"With Harmony Mobile, we have been able to provide additional security to our network."
"The easy deployment is the key for us. I can simply send a link through email to a user, then they install the software and are protected."
"I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious."
"Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage."
"The environment is managed and administered centrally in Check Point Infinity which provides a lot of stability with its other features."
"The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly."
"We've found that the product is quite stable."
"You can block infected devices from accessing corporate data."
"It's a good and stable tool, so you should use it if you have a need."
"Jamf Connect is an identity provider, and once you log in, you will have all the device's access."
"The most valuable feature is the synchronization of passwords with a local password, which works well."
"Jamf Connect allows for easy and seamless joining of Mac devices to Azure AD, eliminating the need for third-party involvement or support engineer assistance."
"It's connection with Azure is the most valuable. It is easy to deploy and connect."
"The solution is scalable."
"I would rate the product's scalability an eight out of ten."
"Jamf Connect is a pretty simple and straightforward tool overall."
"I would like to see management and remote administration functions in the same portal."
"At times, when configuring policies, the tool takes some time to apply the policy."
"The feature set between the Android and Apple devices is not fully equal."
"The service provided by Check Point at the technical support level is somewhat slow, and they only provide help in English, which limits some clients."
"We can say that this is a very good solution but Check Point has to reduce the cost."
"The deployment in the Android system is very simple but in the case of iOS, it is more complicated so the users require attention from our CAU."
"The ability to integrate local and cloud technologies to create a hybrid scenario would be an upgrade."
"While it's great, there's always room for improvement. Adding capabilities for automatic deployment in an enterprise environment would be useful."
"The solution needs to improve its licensing."
"The configuration could be faster."
"Jamf Connect is beginning to implement Multi-Factor Authentication for offline authentication, but the setup documentation is insufficient."
"The solution's UI could be more user-friendly for the setup process."
"Overall, there is a lack of consistent experience sometimes with some of their features."
"The logs are an area with a shortcoming."
"We have faced issues with the product's configuration. If we use the tool with other business manager solutions, then there is the issue of naming conventions. The tool needs to be careful with newer updates so that it doesn't break any of the existing configurations."
"The solution’s technical support is bad and should be improved."
Check Point Harmony Mobile is ranked 1st in Mobile Threat Defense with 43 reviews while Jamf Connect is ranked 8th in ZTNA as a Service with 10 reviews. Check Point Harmony Mobile is rated 8.8, while Jamf Connect is rated 9.4. The top reviewer of Check Point Harmony Mobile writes "Easy to implement, simple to maintain policies, and does not disrupt end-user functionality". On the other hand, the top reviewer of Jamf Connect writes "Enhances user convenience by streamlining login processes". Check Point Harmony Mobile is most compared with Check Point Remote Access VPN, Lookout, Fortinet FortiClient, Cisco AnyConnect Secure Mobility Client and VMware Workspace ONE, whereas Jamf Connect is most compared with Zscaler Zero Trust Exchange, VMware Workspace ONE, Prisma Access by Palo Alto Networks, Netskope Private Access and Microsoft Intune.
We monitor all Mobile Threat Defense reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.