2019-09-24T05:43:00Z

What is your primary use case for Check Point Harmony Mobile?

Miriam Tover - PeerSpot reviewer
  • 0
  • 360
PeerSpot user
35

35 Answers

Prateek Agarwal - PeerSpot reviewer
Real User
Top 5Leaderboard
2024-01-24T13:09:23Z
Jan 24, 2024

We wanted the mobile version because the team was distributed after the pandemic. Many people use the solution through their iPhones and Android-based mobile devices. We have installed and implemented the solution on mobile devices to ensure that all the contacts and messages are kept confidential and nothing compromises the data security.

Search for a product comparison
IE
Reseller
Top 5
2023-12-12T11:26:49Z
Dec 12, 2023

Mobile security, on top of MDM, is the primary use case. Some clients use mobile device management, and we provide additional common security capabilities. This includes vendor locking, where the end solution restricts access to corporate resources based on app management. Check Point does this very well, without issues on mobile devices. There aren't many players in this space, so it's a good, stable solution. You get the results you expect, and it's very quick to set up (around 5 minutes).

ND
Real User
Top 20
2023-10-18T16:02:00Z
Oct 18, 2023

We use it for protecting mobile devices and have a few cases for integrating HEM mobile as it is the gate to some payment applications.

Dave Eversden - PeerSpot reviewer
MSP
Top 10
2023-10-11T12:34:00Z
Oct 11, 2023

We used the solution to provide mobile threat defense for mobile devices (predominantly Apple iPhone/iPad). We evaluated numerous solutions from competitors including IBM, Better Mobile, Trend Micro, and others. Check Point is attractive since they are a market-leading firewall vendor and therefore we trust their filtering in terms of web and link protection beyond others who may rely on smaller or third-party feeds. We also found that the breadth of protections including app analysis and WiFi spoofing validation were helpful.

rb6k - PeerSpot reviewer
Vendor
Top 10
2023-10-11T12:25:00Z
Oct 11, 2023

All staff were told we had to use it on work devices - yet were allowed to use it on our personal devices also if we were interested in doing so. I accepted the offer and since doing so I have been able to depend on it to prevent me from accessing malicious Wi-Fi spots when someone pretending to be the carrier's Wi-Fi on the underground nearly had me connecting. It has warned me about and blocked malicious apps, which was more useful when I was on an Android device, however, it still flagged Apple apps for me also - which was a surprise to me as I had assumed these were vetted and controlled by the Apple App Store. Ultimately I feel better having this. I know I can be more laid back about connecting and using apps. The odd time it flags something, it isn't obtrusive - it just lets me know why.

JK
Reseller
Top 5Leaderboard
2023-08-17T10:52:00Z
Aug 17, 2023

If you're looking for ways to ensure that your mobile is phishing-free and malware-free, then Harmony Mobile is a good choice.

Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,386 professionals have used our research since 2012.
MK
Real User
Top 5
2023-06-30T07:17:10Z
Jun 30, 2023

We use the solution for security purposes. It helps us scan mobile apps for malware prevention.

RA
Real User
Top 5
2023-03-09T11:57:00Z
Mar 9, 2023

We mainly use this solution to detect unwanted traffic or any applications which is installed from a reliable/unreliable source. However, when we install the solution, it begins to behave differently. This software is intelligent enough to understand the user interface and interact with it, determining whether it is doing good or asking for sensitive personal information. This capability must be present in any mobile security app.

Avesh Kumar - PeerSpot reviewer
Real User
Top 10
2023-02-21T18:16:00Z
Feb 21, 2023

We require a tool that could control and monitor mobile devices, which was one of the primary factors in our decision to adopt Check Point Harmony Mobile. With this tool, we had that capability. We were able to shut down a security hole that was harming our company. The user can connect to the company and access corporate data via this technology, enabling them to adhere to a more secure standard. With the help of the Harmony Mobile panel, each mobile has implemented policies that govern access. It is used by us to control mobile connections. It is a cloud-based solution that is installed on Check Point's cloud.

Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-02-16T02:14:00Z
Feb 16, 2023

This solution is required for one of the internal needs of our organization. We need the product based on our need for the control of access to corporate resources. We were looking for a solution that allows us to generate the management of mobile network devices and something that could secure all systems in the best way possible, thus giving us a solution that allows for general device management. With this product, our organization will be able to monitor and control the devices used by each of our employees in the organization, which gives us an level of adequate security configuration and allows us to comply with internal policies.

Adrian  ACosta - PeerSpot reviewer
User
Top 5
2023-01-09T14:36:00Z
Jan 9, 2023

We have implemented Check Point Harmony Mobile for a long time in a local environment. Later, we decided to migrate to the Azure cloud and we needed to update the product to be able to integrate it into Azure to be able to enable all the corporate functions of mobile phones from the initial login. Having this tool already in the cloud and integrated into a hybrid cloud, it was possible to have the ability to grant access to corporate applications or data on mobile devices and provide security and confidence to all personnel.

Edwin Solano Salmeron - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-11-04T20:43:00Z
Nov 4, 2022

We were busy protecting many of the devices used today by managers, sales teams, and those departments that have to be moving very frequently due to all these uncertainties. We were busy protecting the content, data, and information that was downloaded and all those objects or information that is shared with different departments to be secured in a simple way on the mobile devices to which access was given. For this reason, we have searched for solutions that could allow us to secure the departments' devices that have permissions outside the institution (based on the role or position they have).

Diana Alvarado - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-09-20T02:43:00Z
Sep 20, 2022

In the company, our technical support department uses access to the company remotely to provide help or validations required due to their functions. We required a tool that would provide us with protection for both Mac and Android mobiles outside the perimeter against any type of threat that compromises the company's internal applications. Thanks to this solution, we were able to deploy in internal applications owned by the user without causing any inconvenience.

LD
User
Top 5Leaderboard
2022-07-27T07:11:00Z
Jul 27, 2022

During this year, many of the users had access to applications and information of the company for which, being mobile devices, they can access the information from anywhere, which had to be covered with security to safeguard the company data, for which we obtained the use of checkpoint harmony mobile to be able to provide this layer of security in a simple way, customers were satisfied with the protection provided, simple policies and monitoring, logs and improvements provided for the security of both the company and the mobiles.

Adam Coulibaly - PeerSpot reviewer
Real User
Top 10
2022-07-18T14:29:18Z
Jul 18, 2022

We are mainly using it to manage mobile connections. It is a cloud solution, and it is deployed on the Check Point cloud.

SD
Real User
Top 20
2022-06-01T17:36:37Z
Jun 1, 2022

I use Harmony Mobile integrated with our MDM platform to manage mobile devices.

Adrian Cambronero - PeerSpot reviewer
Reseller
Top 5Leaderboard
2022-05-26T18:29:00Z
May 26, 2022

One of the main reasons why the implementation of Check Point Harmony Mobile was chosen was due to the fact that we needed a tool that had control and monitoring over mobile devices. Harmony Mobile provided us with that functionality. In this way, we were able to close a security gap that was affecting our organization. With this solution, users could connect to the organization and access the corporate data and thus comply with a more secure standard. Each mobile has applied policies through the Harmony Mobile panel and control the access

DAlvarado - PeerSpot reviewer
User
Top 5
2022-05-17T04:41:00Z
May 17, 2022

We have used Check Point Harmony Mobile for approximately seven months. It helped us a lot with the mobility of the administrator users, their access to the infrastructure, and important company information. We managed to install a small agent on cell phones to provide more than necessary protection against current vulnerabilities without having great repercussions on mobile performance. That was incredible at the time of implementation.

LW
Real User
Top 5
2022-04-11T23:07:08Z
Apr 11, 2022

We use Harmony Mobile to protect our workers' mobile devices. There are about 300 users, including everybody from executives to regular engineers. We plan to increase usage, but we are waiting on an executive decision. They'll decide whether to cut costs or increase use.

JG
User
2021-07-27T09:49:00Z
Jul 27, 2021

The goal is to implement Harmony Mobile in the entire fleet of devices of the Government of the Junta de Andalucia. We are talking about a total of about 60,000 terminals. A pilot of the solution has started and it will be implemented in all the terminals that are renewed in the corporate network. These devices correspond to different user profiles and include different browsing patterns and profiles and threat exposure from terminals for M2M communication to advanced user terminals with large traffic quotas.

MS
User
2021-07-20T20:18:00Z
Jul 20, 2021

The Checkpoint Harmony mobile application is used to protect and eliminate our corporate iPhone users from malicious attempts such as phishing, malware, malicious websites, anti-bots, and harmful applications. Many users receive malicious text messages and emails prompting them for credentials such as corporate active directory details, banking information, or credit card information. It is important to protect our corporate data on all mobile devices by using Check Point's Harmony Mobile Application.

GS
User
2021-07-20T20:07:00Z
Jul 20, 2021

We were lacking threat detection and device-level protection in our mobile device space. We are an Apple shop exclusively and although Apple does a good job at vetting apps and developers in the Apple App Store, we were lacking protection beyond that. The Harmony Mobile Protect suite really gave us the confidence of protection and real-time threat level safeguards. Users have the confidence to know that the data on their devices is safe. It's a great solution that has a proven track record in the mobile space.

BD
Real User
2021-03-29T14:34:00Z
Mar 29, 2021

The primary use case is to enable access to any corporate application hosted on-premises or in the cloud using a mobile device with single sign-on (SSO) capabilities. It provides IT admins capabilities for granting access to corporate applications or data on mobile devices and should be able to securely monitor and manage the mobile devices that access sensitive business data. It includes storing essential information about mobile devices, deciding which apps can be present on the devices, and locating devices. This product should be able to remove corporate applications and data on enrolled devices remotely, known as an enterprise wipe, in case a device is stolen, lost, or if the user leaves the organization. Corporate data should be securely stored on mobile devices and the user should not be able to share data from corporate apps/data to personal storage.

JJ
Real User
2021-03-25T22:44:00Z
Mar 25, 2021

We have implemented Check Point Harmony Mobile due to the numerous phishing attacks that our users were suffering, both by email and by fake text messages, pretending to be the Post Office, Amazon, banks, etc... With this product, we have tried to avoid this type of attack and therefore have our business environment more secure. Currently, we have users in various territorial locations and we were looking for a solution that would allow us to secure their mobile devices with a minimum level of intrusiveness in the terminals. The solution should be for both Android and iOS.

reviewer1523535 - PeerSpot reviewer
Real User
2021-03-02T18:41:00Z
Mar 2, 2021

We use SandBlast Mobile, integrated with our MDM for automatic deployment of solutions on our devices. This is for our corporate mobile devices, and also for BYOD (Bring your own device) cases. This works well for the users that want access to our corporate repositories for accessing information. SandBlast is always monitoring their activity including the applications that are installed or they are trying to install, not allowing apps that are not 100% trusted, receiving logging alerts, etc., to take care of our devices and avoid their comprise.

HV
Real User
2021-01-15T17:21:40Z
Jan 15, 2021

We primarily use the solution for mobile threat defense. We protect our mobile devices with it, due to the fact that SandBlast Mobile detects phishing, malware, et cetera, and all mobile devices.

KP
Real User
2020-12-14T04:33:00Z
Dec 14, 2020

We are a technology services company and our clients and employees are working from across the world. We have Check Point as a perimeter Firewall device in all our offices and all the devices are with R80.30 with the latest hotfix. During this Covid-19 pandemic, we have enabled Check Point Remote access for our employees, so that they can access the office resources from their mobile device, home desktop, or laptop. Now, they are able to access our resources from their own machine or remote devices and we can say that our employees are doing work from anywhere.

LW
Real User
Top 5
2020-09-07T05:57:00Z
Sep 7, 2020

One reason we use it is that we didn't really have any control on the mobile side. We do have Google MDM, but we didn't have a solution like the one Check Point offers to protect mobile devices. Even with Google MDM, there is not much we can do without having something that can enforce security on the endpoint. So there was a gap and that security gap was our main use case.

OP
Real User
2020-08-30T10:23:00Z
Aug 30, 2020

Having the Check Point SandBlast Mobile application installed is mandatory for any smartphone or tablet PC provided to the employees by our company, and for any BYOD device if it is going to be connected to the corporate network. Currently, there are about 500 devices that are running on both Android and Apple devices. We decided not to self-host the management center, and onboarded the cloud management solution provided by the Check Point. This runs in their own datacenter, with the SLA provided.

OP
Real User
2020-08-22T14:38:00Z
Aug 22, 2020

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Check Point Mobile Access software blade is one of the numerous blades activated on the NGFWs and serves for providing connectivity to the datacenter for the employees.

ST
Real User
2020-08-14T10:31:00Z
Aug 14, 2020

Our primary use case for using Check Point SandBlast Mobile solution was for securing (Bring your own device) BYOD mobile devices of users. With Check Point SandBlast Mobile we get full visibility of users' mobile activity, like installed apps. Users are only allowed to use permitted applications. We also have blacklisted some malicious URLs. Check Point SandBlast Mobile provides flexibility to BYOD users to access the restricted website as per the time specified by the company policy.

CS
Real User
2020-08-05T06:59:00Z
Aug 5, 2020

We use SandBlast Mobile to secure our BYOD devices for employees that want to have access to corporate information, as we require them to have SandBlast in order to do that. It is always monitoring their text messages for malicious stuff or their apps, to see if there's anything malicious, and then we receive the logging and alerts so we are able to react and take care of our users' security.

KC
Real User
2020-07-28T06:50:00Z
Jul 28, 2020

The primary use case of this solution is for mobile threat prevention. We integrate it with an MDM and push it to our managed devices to protect the company's phone.

it_user1288029 - PeerSpot reviewer
Reseller
2020-02-18T07:41:15Z
Feb 18, 2020

We primarily use the solution for mobile security, which is important in our part of the world. Using SandBlast Mobile, we're able to prove if a traditional antivirus has become embedded in some devices. It helps us to combat cybercrime. We're able to control things like SMS phishing and check for malicious links and malicious application downloads. For example, if my son downloads Angry Birds, and we don't know if the version he downloaded was malicious, we can trigger SandBlast to check it.

JK
Real User
2019-09-24T05:43:00Z
Sep 24, 2019

We use the private cloud deployment model. We use AWS as our cloud provider. Our primary use case is for my users who are mobile. If I want them to connect from wherever they are and build connections to the emails. It's for my management that are usually very mobile.

Check Point Harmony Mobile is a unified security solution for user devices and access. It is a complete threat defense solution for mobile devices that prevents cyberattacks and enforces security for remote workers and users. It prevents threats on apps, networks, and OS while enhancing the user experience and preventing the disruption of device performance.  Check Point Harmony Mobile Benefits Some benefits of Harmony Mobile include:  Advanced app analysis that detects known and...
Download Check Point Harmony Mobile ReportRead more