devices - yet were allowed to use it on our personal devices also if we were interested in doing so. I accepted the offer and since doing so I have been able to depend on it to prevent me from accessing malicious Wi-Fi spots when someone pretending to be the carrier's Wi-Fi on the underground nearly had me connecting. 

It has warned me about and blocked malicious apps, which was more useful when I was on an Android device, however, it still flagged Apple apps for me also - which was a surprise to me as I had assumed these were vetted and controlled by the Apple App Store. 

Ultimately I feel better having this. I know I can be more laid back about connecting and using apps. The odd time it flags something, it isn't obtrusive - it just lets me know why. 

View full review »
Avesh Kumar - PeerSpot reviewer
Software Tester at a tech services company with 51-200 employees

We require a tool that could control and monitor mobile devices, which was one of the primary factors in our decision to adopt Check Point Harmony Mobile. With this tool, we had that capability. We were able to shut down a security hole that was harming our company. The user can connect to the company and access corporate data via this technology, enabling them to adhere to a more secure standard. With the help of the Harmony Mobile panel, each mobile has implemented policies that govern access. It is used by us to control mobile connections. It is a cloud-based solution that is installed on Check Point's cloud.

View full review »
JJ
Project Manager at Junta de Andalucia

We have implemented Check Point Harmony Mobile due to the numerous phishing attacks that our users were suffering, both by email and by fake text messages, pretending to be the Post Office, Amazon, banks, etc...

With this product, we have tried to avoid this type of attack and therefore have our business environment more secure.

Currently, we have users in various territorial locations and we were looking for a solution that would allow us to secure their mobile devices with a minimum level of intrusiveness in the terminals. The solution should be for both Android and iOS.

View full review »
Prateek Agarwal - PeerSpot reviewer
Manager at Indian Institute of Management Visakhapatnam

We wanted the mobile version because the team was distributed after the pandemic. Many people use the solution through their iPhones and Android-based mobile devices. We have installed and implemented the solution on mobile devices to ensure that all the contacts and messages are kept confidential and nothing compromises the data security.

View full review »
RA
Founder - Director at a tech services company with 1-10 employees

We mainly use this solution to detect unwanted traffic or any applications which is installed from a reliable/unreliable source. However, when we install the solution, it begins to behave differently. This software is intelligent enough to understand the user interface and interact with it, determining whether it is doing good or asking for sensitive personal information. This capability must be present in any mobile security app.

View full review »
LW
IT Security Manager at Telecommunications Services of Trinidad & Tobago Limited (TSTT)

We use Harmony Mobile to protect our workers' mobile devices. There are about 300 users, including everybody from executives to regular engineers. We plan to increase usage, but we are waiting on an executive decision. They'll decide whether to cut costs or increase use. 

View full review »
KP
Network Engineer at LTTS

We are a technology services company and our clients and employees are working from across the world. We have Check Point as a perimeter Firewall device in all our offices and all the devices are with R80.30 with the latest hotfix. 

During this Covid-19 pandemic, we have enabled Check Point Remote access for our employees, so that they can access the office resources from their mobile device, home desktop, or laptop.

Now, they are able to access our resources from their own machine or remote devices and we can say that our employees are doing work from anywhere. 

View full review »
IE
Cyber Security Consultant at Wirespeed

Mobile security, on top of MDM, is the primary use case. Some clients use mobile device management, and we provide additional common security capabilities. This includes vendor locking, where the end solution restricts access to corporate resources based on app management. Check Point does this very well, without issues on mobile devices. There aren't many players in this space, so it's a good, stable solution. You get the results you expect, and it's very quick to set up (around 5 minutes).

View full review »
Dave Eversden - PeerSpot reviewer
Managing Director at Forever Group

We used the solution to provide mobile threat defense for mobile devices (predominantly Apple iPhone/iPad). We evaluated numerous solutions from competitors including IBM, Better Mobile, Trend Micro, and others. Check Point is attractive since they are a market-leading firewall vendor and therefore we trust their filtering in terms of web and link protection beyond others who may rely on smaller or third-party feeds. We also found that the breadth of protections including app analysis and WiFi spoofing validation were helpful.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

One of the main reasons why the implementation of Check Point Harmony Mobile was chosen was due to the fact that we needed a tool that had control and monitoring over mobile devices. Harmony Mobile provided us with that functionality. In this way, we were able to close a security gap that was affecting our organization. 

With this solution, users could connect to the organization and access the corporate data and thus comply with a more secure standard. 

Each mobile has applied policies through the Harmony Mobile panel and control the access

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

Mobile device security is a top concern for our company today - and for good reason. In the new normal, remote workers increasingly access corporate data from their mobile devices, which means the company is more exposed to data breaches than ever before.

This product keeps corporate information safe by protecting employee mobile devices from all areas of attack: applications, networks, and operating systems. Check Point Harmony Mobile has enabled easy-to-manage, scalable security for any mobility management team.

View full review »
reviewer1523535 - PeerSpot reviewer
IP LAN and Integrity Specialist at Chevron

We use SandBlast Mobile, integrated with our MDM for automatic deployment of solutions on our devices. This is for our corporate mobile devices, and also for BYOD (Bring your own device) cases. This works well for the users that want access to our corporate repositories for accessing information.

SandBlast is always monitoring their activity including the applications that are installed or they are trying to install, not allowing apps that are not 100% trusted, receiving logging alerts, etc., to take care of our devices and avoid their comprise. 

View full review »
BD
Senior Manager at a financial services firm with 10,001+ employees

The primary use case is to enable access to any corporate application hosted on-premises or in the cloud using a mobile device with single sign-on (SSO) capabilities.

It provides IT admins capabilities for granting access to corporate applications or data on mobile devices and should be able to securely monitor and manage the mobile devices that access sensitive business data. It includes storing essential information about mobile devices, deciding which apps can be present on the devices, and locating devices.

This product should be able to remove corporate applications and data on enrolled devices remotely, known as an enterprise wipe, in case a device is stolen, lost, or if the user leaves the organization.

Corporate data should be securely stored on mobile devices and the user should not be able to share data from corporate apps/data to personal storage.

View full review »
LW
IT Security Manager at Telecommunications Services of Trinidad & Tobago Limited (TSTT)

One reason we use it is that we didn't really have any control on the mobile side. We do have Google MDM, but we didn't have a solution like the one Check Point offers to protect mobile devices. Even with Google MDM, there is not much we can do without having something that can enforce security on the endpoint. So there was a gap and that security gap was our main use case.

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

This solution is required for one of the internal needs of our organization. We need the product based on our need for the control of access to corporate resources. We were looking for a solution that allows us to generate the management of mobile network devices and something that could secure all systems in the best way possible, thus giving us a solution that allows for general device management. With this product, our organization will be able to monitor and control the devices used by each of our employees in the organization, which gives us an level of adequate security configuration and allows us to comply with internal policies.

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo

We were busy protecting many of the devices used today by managers, sales teams, and those departments that have to be moving very frequently due to all these uncertainties. 

We were busy protecting the content, data, and information that was downloaded and all those objects or information that is shared with different departments to be secured in a simple way on the mobile devices to which access was given. 

For this reason, we have searched for solutions that could allow us to secure the departments' devices that have permissions outside the institution (based on the role or position they have).

View full review »
Adam Coulibaly - PeerSpot reviewer
Suporta engineer at Novasys

We are mainly using it to manage mobile connections. It is a cloud solution, and it is deployed on the Check Point cloud.

View full review »
OP
Senior Network/Security Engineer at Skywind Group

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

The Check Point Mobile Access software blade is one of the numerous blades activated on the NGFWs and serves for providing connectivity to the datacenter for the employees.

View full review »
MS
Senior Information Technologist at a energy/utilities company with 1,001-5,000 employees

The Checkpoint Harmony mobile application is used to protect and eliminate our corporate iPhone users from malicious attempts such as phishing, malware, malicious websites, anti-bots, and harmful applications. Many users receive malicious text messages and emails prompting them for credentials such as corporate active directory details, banking information, or credit card information. It is important to protect our corporate data on all mobile devices by using Check Point's Harmony Mobile Application. 

View full review »
GS
Manager, Infrastructure Services at a energy/utilities company with 1,001-5,000 employees

We were lacking threat detection and device-level protection in our mobile device space.  We are an Apple shop exclusively and although Apple does a good job at vetting apps and developers in the Apple App Store, we were lacking protection beyond that. The Harmony Mobile Protect suite really gave us the confidence of protection and real-time threat level safeguards. Users have the confidence to know that the data on their devices is safe. It's a great solution that has a proven track record in the mobile space.   

View full review »
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees

In the company, our technical support department uses access to the company remotely to provide help or validations required due to their functions.

We required a tool that would provide us with protection for both Mac and Android mobiles outside the perimeter against any type of threat that compromises the company's internal applications. Thanks to this solution, we were able to deploy in internal applications owned by the user without causing any inconvenience.

View full review »
MK
Founder at Softnetx

We use the solution for security purposes. It helps us scan mobile apps for malware prevention.

View full review »
LD
Cloud Support at a tech company with 1-10 employees

They can access the information from anywhere, which had to be covered with security to safeguard the company data, for which we obtained the use of Check Point Harmony Mobile to be able to provide this layer of security in a simple way.

View full review »
Rodrigo Nalda - PeerSpot reviewer
Responsable de Ciberseguridad. CISO at a printing company with 501-1,000 employees

We are deploying the solution on all corporate mobiles. We began the deployment with the most critical users for the business and we are expanding according to our needs. We have an organization differentiated by countries and we monitor the incidents reported from our SIEM.

The main objective is to have a security mechanism in these devices that prevents users from falling into attempts to steal credentials, infection by malware, etc.

With this tool, we consider that the systems are protected and so far, we have already been able to stop a good number of attacks.

View full review »
JK
Security Consultant at Synergy

If you're looking for ways to ensure that your mobile is phishing-free and malware-free, then Harmony Mobile is a good choice.

View full review »
RA
Security Sales Engineer at BT - British Telecom

We use SandBlast to protect our mobile devices, as well as our iPads and Samsung tablets. 

View full review »
SD
Information Technology Security Specialist at Telecommunications Services of Trinidad & Tobago Limited (TSTT)

I use Harmony Mobile integrated with our MDM platform to manage mobile devices.

View full review »
OP
Senior Network/Security Engineer at Skywind Group

Having the Check Point SandBlast Mobile application installed is mandatory for any smartphone or tablet PC provided to the employees by our company, and for any BYOD device if it is going to be connected to the corporate network. Currently, there are about 500 devices that are running on both Android and Apple devices. 

We decided not to self-host the management center, and onboarded the cloud management solution provided by the Check Point. This runs in their own datacenter, with the SLA provided.

View full review »
KC
IT Security Analyst at a energy/utilities company with 1,001-5,000 employees

The primary use case of this solution is for mobile threat prevention. We integrate it with an MDM and push it to our managed devices to protect the company's phone.

View full review »
CS
Systems Administrator at a retailer with 201-500 employees

We use SandBlast Mobile to secure our BYOD devices for employees that want to have access to corporate information, as we require them to have SandBlast in order to do that. It is always monitoring their text messages for malicious stuff or their apps, to see if there's anything malicious, and then we receive the logging and alerts so we are able to react and take care of our users' security.

View full review »
ND
Security officer at a construction company with 11-50 employees

We use it for protecting mobile devices and have a few cases for integrating HEM mobile as it is the gate to some payment applications.

View full review »
ST
Technology consultant at a tech services company with 501-1,000 employees

Our primary use case for using Check Point SandBlast Mobile solution was for securing (Bring your own device) BYOD mobile devices of users. With Check Point SandBlast Mobile we get full visibility of users' mobile activity, like installed apps. Users are only allowed to use permitted applications. We also have blacklisted some malicious URLs. Check Point SandBlast Mobile provides flexibility to BYOD users to access the restricted website as per the time specified by the company policy.

View full review »
HV
Engineer at Caldoo

We primarily use the solution for mobile threat defense. We protect our mobile devices with it, due to the fact that SandBlast Mobile detects phishing, malware, et cetera, and all mobile devices.

View full review »
JK
Business Tranformation Project Manager at a financial services firm with 501-1,000 employees

We use the private cloud deployment model. We use AWS as our cloud provider. Our primary use case is for my users who are mobile. If I want them to connect from wherever they are and build connections to the emails. It's for my management that are usually very mobile.

View full review »
it_user1288029 - PeerSpot reviewer
Security Engineer at DGIT

We primarily use the solution for mobile security, which is important in our part of the world. Using SandBlast Mobile, we're able to prove if a traditional antivirus has become embedded in some devices. It helps us to combat cybercrime. We're able to control things like SMS phishing and check for malicious links and malicious application downloads.

For example, if my son downloads Angry Birds, and we don't know if the version he downloaded was malicious, we can trigger SandBlast to check it.

View full review »
it_user967395 - PeerSpot reviewer
In-Charge (IT Support) at a financial services firm with 501-1,000 employees

My primary use case for this solution is to integrate with mobile device management.

View full review »
Buyer's Guide
Check Point Harmony Mobile
March 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.