We performed a comparison between Check Point Harmony Mobile and Ivanti Connect Secure based on real PeerSpot user reviews.
Find out what your peers are saying about Check Point Software Technologies, Lookout, Zimperium and others in Mobile Threat Defense."It monitors all the URLs that a user goes to on their phone and so we can see what they're looking at and we can limit that. Certain topics are not allowed to be accessed. They're monitoring their apps and they rate them based upon how big of a security risk that individual app is based on their ratings. And so we're able to limit those as well and allow people to have some that may be a low risk, but still a risk, but we may allow that for our users whereas we block medium and high risk."
"We have applied MFA so that no one can bypass this security and the users/employees can access their resources very easily, securely, and seamlessly."
"Internal applications, data, and folders are published on enrolled mobile devices in a secure way without publishing any of the resources over the internet."
"I really like the application scanning feature that scans all of the installed applications, and not only what appears in the add or remove apps, and then reports the results in the console."
"I would rate the stability a ten out of ten."
"With Harmony Mobile, we have been able to provide additional security to our network."
"You can block infected devices from accessing corporate data."
"The Check Point SandBlast Mobile solution supports Android and iOS operating systems and allows for integration with Mobile Device Management (MDM)."
"I can safely say this is one of the best solutions I have seen for VPN access. It can achieve what other vendors may not be able to. This product will train you about exactly what an SSL should be. You can leverage it to do whatever you wish, the way you wish to do it. This is the solution if you want a perfectly scalable product for your enterprise that can help your mobile users and integrate with the latest technologies."
"I like the host checker, which thoroughly checks the security posture of the machine before allowing access. I also like application-based access and its seamless operations."
"What I like the most about Pulse Connect Secure is that it's user-friendly. It's easy to use. You just need to connect, and that's it."
"The tool's most valuable feature is remote access."
"The solution helps with principal decisions. It also helps with the security and configuration of many technologies."
"VPN tunneling is a very valuable feature of Pulse Connect Secure. I also like that it is straightforward to use, and you can see traffic logs on it."
"The most valuable features of Pulse Connect Secure are multi-factor authentications, and VPNs and SSL VPNs we are using."
"The most valuable feature is being able to securely connect and use virtual desktops."
"One thing that should be improved in the future of the ability to ensure that mobile devices are protected from connections in environments with unlimited connectivity."
"The deployment in the Android system is very simple but in the case of iOS, it is more complicated so the users require attention from our CAU."
"We can say that this is a very good solution but Check Point has to reduce the cost."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"It does the process in the background and it does a wonderful job but the methodologies don't pop up. They should make it more interactive."
"Integration needs improvement. We use Check Point for email. We use Check Point Capsule Workspace and I wish that it tied into that better and was integrated with their email application so that when it's secure, then they're able to access their email and it could be deployed as one group instead of two separate applications. It's a little bit more work for us to deploy both of those so it'd be nice if they could be integrated."
"I would like to see more visibility into the actual devices that it's protecting. In some cases, you don't want to see a lot. However, for our purposes, I would like to see more information about the applications which are installed, then have more control over what can and what cannot be installed."
"The remote configuration has room for improvement."
"The user experience has room for improvement."
"I don't have any downsides to report about the product at this time."
"The solution can be improved by addressing the failure to connect on public 2-step networks."
"Pulse Connect Secure could improve by having better integration with NAC solutions, such as Cisco ClearPass integration with Pulse Connect Secure. Additionally, they need better integration with Microsoft Azure AD and Azure Authenticator."
"Connection-wise, Pulse Connect Secure could be faster, and this is its area for improvement."
"We want to switch to another solution because there are some challenges with the support from Pulse. The quality of documentation is also not good. It is sometimes very hard to find documentation that provides a solution and describes how all this works."
"An area for improvement in Pulse Connect Secure is the concurrent connections, particularly needing a license if you want to use Pulse Connect Secure with your Microsoft or Windows machine."
"The product's price is an area where improvements are required."
Check Point Harmony Mobile is ranked 1st in Mobile Threat Defense with 43 reviews while Ivanti Connect Secure is ranked 3rd in SSL VPN with 25 reviews. Check Point Harmony Mobile is rated 8.8, while Ivanti Connect Secure is rated 7.6. The top reviewer of Check Point Harmony Mobile writes "Easy to implement, simple to maintain policies, and does not disrupt end-user functionality". On the other hand, the top reviewer of Ivanti Connect Secure writes "Beneficial multi-factor authentications, useful SSL VPNs, and simple initial setup". Check Point Harmony Mobile is most compared with Check Point Remote Access VPN, Lookout, Fortinet FortiClient, Cisco AnyConnect Secure Mobility Client and VMware Workspace ONE, whereas Ivanti Connect Secure is most compared with Fortinet FortiClient, OpenVPN Access Server, Ivanti Tunnel, Cisco AnyConnect Secure Mobility Client and Citrix Gateway.
We monitor all Mobile Threat Defense reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.