"You can block infected devices from accessing corporate data."
"We have had a lot fewer attacks thanks to this solution."
"The product's initial setup phase is very straightforward."
"We've found that the product is quite stable."
"The ease of use, along with comprehensive protection for all devices, is a key advantage. It provides visibility into malicious applications installed on the phone."
"It doesn't allow you to activate some of the applications until your mobile is malware free. That way we come to know that the device secure and only then do we deploy the business application."
"I would rate the stability a ten out of ten."
"The solution has clients for both Android and Apple devices, so all of our employees' devices are protected."
"The product's initial setup phase is simple."
"We're now able to go after contracts that require a Zero Trust solution and Prisma's other technology solutions."
"Prisma helped us build a moat around our production systems. It's now impossible to log into our production from a non-MDM laptop. Prisma Access provides decent security overall."
"The performance is good."
"It protects all app traffic so that users can gain access to all apps. Unlike other solutions that only work from ports 80 and 443, which are predominantly for web traffic, Prisma Access covers all protocols and works on all traffic patterns... The most sophisticated attacks can arise from sources that are not behind 80/443."
"The scalability of the solution is excellent."
"Its hands-off security and the fact that we don't have to maintain it are the most valuable features."
"It supports auto-scaling for mobile users. It auto-scales depending on the mobile user traffic. For example, if 1,000 people are working from home today, and tomorrow, the number increases to 2,000, it is not going to be an issue."
"The admin portal is slightly clunky and sometimes shows a different status than what the device is actually doing."
"The product does not provide deep capabilities for sharing specific data to users or groups separately, nor does it provide visibility as to whether a user has access to the data or not."
"We know that for many companies, the management and administration of device and data security have been complex."
"We can say that this is a very good solution but Check Point has to reduce the cost."
"It could expand the functionalities to, in addition to security functionality, incorporate Mobile Device Management (MDM) functionalities such as remote device management, administration of installed applications, etc."
"The service provided by Check Point at the technical support level is somewhat slow, and they only provide help in English, which limits some clients."
"At times, when configuring policies, the tool takes some time to apply the policy."
"Compatibility with other Mobile Device Management (MDM) products on the market should be improved, ensuring correct operation between SandBlast Mobile and MDM."
"The one thing that I've been a little bit disappointed with is when we have had to open cases with Palo Alto about Prisma Access issues. Versus their other platforms, like their firewalls, where we tend to get really quick responses and very definitive answers, the few tickets I've had to open for Prisma Access have taken them longer to respond to. And they haven't necessarily given me the kind of answer I was looking for, meaning a fix to the problem."
"Their next release should provide solutions for the mobile environment."
"One thing that would help is if we could get a guide. With Cisco, for example, you can just type the problem regarding your Cisco product and you will easily get your solution. In Palo Alto, however, it's not easy to find the solutions."
"The cloud setup is straightforward, and the onboarding process is much better, but the on-premises initial setup is slightly complex."
"The documentation is generally good, but they could provide a more detailed description of all the configuration steps. I have to search for information or call support. Palo Alto could add more knowledge base articles about configuration with screenshots and walkthroughs. That would be helpful. When configuring a product, you want to see examples of how it is done."
"The tools' scalability is subject to some limitations when done on-premise due to the need for additional licenses. However, in other scenarios, increasing scalability involves expanding infrastructure to accommodate more third-party VPN access. It is scalable as long as you pay the money. Also, it needs to improve security."
"The user interface could be better. They need to work a little bit on the console. It is similar to their firewalls but not exactly. They need to clean it up a bit."
"Palo Alto Prisma 10 came out over a year ago. Palo Alto added this identity management feature. The legacy way Palo Alto selected which user is sitting on an IP address it passes through has been clunky."
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
Check Point Harmony Mobile is ranked 1st in Mobile Threat Defense with 43 reviews while Prisma Access by Palo Alto Networks is ranked 1st in Secure Access Service Edge (SASE) with 55 reviews. Check Point Harmony Mobile is rated 8.8, while Prisma Access by Palo Alto Networks is rated 8.4. The top reviewer of Check Point Harmony Mobile writes "Easy to implement, simple to maintain policies, and does not disrupt end-user functionality". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". Check Point Harmony Mobile is most compared with Check Point Remote Access VPN, Lookout, Fortinet FortiClient, Cisco AnyConnect Secure Mobility Client and Symantec Endpoint Protection Mobile, whereas Prisma Access by Palo Alto Networks is most compared with Zscaler Zero Trust Exchange, Netskope , Cisco Umbrella, Zscaler Internet Access and Prisma SD-WAN.
We monitor all Mobile Threat Defense reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.