We performed a comparison between Check Point Harmony Mobile and Citrix Gateway based on real PeerSpot user reviews.
Find out what your peers are saying about Check Point Software Technologies, Lookout, Zimperium and others in Mobile Threat Defense."We have applied MFA so that no one can bypass this security and the users/employees can access their resources very easily, securely, and seamlessly."
"The most valuable features of this solution are the filtering, interface configuration, and threat management."
"We like the URL content filtering, that is one of the most valuable features."
"The usability is the most valuable feature. It's really easy to use. It's a durable solution. I don't have any breaches. It is a good solution from that angle."
"Harmony Mobile presents many innovative features."
"We've found that the product is quite stable."
"It also enables us to see where privacy is a concern, apps that are leaking privacy. Having an idea as to how these apps are being protected offers some level of security to the device and back into our corporate network."
"The solution has clients for both Android and Apple devices, so all of our employees' devices are protected."
"The stability of the solution is perfect."
"Most of our customers are using the load balancing feature and also the verification feature is good as well, in my experience."
"It's a stable solution while it's running. We don't have to work on it a lot. There are not many bugs, so it's easy to use if you deploy successfully. You can be sure of an uninterrupted solution for quite a long time. Citrix is a good product."
"The solution is scalable and can go from a very small deployment to handling 10,000 transactions a second."
"The solution is stable."
"Provides good performance and speed."
"The session monitoring capability is good."
"The solution is scalable."
"The only language that is available is English."
"The deployment in the Android system is very simple but in the case of iOS, it is more complicated so the users require attention from our CAU."
"One thing that should be improved in the future of the ability to ensure that mobile devices are protected from connections in environments with unlimited connectivity."
"While it's great, there's always room for improvement. Adding capabilities for automatic deployment in an enterprise environment would be useful."
"There could be more automation features for the solution."
"We know that for many companies, the management and administration of device and data security have been complex."
"The admin portal is slightly clunky and sometimes shows a different status than what the device is actually doing."
"Sometimes, the mobile app crashes and stops responding."
"The initial connection could be faster. That handshake takes a few seconds sometimes. That could be better and improved upon."
"It's extremely complicated and it's not intuitive. The solution requires a lot of training to get going on it."
"Sometimes the input-output has issues."
"If there is an increase in the customer infrastructure, it is not stable."
"The solution can be a bit pricey."
"If the solution had a more advanced DNS, it would be an improvement."
"The load balancing could be improved."
"Lacks access through a mobile device."
Check Point Harmony Mobile is ranked 1st in Mobile Threat Defense with 43 reviews while Citrix Gateway is ranked 1st in Universal Access Gateways with 33 reviews. Check Point Harmony Mobile is rated 8.8, while Citrix Gateway is rated 8.2. The top reviewer of Check Point Harmony Mobile writes "Easy to implement, simple to maintain policies, and does not disrupt end-user functionality". On the other hand, the top reviewer of Citrix Gateway writes "Provided the ability for remote work during the pandemic". Check Point Harmony Mobile is most compared with Check Point Remote Access VPN, Lookout, Fortinet FortiClient, Cisco AnyConnect Secure Mobility Client and VMware Workspace ONE, whereas Citrix Gateway is most compared with F5 BIG-IP Access Policy Manager (APM), Fortinet FortiClient, Prisma Access by Palo Alto Networks, Ivanti Connect Secure and Cisco AnyConnect Secure Mobility Client.
We monitor all Mobile Threat Defense reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.