Account Manager at a tech vendor with 11-50 employees
Reseller
Top 5
2024-02-22T15:03:05Z
Feb 22, 2024
I need to check with the clients in the industry who use Check Point Harmony Mobile and integrate it with other mobile management solutions. I simply managed the product and used it to protect and ensure that scanning processes were in progress while also checking the branch office security, reviewing CVEs, checking the implementation and interventions with the tool. The product offers ease of blocking. The solution also offers integration with Samsung, Microsoft, BlackBerry, and other solutions. The solution can be used for mobile protection and to protect applications. The product is user-friendly for its customers. The solution also offers complete protection and simple management. The tool provides its users with the capacity to prevent malicious activities and phishing threats while also checking the mobile for malware or any other attacks on the device. The solution is easy to deploy and to check for attacks in mobile devices. The product's ability to adapt and offer security against the evolving threat landscape is good because it is easy for a user since there is only one application that they need to use. I rate the overall tool an eight out of ten.
If someone already uses the web version, Check Point Harmony Mobile will be useful to them due to the compatibility and user information. Everything will easily sync with each other. Overall, I rate the solution an eight out of ten.
It's a very good mobile security solution for protecting phones. It works seamlessly with mobile devices and has good detection capabilities without interrupting your daily phone use. It gives you a lot of visibility into security aspects, including rating every application. On the cloud portal, you can see a security rating for every application on the phone and get low-level details of what that application has access to on your phone. Overall, it's a very good solution. Overall, I would rate the solution a ten out of ten.
Founder - Director at a tech services company with 1-10 employees
Real User
Top 5
2023-03-09T11:57:00Z
Mar 9, 2023
I give the solution an eight out of ten. The reason we use this solution is primarily due to its availability in the Indian market. This plays a very important role. We then started reviewing many products based on Gartner's magic quadrants, IDC, and other big analytical companies that provide the reports and enough rationale and justification for our decision-making. We prefer to have a look at Moody's ratings for companies' performance. We must first look at the different mobile applications consumer use. We check the type of issue/problem explained is covered by comprehensive writeups/reports/bug reports/FAQs/or on some relabel blogs or reviews matching our problem area, then we take sustainable solutions. I recommend the product, but it has to be fine-tuned and tested by each organization.
I would recommend this solution to others. It is easy to implement, and it is easy to manage. It covers OS protection, network protection, file protection, and application protection. It provides the best protection. I would rate it a nine out of ten.
Information Technology Security Specialist at Telecommunications Services of Trinidad & Tobago Limited (TSTT)
Real User
Top 20
2022-06-01T17:36:37Z
Jun 1, 2022
Because of its ease of use and the coverage you get for the blurred boundary of mobile devices, Harmony Mobile gives you coverage whether you're using a BYOD, COPE, or COBO framework. I would give Harmony Mobile a rating of nine out of ten.
IT Security Manager at Telecommunications Services of Trinidad & Tobago Limited (TSTT)
Real User
2022-04-11T23:07:08Z
Apr 11, 2022
I rate Check Point Harmony eight out of 10. My advice for enterprises thinking about Harmony is to consider your device type. If your users are predominantly on Android, it's a good solution. If it's primarily iOS users, you might need to deploy an MDM before buying it. An MDM that covers both operating systems is a significant factor to consider. It will determine how easy it is to deploy it and how much control you have over the profiles.
Head of Special Projects Unit-RCJA (SANDETEL) at Junta de Andalucia
User
2021-07-27T09:49:00Z
Jul 27, 2021
As it is deployed in a greater number of devices and the maintenance and management tasks associated with the solution escalate, we will be able to make a future updated review.
Senior Manager at a financial services firm with 10,001+ employees
Real User
2021-03-29T14:34:00Z
Mar 29, 2021
The organization should be clear on the requirements. If it is only for publishing a few web apps, URLs, email, or for a few shared drives, then the solution works absolutely fine. However, it is not a full-fledged MDM solution like VMware AirWatch/Citrix/Blackberry and more. These solutions all provide more MDM capabilities than Capsule.
My advice is that before installing, a complete analysis of the requirements should be carried out. This should be done in order to correctly define user groups and the respective policies from the beginning. This will help to avoid individual policies.
We're both a reseller as well as an end-user of the solution. We're partners with Check Point. The product is in the SaaS environment. I'd recommend the solution. With cybersecurity on the rise due to COVID, and people working on devices from home, off secure networks, it's important to protect your devices, now more than ever. I'd advise that organizations look at this solution and consider implementing it. I'd rate the solution nine out of ten. However, if this solution is right for a company depends on the environment. The capability of the standalone product is very good. When there's a supplier who buys Check Point SandBlast Mobile and incorporates it into their larger solution, I will give it a ten out of ten. Then you have a solution that really fits not only your mobile devices but also the security part of your organization. While, right now, it's a great standalone product, there's a lot of possibilities for it when it integrates with a larger security offering.
This is a very good solution for WFX. In the time that we have been using this product, we can say that there have been no major challenges or issues that we have faced. All of our clients' and employees' feedback is very positive and they are very satisfied with this solution. They are accessing the company resources seamlessly, and we are also planning to better secure our clients. We are evaluating this feature with remote access, and it is effective.
IT Security Manager at Telecommunications Services of Trinidad & Tobago Limited (TSTT)
Real User
2020-09-07T05:57:00Z
Sep 7, 2020
If you have the opportunity, explore competitors to see how their products work. Also, negotiate your price with Check Point as much as possible. The things that stand out from my experience are the ease of the deployment and the education of the end-user regarding data privacy and those types of things. We haven't had many cases of false positives. One that we saw was in the following scenario. Let's say we had an app that came up as a threat and we applied particular rules to quarantine it. After we applied the rules, it showed up on the handset as if the app no longer existed, whereas Sandblast was saying that it wasn't removing the app. It turns out it really wasn't removing it. It just removed the app from reporting within the rule itself. That was a little bit of a challenge in wrapping our heads around it. We worked with Check Point to iron out that issue. So that was a kind of false positive. We had to do it a few times in order to understand that the app was not being removed. The solution claimed to be GDPR compliant and that it was not removing any information or apps from the end-user's handset. We had to check to make sure those features were in place.
Systems Administrator at a retailer with 201-500 employees
Real User
2020-08-05T06:59:00Z
Aug 5, 2020
Having Check Point, at least for us, they implemented two different hosted platforms so that we could have different policies for different users, and that was really helpful to us because we did have privacy concerns from a lot of users. We were able to lock down the network on some devices and other devices we didn't monitor the network. I would rate it a nine out of ten. It's really in-depth for what it does.
IT Security Analyst at a energy/utilities company with 1,001-5,000 employees
Real User
2020-07-28T06:50:00Z
Jul 28, 2020
This solution checks so many of our boxes already, anything new added would just be the icing on the cake. My advice would be to do your homework. Ensure that this is the right product for you. Request a demo and test it out. Don't purchase more licenses than you need because it will become costly. Before this, I didn't realize that there were so many malicious applications out there in the world. So, it was a bit eye-opening to see some of what your phone can access without you even realizing what you were clicking. I would rate this solution a nine out of ten.
I would rate it an eight out of ten. Not a perfect ten because of the pricing and web interface. In the next release, I would like for there to be better integration with other products.
We're a distributor of Check Point and Check Point partners. We have a good understanding of what kind of security our clients need to stay safe in our country. We both use it ourselves, so we can demonstrate the solution, and offer it as a solution to our clients. It's easy because it's on mobile so we can show clients on our phone. I'd advise others to use the solution. It's a modern technology that really combats today's cyber threats on mobile devices. I'd rate the solution nine out of ten. In terms of usage, it's given me everything I need. In Nigeria, we don't have many solutions that do what Check Point does.
Business Tranformation Project Manager at a financial services firm with 501-1,000 employees
Real User
2019-09-24T05:43:00Z
Sep 24, 2019
We had initial problems because our requirements were not well defined. You should define your use case. You should also look into other options to see what else there is out there and what they offer. I would rate it a seven out of ten.
Check Point Harmony Mobile is a unified security solution for user devices and access. It is a complete threat defense solution for mobile devices that prevents cyberattacks and enforces security for remote workers and users. It prevents threats on apps, networks, and OS while enhancing the user experience and preventing the disruption of device performance.
Check Point Harmony Mobile Benefits
Some benefits of Harmony Mobile include:
Advanced app analysis that detects known and...
I need to check with the clients in the industry who use Check Point Harmony Mobile and integrate it with other mobile management solutions. I simply managed the product and used it to protect and ensure that scanning processes were in progress while also checking the branch office security, reviewing CVEs, checking the implementation and interventions with the tool. The product offers ease of blocking. The solution also offers integration with Samsung, Microsoft, BlackBerry, and other solutions. The solution can be used for mobile protection and to protect applications. The product is user-friendly for its customers. The solution also offers complete protection and simple management. The tool provides its users with the capacity to prevent malicious activities and phishing threats while also checking the mobile for malware or any other attacks on the device. The solution is easy to deploy and to check for attacks in mobile devices. The product's ability to adapt and offer security against the evolving threat landscape is good because it is easy for a user since there is only one application that they need to use. I rate the overall tool an eight out of ten.
If someone already uses the web version, Check Point Harmony Mobile will be useful to them due to the compatibility and user information. Everything will easily sync with each other. Overall, I rate the solution an eight out of ten.
It's a very good mobile security solution for protecting phones. It works seamlessly with mobile devices and has good detection capabilities without interrupting your daily phone use. It gives you a lot of visibility into security aspects, including rating every application. On the cloud portal, you can see a security rating for every application on the phone and get low-level details of what that application has access to on your phone. Overall, it's a very good solution. Overall, I would rate the solution a ten out of ten.
It is a very useful tool for mobile security, thus providing security to the entire company.
I would rate the overall solution a ten out of ten.
Overall, I would rate the solution a seven out of ten just because I think that certain aspects could be improved.
I advise others to deploy the solution for advanced automation features. I rate it a nine out of ten.
I give the solution an eight out of ten. The reason we use this solution is primarily due to its availability in the Indian market. This plays a very important role. We then started reviewing many products based on Gartner's magic quadrants, IDC, and other big analytical companies that provide the reports and enough rationale and justification for our decision-making. We prefer to have a look at Moody's ratings for companies' performance. We must first look at the different mobile applications consumer use. We check the type of issue/problem explained is covered by comprehensive writeups/reports/bug reports/FAQs/or on some relabel blogs or reviews matching our problem area, then we take sustainable solutions. I recommend the product, but it has to be fine-tuned and tested by each organization.
The solution is an excellent tool that provides secure connections.
I would recommend this solution to others. It is easy to implement, and it is easy to manage. It covers OS protection, network protection, file protection, and application protection. It provides the best protection. I would rate it a nine out of ten.
Because of its ease of use and the coverage you get for the blurred boundary of mobile devices, Harmony Mobile gives you coverage whether you're using a BYOD, COPE, or COBO framework. I would give Harmony Mobile a rating of nine out of ten.
It is a good tool that can be implemented in the organization and be sure that it will protect your mobile devices.
This is a very good option.
I rate Check Point Harmony eight out of 10. My advice for enterprises thinking about Harmony is to consider your device type. If your users are predominantly on Android, it's a good solution. If it's primarily iOS users, you might need to deploy an MDM before buying it. An MDM that covers both operating systems is a significant factor to consider. It will determine how easy it is to deploy it and how much control you have over the profiles.
As it is deployed in a greater number of devices and the maintenance and management tasks associated with the solution escalate, we will be able to make a future updated review.
Harmony Protect is a great solution and really stands up to threat protection and device defense.
The organization should be clear on the requirements. If it is only for publishing a few web apps, URLs, email, or for a few shared drives, then the solution works absolutely fine. However, it is not a full-fledged MDM solution like VMware AirWatch/Citrix/Blackberry and more. These solutions all provide more MDM capabilities than Capsule.
My advice is that before installing, a complete analysis of the requirements should be carried out. This should be done in order to correctly define user groups and the respective policies from the beginning. This will help to avoid individual policies.
In summary, this is a very good solution that works as expected, although it is very expensive.
We're both a reseller as well as an end-user of the solution. We're partners with Check Point. The product is in the SaaS environment. I'd recommend the solution. With cybersecurity on the rise due to COVID, and people working on devices from home, off secure networks, it's important to protect your devices, now more than ever. I'd advise that organizations look at this solution and consider implementing it. I'd rate the solution nine out of ten. However, if this solution is right for a company depends on the environment. The capability of the standalone product is very good. When there's a supplier who buys Check Point SandBlast Mobile and incorporates it into their larger solution, I will give it a ten out of ten. Then you have a solution that really fits not only your mobile devices but also the security part of your organization. While, right now, it's a great standalone product, there's a lot of possibilities for it when it integrates with a larger security offering.
This is a very good solution for WFX. In the time that we have been using this product, we can say that there have been no major challenges or issues that we have faced. All of our clients' and employees' feedback is very positive and they are very satisfied with this solution. They are accessing the company resources seamlessly, and we are also planning to better secure our clients. We are evaluating this feature with remote access, and it is effective.
If you have the opportunity, explore competitors to see how their products work. Also, negotiate your price with Check Point as much as possible. The things that stand out from my experience are the ease of the deployment and the education of the end-user regarding data privacy and those types of things. We haven't had many cases of false positives. One that we saw was in the following scenario. Let's say we had an app that came up as a threat and we applied particular rules to quarantine it. After we applied the rules, it showed up on the handset as if the app no longer existed, whereas Sandblast was saying that it wasn't removing the app. It turns out it really wasn't removing it. It just removed the app from reporting within the rule itself. That was a little bit of a challenge in wrapping our heads around it. We worked with Check Point to iron out that issue. So that was a kind of false positive. We had to do it a few times in order to understand that the app was not being removed. The solution claimed to be GDPR compliant and that it was not removing any information or apps from the end-user's handset. We had to check to make sure those features were in place.
The solution is modern and easy to onboard.
Having Check Point, at least for us, they implemented two different hosted platforms so that we could have different policies for different users, and that was really helpful to us because we did have privacy concerns from a lot of users. We were able to lock down the network on some devices and other devices we didn't monitor the network. I would rate it a nine out of ten. It's really in-depth for what it does.
This solution checks so many of our boxes already, anything new added would just be the icing on the cake. My advice would be to do your homework. Ensure that this is the right product for you. Request a demo and test it out. Don't purchase more licenses than you need because it will become costly. Before this, I didn't realize that there were so many malicious applications out there in the world. So, it was a bit eye-opening to see some of what your phone can access without you even realizing what you were clicking. I would rate this solution a nine out of ten.
I would rate it an eight out of ten. Not a perfect ten because of the pricing and web interface. In the next release, I would like for there to be better integration with other products.
We're a distributor of Check Point and Check Point partners. We have a good understanding of what kind of security our clients need to stay safe in our country. We both use it ourselves, so we can demonstrate the solution, and offer it as a solution to our clients. It's easy because it's on mobile so we can show clients on our phone. I'd advise others to use the solution. It's a modern technology that really combats today's cyber threats on mobile devices. I'd rate the solution nine out of ten. In terms of usage, it's given me everything I need. In Nigeria, we don't have many solutions that do what Check Point does.
We had initial problems because our requirements were not well defined. You should define your use case. You should also look into other options to see what else there is out there and what they offer. I would rate it a seven out of ten.