Javier Garcia MartinezHead of Special Projects Unit-RCJA (SANDETEL) at Junta de Andalucia
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The usability is the most valuable feature. It's really easy to use. It's a durable solution. I don't have any breaches. It is a good solution from that angle."
"The anti-phishing and scanning of SMS are the most valuable aspects of the solution. Sometimes we will get some SMS and they will try to redirect you to malicious links. If you have SandBlast Mobile, it helps you prevent clicking on those malicious links."
"The most valuable features of this solution are the filtering, interface configuration, and threat management."
"I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious."
"It monitors all the URLs that a user goes to on their phone and so we can see what they're looking at and we can limit that. Certain topics are not allowed to be accessed. They're monitoring their apps and they rate them based upon how big of a security risk that individual app is based on their ratings. And so we're able to limit those as well and allow people to have some that may be a low risk, but still a risk, but we may allow that for our users whereas we block medium and high risk."
"First, the granular visibility of apps & traffic which we get through Check Point SandBlast Mobile are good. We can see each & every installed app & information for each app about severity & risk."
"The most impressive thing is the SSL VPN Portal."
"The solution has clients for both Android and Apple devices, so all of our employees' devices are protected."
"The product is one of the market leaders, according to Gartner, on mobile protection."
"The interface could be more user-friendly. They should improve the look and feel."
"For SandBlast Mobile, the only thing that is lacking is that it wasn't available for all types of users. However, Check Point has since fixed this, with ZoneAlarm."
"In terms of what needs improvement, the web interface should be simplified. It should be more user-friendly. It's too technical."
"In the next release, I would like to see a Wi-Fi scanner to be able to identify whether a wireless network is malicious before you join it."
"Integration needs improvement. We use Check Point for email. We use Check Point Capsule Workspace and I wish that it tied into that better and was integrated with their email application so that when it's secure, then they're able to access their email and it could be deployed as one group instead of two separate applications. It's a little bit more work for us to deploy both of those so it'd be nice if they could be integrated."
"Also, we found configuring device groups & mapping a policy is quite confusing. There should be a simpler interface."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"The feature set between the Android and Apple devices is not fully equal."
"The one thing that I know that they're working on, that's not quite there in the product, is the artificial intelligence aspect."
"Check Point pricing is better than Symantec."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"The cost is huge compared to other products, and it seems this solution is only for companies with a large budget."
"This is a very expensive product."
"The quality, price, and support ratio are very good."
"Regarding the cost of licenses, each device consumes one, even if it has both professional and personal profiles."
"Check Point provides a separate license in cases where organizations want to use this only on mobile devices, or laptops/desktops."
Mobile Security: Robust, Agile & Transparent
In the new normal, while employees are increasingly accessing corporate data from their smartphones, your business is exposed to breaches more than ever.
Harmony Mobile* delivers complete protection for your mobile workforce that is simple to deploy, manage and scale.
Check Point Harmony Mobile is ranked 1st in Mobile Threat Defense with 18 reviews while McAfee MVISION Mobile is ranked 3rd in Mobile Threat Defense with 1 review. Check Point Harmony Mobile is rated 9.0, while McAfee MVISION Mobile is rated 9.0. The top reviewer of Check Point Harmony Mobile writes "Filled a gap in our security posture by protecting mobile handsets and our corporate network". On the other hand, the top reviewer of McAfee MVISION Mobile writes "A market leader that integrates nicely with other McAfee security products and is quite stable". Check Point Harmony Mobile is most compared with Lookout, Zimperium, VMware Workspace ONE, Prisma Access by Palo Alto Networks and IBM MaaS360, whereas McAfee MVISION Mobile is most compared with Lookout, Zimperium, Microsoft BitLocker, Symantec Endpoint Protection Mobile and Trend Micro Mobile Security.
See our list of best Mobile Threat Defense vendors.
We monitor all Mobile Threat Defense reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.