Check Point Harmony Mobile vs Citrix Gateway comparison

Cancel
You must select at least 2 products to compare!
Check Point Software Technologies Logo
830 views|376 comparisons
100% willing to recommend
Citrix Logo
77 views|61 comparisons
90% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Harmony Mobile and Citrix Gateway based on real PeerSpot user reviews.

Find out what your peers are saying about Check Point Software Technologies, Lookout, Zimperium and others in Mobile Threat Defense.
To learn more, read our detailed Check Point Harmony Mobile vs. Lookout Report (Updated: March 2024).
767,847 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"We have applied MFA so that no one can bypass this security and the users/employees can access their resources very easily, securely, and seamlessly.""The most valuable features of this solution are the filtering, interface configuration, and threat management.""We like the URL content filtering, that is one of the most valuable features.""The usability is the most valuable feature. It's really easy to use. It's a durable solution. I don't have any breaches. It is a good solution from that angle.""Harmony Mobile presents many innovative features.""We've found that the product is quite stable.""It also enables us to see where privacy is a concern, apps that are leaking privacy. Having an idea as to how these apps are being protected offers some level of security to the device and back into our corporate network.""The solution has clients for both Android and Apple devices, so all of our employees' devices are protected."

More Check Point Harmony Mobile Pros →

"The stability of the solution is perfect.""Most of our customers are using the load balancing feature and also the verification feature is good as well, in my experience.""It's a stable solution while it's running. We don't have to work on it a lot. There are not many bugs, so it's easy to use if you deploy successfully. You can be sure of an uninterrupted solution for quite a long time. Citrix is a good product.""The solution is scalable and can go from a very small deployment to handling 10,000 transactions a second.""The solution is stable.""Provides good performance and speed.""The session monitoring capability is good.""The solution is scalable."

More Citrix Gateway Pros →

Cons
"The only language that is available is English.""The deployment in the Android system is very simple but in the case of iOS, it is more complicated so the users require attention from our CAU.""One thing that should be improved in the future of the ability to ensure that mobile devices are protected from connections in environments with unlimited connectivity.""While it's great, there's always room for improvement. Adding capabilities for automatic deployment in an enterprise environment would be useful.""There could be more automation features for the solution.""We know that for many companies, the management and administration of device and data security have been complex.""The admin portal is slightly clunky and sometimes shows a different status than what the device is actually doing.""Sometimes, the mobile app crashes and stops responding."

More Check Point Harmony Mobile Cons →

"The initial connection could be faster. That handshake takes a few seconds sometimes. That could be better and improved upon.""It's extremely complicated and it's not intuitive. The solution requires a lot of training to get going on it.""Sometimes the input-output has issues.""If there is an increase in the customer infrastructure, it is not stable.""The solution can be a bit pricey.""If the solution had a more advanced DNS, it would be an improvement.""The load balancing could be improved.""Lacks access through a mobile device."

More Citrix Gateway Cons →

Pricing and Cost Advice
  • "Pricing is a little high."
  • "We didn't actually purchase the software. It was given to us by Check Point. We are using it as a test bed for possible future customers."
  • "Check Point pricing is better than Symantec."
  • "Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
  • "The cost is huge compared to other products, and it seems this solution is only for companies with a large budget."
  • "This is a very expensive product."
  • "The quality, price, and support ratio are very good."
  • "Regarding the cost of licenses, each device consumes one, even if it has both professional and personal profiles."
  • More Check Point Harmony Mobile Pricing and Cost Advice →

  • "Usually with Citrix the issue is the pricing, especially for the African region. We believe it's really expensive."
  • "Pricing is very high if you do a comparison with what is available in the market."
  • "I believe the pricing is comparable to SaaS"
  • "It costs about 4,000 a year."
  • "The price could be lower."
  • "There is a license to use Citrix Gateway and it is less expensive to use when compared to other solutions."
  • "There are two or three different models, but you can actually have a CapEx where you purchase the unit outright and then there's a yearly maintenance cost on top for years two and three, and four, or you can actually do a subscription purchase through Citrix cloud and you pay on a monthly basis, or you can have a three-year subscription contract as well. I give the solution a six out of ten for its cost."
  • "The solution has a yearly licensing fee."
  • More Citrix Gateway Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Mobile Threat Defense solutions are best for your needs.
    767,847 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:It is very easy for my company to get information from the product's support team.
    Top Answer:When I purchased the product for one of our company's clients, I realized that the price of the product was competitive.
    Top Answer:There are certain shortcomings in the integration capabilities that a product offers. In the future, I would like to see the product offer more integration features.
    Top Answer:We can maintain our systems using the solution.
    Top Answer:Compared to other products, WAF is more costlier than LB, but in Citrix, LB is more expensive than WAF. We have a yearly subscription. You may get a discount if you go for three years. There is an… more »
    Top Answer:The initial setup could be made easier.
    Ranking
    1st
    Views
    830
    Comparisons
    376
    Reviews
    18
    Average Words per Review
    517
    Rating
    8.7
    Views
    77
    Comparisons
    61
    Reviews
    14
    Average Words per Review
    319
    Rating
    7.9
    Comparisons
    Also Known As
    Check Point Mobile Access, Check Point SandBlast Mobile
    Citrix NetScaler Unified Gateway
    Learn More
    Overview

    Check Point Harmony Mobile is a unified security solution for user devices and access. It is a complete threat defense solution for mobile devices that prevents cyberattacks and enforces security for remote workers and users. It prevents threats on apps, networks, and OS while enhancing the user experience and preventing the disruption of device performance. 

    Check Point Harmony Mobile Benefits

    Some benefits of Harmony Mobile include: 

    • Advanced app analysis that detects known and unknown threats
    • Mitigates threats regardless of the mobile management platform or what the user is doing
    • Prevents infected devices to send data to botnets
    • Blocks phishing attacks on social media, email, and messaging

    Harmony Mobile integrates with UEM systems to assess the device’s level of risk. The UEM quarantines and activates security policies, such as blocking access to corporate assets. 

    Check Point Harmony Mobile Key Features

    Harmony Mobile's key features include: 

    • App protection: The platform detects and blocks the download of malicious applications in real-time. It runs the application in a cloud-based environment and tests it by leveraging techniques such as sandboxing, advanced static analysis, anomaly detection, and other techniques. By doing so, it prevents malware from infiltrating employees’ mobile devices. 
    • Network protection: The platform’s unique infrastructure extends Check Point security capabilities to mobile devices. It includes features such as anti-phishing, safe browsing, conditional access, anti bot, and URL filtering. 
    • Simple and easy to use management: Check Point Harmony Mobile integrates with almost all mobile management solutions (MDM/UEM), and supports BYOD programs and remote work settings. It delivers scalability and efficiency with zero-touch deployment. The system works for all Android deployment models. The management console is cloud-based, delivering visibility over the risk posture and enabling admins to roll granular policies. 
    • User friendly: The platform is easy to adopt, with no disruption of the user experience or the device's usability. The system delivers detailed threat notifications in real time as well as weekly reports. The platform doesn’t impact battery life or data consumption. Additionally, it keeps the user and corporate data private without collecting or analyzing personal information. Finally, the platform anonymizes the context metadata from apps and networks it uses for analysis.  

    Check Point Harmony Mobile Components 

    • Behavioral risk engine: The engine uses data received from the app about the network, configuration, and OS data integrity, detects and analyzes suspicious activity, and produces a risk score.
       
    • Mobile gateway: A multi-tenant architecture and mobile devices are registered. The gateway manages the solution communications with connected mobile devices and with the dashboard.
       
    • Management dashboard: The dashboard enables administration, provisioning, and monitoring of devices and policies. It integrates with Unified Endpoint Management.

    • Mobile Protect app: This lightweight app for iOS and Android collects data and analyzes threats to devices. It monitors the operating systems, applications, and network behavior and collects data to detect malicious behavior.

    • ThreatCloud: A database with real-time threat intelligence on indicators of compromise from hundreds of thousands of Check Point gateways and millions of endpoints worldwide.  

    Check Point Harmony Mobile Capabilities

    • Prevents malicious app downloads
    • Prevents phishing on applications
    • Prevents man-in-the-middle attacks
    • Stops infected devices from accessing corporate applications
    • Detects OS exploits

    Reviews from Real Users

    "The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly," says G.S., a Manager of Infrastructure Services at an energy/utilities company.

    Kadeem C., an IT Security Analyst at an energy/utilities company, says, "I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious."

    Oleg P., Senior Network/Security Engineer at Skywind Group, says, "The most impressive thing is the SSL VPN Portal."

    Hans V., an Engineer at Caldoo, adds that “We've found that the product is quite stable."

    Citrix Gateway is a customer-managed solution that can be deployed on premises or on any public cloud, such as AWS, Azure, or Google Cloud Platform. Citrix Gateway provides users with secure access and single sign-on to all the virtual, SaaS and web applications they need to be productive.


    Sample Customers
    Samsung Research America, Mississippi Office of the Secretary of State
    Aeronamic, Avianca, Bechtel Corporation, Betfair UK, Catholic University Leuven (K.U. Leuven), Centene Corporation, Cerner, Charityshare, City of High Point, Clark Builders
    Top Industries
    REVIEWERS
    Financial Services Firm17%
    Comms Service Provider17%
    Security Firm14%
    Energy/Utilities Company11%
    VISITORS READING REVIEWS
    Computer Software Company21%
    Financial Services Firm12%
    Comms Service Provider9%
    Government7%
    REVIEWERS
    Comms Service Provider18%
    Computer Software Company14%
    Financial Services Firm14%
    Real Estate/Law Firm9%
    VISITORS READING REVIEWS
    Educational Organization43%
    Financial Services Firm8%
    Computer Software Company6%
    Healthcare Company5%
    Company Size
    REVIEWERS
    Small Business46%
    Midsize Enterprise21%
    Large Enterprise32%
    VISITORS READING REVIEWS
    Small Business29%
    Midsize Enterprise23%
    Large Enterprise48%
    REVIEWERS
    Small Business38%
    Midsize Enterprise24%
    Large Enterprise38%
    VISITORS READING REVIEWS
    Small Business14%
    Midsize Enterprise50%
    Large Enterprise35%

    Check Point Harmony Mobile is ranked 1st in Mobile Threat Defense with 43 reviews while Citrix Gateway is ranked 1st in Universal Access Gateways with 33 reviews. Check Point Harmony Mobile is rated 8.8, while Citrix Gateway is rated 8.2. The top reviewer of Check Point Harmony Mobile writes "Easy to implement, simple to maintain policies, and does not disrupt end-user functionality". On the other hand, the top reviewer of Citrix Gateway writes "Provided the ability for remote work during the pandemic". Check Point Harmony Mobile is most compared with Check Point Remote Access VPN, Lookout, Fortinet FortiClient, Cisco AnyConnect Secure Mobility Client and VMware Workspace ONE, whereas Citrix Gateway is most compared with F5 BIG-IP Access Policy Manager (APM), Fortinet FortiClient, Prisma Access by Palo Alto Networks, Ivanti Connect Secure and Cisco AnyConnect Secure Mobility Client.

    We monitor all Mobile Threat Defense reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.