Try our new research platform with insights from 80,000+ expert users
Director Comercial at Alta Sistemas
Reseller
Top 20
May 14, 2024
Has super efficient VPN and good ransomware protection
Pros and Cons
  • "The product's VPN solution is super efficient, and our clients highly value ransomware protection on mobile. These two features are probably the most valuable aspects of this product. Check Point Harmony Mobile responds very fast to any cybersecurity attack. With that product, your mobile response is super fast."
  • "Some areas that could be improved with Check Point Harmony Mobile include embedding SD-WAN in mobile device products. Our clients are interested in this feature, so it could be a good idea if Check Point Harmony Mobile includes it in the mobile product."

What is our primary use case?

Many clients have the product on their Android and iOS cell phones.

What is most valuable?

The product's VPN solution is super efficient, and our clients highly value ransomware protection on mobile. These two features are probably the most valuable aspects of this product. Check Point Harmony Mobile responds very fast to any cybersecurity attack. With that product, your mobile response is super fast.

It's very intuitive and allows fast deployment on many devices. Recently, the platform has become easier to configure and implement. It's a very good platform and very easy to use.

What needs improvement?

Some areas that could be improved with Check Point Harmony Mobile include embedding SD-WAN in mobile device products. Our clients are interested in this feature, so it could be a good idea if Check Point Harmony Mobile includes it in the mobile product.

For how long have I used the solution?

I have been using the product for 15 years. 

Buyer's Guide
Check Point Harmony Mobile
March 2026
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,933 professionals have used our research since 2012.

What do I think about the stability of the solution?

The solution's stability is very good; I rate it a ten out of ten. 

What do I think about the scalability of the solution?

The product's scalability is good. We may have some problems with some MDMs, such as I don't remember the brand of the MDM. We have also had many problems with delivering or installing the product. But it's easy and fast to implement or set up for our clients.

How are customer service and support?

The solution's support is very good and fast. 

How was the initial setup?

I rate the tool's ease of deployment a nine out of ten. 

What's my experience with pricing, setup cost, and licensing?

Check Point Harmony Mobile's pricing is good. 

What other advice do I have?

I recommended the solution. It's the only mobile product that I sell to our clients, so we trust Check Point Harmony Mobile 100 percent. I rate the overall solution a ten out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Muluken Mekonene - PeerSpot reviewer
Network Engineer at Insa
Real User
Top 5
Sep 16, 2024
Provides user-friendly graphical interface with blocking capabilities and easy integration

How has it helped my organization?

We are following the necessary activities and communicating with the client. Check Point Harmony Mobile offers significant benefits, such as enhancing its security. The client is proud to use Harmony Mobile, which has improved their overall security posture.

What is most valuable?

The user-friendly graphical interface makes it easy to interact with Harmony Mobile. Its simplicity allows for smooth engagement with the platform.

For how long have I used the solution?

I have been using Check Point Harmony Mobile for six or seven months.

What do I think about the stability of the solution?

I rate the solution’s stability a nine out of ten.

What do I think about the scalability of the solution?

It is scalable.

I rate the solution’s scalability an eight out of ten.

How are customer service and support?

Check Point support has been incredible. As soon as we create the tag, we can have an engineer to support us.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

They are choosing Harmony Mobile over other vendors due to its effective blocking capabilities for threats like phishing and malware. Harmony Mobile offers these features at a lower cost than competitors like Palo Alto, Cisco, and Fortinet. Given its competitive pricing and comprehensive features, we encourage other financial institutions to adopt Harmony Mobile for enhanced security.

How was the initial setup?

The integration process is smooth and straightforward, with no difficulties, even on my new tech phone. It also integrates well with third-party systems. The installation is simple, and our professional service team is there to assist with setting up Harmony Mobile

What other advice do I have?

One of our clients has committed to deploying these features. We are working on deploying Check Point Harmony Mobile and preparing a proposal for the bank. Once they accept, we can proceed, which will enhance Harmony Mobile's security features.

Clients are very impressed with Harmony Mobile's threat intelligence capabilities, especially the live, real-time updates. The bank's administrators were particularly amazed by the features of advanced threat intelligence. Harmony Mobile adds numerous security features and simplifies the work for both administrative and security staff.

Due to its significant benefits, we encourage other microfinance and financial institutions to adopt this technology. By deploying Harmony Mobile, they gain enhanced security, reduced workload, and overall efficiency, all at a lower cost than other solutions. The technology is proving to be both valuable and cost-effective for users.

We recommend that financial institutions use Harmony Mobile because it is highly effective in blocking threats like phishing and malware, which are significant concerns in today's market. Financial institutions are major targets for these attacks, so Harmony Mobile's specialized features are precious. We are encouraging them to adopt this solution for enhanced security.

Two engineers are enough for the solution's maintenance.

Overall, I rate the solution a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Mobile
March 2026
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,933 professionals have used our research since 2012.
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS
Real User
Nov 1, 2023
Detailed summaries, good mobile security, and nice reporting
Pros and Cons
  • "With Harmony Mobile, we have been able to provide additional security to our network."
  • "They could make a more beautiful interface."

What is our primary use case?

With this, the company has been able to give many users access to the infrastructure of the company from their mobile phones. Several types of applications are used that must connect to the company network which accesses sensitive information. This has helped a lot to improve efficiency in day-to-day operations and be able to reach more customers. In addition, it has provided us with better administration of all devices and has them organized by security policies depending on the area where each employee works.

How has it helped my organization?

This tool has helped us at various points in our organization. For example, we can have better control over each device that accesses the infrastructure network. We can also reach and process orders, and solutions faster, or be able to consult data in real-time from mobile phones. We can work from anywhere in the country. 

With Harmony Mobile, we have been able to provide additional security to our network. 

In addition, it provides a detailed summary of each of the operations from where they access what they access and this has helped us a lot in the audit that they do so we can provide accurate and concise information.

What is most valuable?

The tool is excellent, however, it has some features that stand out a lot, for example, it has a very intuitive interface. 

The search capacity allows you to find information quickly and concisely. 

It generates reports and precise analysis, quickly in real-time allowing the technology department to focus. 

We can automate many of the tasks. 

It has notifications and reminders that help us be aware of each event or vulnerability that may arise in our organization.

What needs improvement?

The tool is very effective and proactive, I don't have much to say about the improvements it should have. It already has a very intuitive interface. Yet they should improve the order of each of the options a little since it is difficult to get used to the location of each one. They should rearrange each of the options since time is wasted finding each one.

They could make a more beautiful interface.

When an update is going to be done, it should be less heavy and should streamline operations.

For how long have I used the solution?

In the last six years, I have been able to use, buy, and implement this tool for the mobile security of companies that are supporting BYD with their officials.

What do I think about the stability of the solution?

It has very good stability - if it weren't for the updates that sometimes loop.

What do I think about the scalability of the solution?

Scalability is one of the high points that the tool has.

How are customer service and support?

Support is sometimes very slow.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

The company did not have any tools previously.

How was the initial setup?

The first implementation was difficult since the tool has a fairly high learning curve.

What about the implementation team?

The seller helped us do the implementation and part of the configuration. They gave us the training to be able to make the tool Russian.

What was our ROI?

The ROI is slow to appear, however, they will provide security to all the company's information.

What's my experience with pricing, setup cost, and licensing?

The tools are a little expensive, however, it is worth making that investment for the installation and it has a medium learning curve.

Which other solutions did I evaluate?

Some tools were evaluated including:

What other advice do I have?

It is a very useful tool for mobile security, thus providing security to the entire company.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Nurullah Kazar - PeerSpot reviewer
Network Security Group Manager at Cyberwise
Vendor
Oct 25, 2023
Easy to use with a good dashboard and excellent threat protection
Pros and Cons
  • "You can block infected devices from accessing corporate data."
  • "The errors should be more visible to admin users."

What is our primary use case?

After the pandemic, most organizations started working remotely and accessed corporate data from their mobile devices. This increased the risk of breaches from mobile attack surfaces. This product covers all mobile security subjects such as application security, network security, file security, and OS/Device protection. 

You can cover all attack vectors with Harmony Mobile. It is a good add on top of MDM solutions. Harmony Movie can detect jailbreaking and rooting techniques. Also, it can protect you from the latest phishing and zero-day phishing attacks.

How has it helped my organization?

If organizations distribute mobile devices to their employees and care about user privacy and experience, they should definitely consider how they can secure the devices. Harmony Mobile is the answer to all the things I have mentioned so far. 

It helps employees become aware of mobile security risks with detailed real-time notifications. It has given detailed visibility for threats and created awareness for improvements. The dashboard is very easy to use and deployment is quite easy for mobile devices.

What is most valuable?

First of all cloud-based management is easy to use and you never deal with software upgrades. If you want to use another product from Check Point you can still use the same management console. 

This product is difficult to explain if people are not mature enough for mobile security. Sometimes people think if they use MDM solutions they also cover mobile security, however, the fact is not like that. 

Mobile security needs effort from the admins because it is a continuous process. You can block infected devices from accessing corporate data.

What needs improvement?

If you want a customized feature, it is generally rejected or takes too much time to integrate. 

If you face a problem on your console, only R&D from the support team can check the backend of the product. Sometimes this causes delays in solution time. 

The errors should be more visible to admin users. 

If you are responsible for regulations such as keeping your corporate important data in your country, this scenario is also possible with this product but sometimes it creates problems with viewing encrypted data.

For how long have I used the solution?

I have been giving technical support to this product for more than five years. 

What do I think about the stability of the solution?

It should have 100% uptime for the product and is very minimal for false positives. So far it has been a smooth experience.

What do I think about the scalability of the solution?

Scalability is very easy. You can start small and increase after a while. 

How are customer service and support?

Customer service is generally good, however, sometimes if the problem is related to the backend, it can take some time to fix it.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

Check Point Harmony is the first solution we used.

How was the initial setup?

If you are using all products as cloud, implementations are very easy. However, if you want to use on-premise for regulation purposes, the implementation becomes a little complex. You need to install a connector on your environment to encrypt the data in the cloud.

What about the implementation team?

We generally provide installation support for customers. There is no need for a vendor team. 

What was our ROI?

It is always worth it if you do not want to face a breach and lose prestige.

What's my experience with pricing, setup cost, and licensing?

You can start small if you want and then increase the license count. Also, most of the time organization needs to change every year so scalability is important.

Which other solutions did I evaluate?

After trying Check Point Harmony, we did not need to try something else.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer. We are giving post sales support to all Check Point products.
PeerSpot user
PeerSpot user
Business Co-Ordinator at Pentesec
Vendor
Oct 17, 2023
Easy to manage with a nice dashboard and good alerts
Pros and Cons
  • "Management can see all devices on one panel and easily highlight any devices under threat."
  • "I would quite like to be able to block ads on my phone by blocking known inbound ad websites and services."

What is our primary use case?

All staff were told we had to use it on work devices - yet were allowed to use it on our personal devices also if we were interested in doing so. I accepted the offer and since doing so I have been able to depend on it to prevent me from accessing malicious Wi-Fi spots when someone pretending to be the carrier's Wi-Fi on the underground nearly had me connecting. 

It has warned me about and blocked malicious apps, which was more useful when I was on an Android device, however, it still flagged Apple apps for me also - which was a surprise to me as I had assumed these were vetted and controlled by the Apple App Store. 

Ultimately I feel better having this. I know I can be more laid back about connecting and using apps. The odd time it flags something, it isn't obtrusive - it just lets me know why. 

How has it helped my organization?

It has meant that the entire fleet of mobile phones is secure from malicious network connections and that users can freely download apps (within reason) without there being any cause for concern with data loss, malware, theft, and so forth. 

We're able to be an organization that allows users to make the most of their phones, and therefore get more done since everyone can be flexible knowing they're protected. 

Management can see all devices on one panel and easily highlight any devices under threat.

What is most valuable?

The threatening app feature was super useful when I was on Android. There are so many copies on various app stores; it felt like the Wild West for me, and Harmony was able to help me feel comfortable that if I made a mistake, I wasn't going to hand over the keys to the kingdom. 

On the Apple App Store, it also surprised me by showing me apps that were malicious in ways that weren't flagged by Apple. I was able to report these and be more aware. I also like that when I want to use Wi-Fi in places, I can search for the official network; there's always a concern that it might be a spoofed network. Using this, I can quickly get an alert if things seem bad and I won't be able to accept or send data through that network if it isn't safe.

What needs improvement?

I would love to see what other features they can add in the future. I would quite like to be able to block ads on my phone by blocking known inbound ad websites and services. 

I honestly am surprised that they have not simply gone to the mobile phone firms that build these devices, to have the solution installed at source and baked into the OS. It feels like the kind of business proposal that would benefit all parties except the scammers and criminals out there. 

A personal use license for my family would also be a handy thing. If you could go into the app store and buy it, then manage from home, that would be ideal. It seems like you need to have management to be able to do that - which is obstructive. 

For how long have I used the solution?

I have had Harmony installed on my personal phone for around four to five years now and I love it. At first, I didn't think it would be useful, however, it has highlighted and prevented so many threatening situations for me over the years and I feel confident that having it has been a benefit to me. 

What do I think about the stability of the solution?

The app is extremely stable and unobtrusive. It takes up very little space, and I have noticed no battery impediments at all. 

What do I think about the scalability of the solution?

The solution is extremely easily scaled. You mail all members of staff and ask them to scan the hyperlink in the email, the app sets itself up and shows on your management dashboard. If you have 500 phones, and your dashboard says you only have 490 people installed, you can quickly see who hasn't and then remind them. 

How are customer service and support?

The support on this is very simple since the app itself is elegantly simple. It receives regular updates, and your support partner can access the development team to request features or fixes easily. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No, I did not use a different solution. This was the first time I had considered security for my phone.

How was the initial setup?

The initial setup is extremely straightforward. We received an email saying to scan a QR code to install and set up the app. We input the login details provided, and we were done. From the company perspective, they had to log into the management suite, set the rules they wanted to activate, and send the emails. 

It was very brief and fast to set up, and extremely quick to review and ensure compliance was universal. As soon as threats were found they were flagged. Users could not use any malicious apps or networks. The devices are protected immediately. 

What about the implementation team?

The vendor team was our own in-house team and they delivered this extremely swiftly. That said, any team could handle the process, to be honest.

What was our ROI?

It has meant that I have not lost data or had my phone damaged by malicious apps and network connections so I feel that my ROI has easily been worth two to three phones. For the business, it means peace knowing that all members of staff are secure and cannot accidentally break their phones, damage the company's reputation, and lose customer data, which is a huge ROI for such a small cost per user. 

What's my experience with pricing, setup cost, and licensing?

This is a very low-cost solution, however, it is always important to make sure you are talking to an elite partner to get the best pricing, and that you talk through your needs and have them review the features and how they benefit you as if your needs are more or less extensive than first thought you may be able to make an alternative purchase that gets you what you need most. 

Which other solutions did I evaluate?

My employer evaluates all solutions available on the market before deciding which one to use. Outside of the likes of MobileIron, I am not sure. 

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer. I am a real user and my review is based on my own experience and opinions but I do work for a company that resells Check Point products and services. I was required to use this app as part of the company security policy but requested it on my personal device when offered because it seemed like a good choice. I have not regretted that choice and feel it has saved me a lot of potential hassle.
PeerSpot user
reviewer2701569 - PeerSpot reviewer
Enterprise Network Engineer at a outsourcing company with 201-500 employees
Real User
Top 5Leaderboard
Jul 31, 2025
Comprehensive security enhances IT operations and peace of mind
Pros and Cons
  • "Check Point Harmony Mobile has positively impacted my organization by simplifying IT operations, allowing quick check-ins without needing laptops, which provides peace of mind, knowing it's safe."
  • "One area Check Point Harmony Mobile can improve is the cost for the solution itself, which I find a bit expensive, but other than that, most of it should be okay."

What is our primary use case?

My main use case for Check Point Harmony Mobile is to support some of our power users who, even with the security provided by their laptops, need to access their workspace using mobile phones.

The power users, mostly tech administrators, are accessing sensitive company data and web connections through mobile versions of VPN to log into devices and routers, allowing them to quickly check issues without needing laptops.

What is most valuable?

The best features Check Point Harmony Mobile offers us include comprehensive threat prevention, which stands out for our team because we often forget to monitor phone activity, leaving us vulnerable to rogue malware and connections to rogue Wi-Fi networks.

Check Point Harmony Mobile has positively impacted my organization by simplifying IT operations, allowing quick check-ins without needing laptops, which provides peace of mind, knowing it's safe.

While it's more about the convenience, the speed at which support tickets are resolved has improved, marking a noticeable tick in efficiency.

What needs improvement?

One area Check Point Harmony Mobile can improve is the cost for the solution itself, which I find a bit expensive, but other than that, most of it should be okay.

Cost is indeed the main thing I would like to add about the needed improvements.

For how long have I used the solution?

I have been using Check Point Harmony Mobile for one year.

What do I think about the stability of the solution?

Check Point Harmony Mobile is stable.

What do I think about the scalability of the solution?

The scalability of Check Point Harmony Mobile depends on the number of users that you have.

How are customer service and support?

My experience with customer support was smooth when I had to reach out to them.

How would you rate customer service and support?

Which solution did I use previously and why did I switch?

I did not previously use a different solution before Check Point Harmony Mobile.

What was our ROI?

I have seen a return on investment in the form of time saved, as incidents are now easier to check-in on quickly, leading to reduced time spent fixing issues.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for Check Point Harmony Mobile was smooth.

Which other solutions did I evaluate?

I did not evaluate other options before choosing Check Point Harmony Mobile.

What other advice do I have?

My advice for others looking into using Check Point Harmony Mobile is that if you're trying to secure a mobile workforce, this is definitely the solution for you, as Check Point is a trusted cybersecurity entity with feature-rich offerings. I rate Check Point Harmony Mobile 10 out of 10.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Jul 31, 2025
Flag as inappropriate
PeerSpot user
Dave Eversden - PeerSpot reviewer
Managing Director at Forever Group
MSP
Oct 17, 2023
Enhances security and is easy to deploy and configure
Pros and Cons
  • "The solution was easy to deploy and provided a useful security enhancement for mobile devices."
  • "We had some issues with loopback VPN DNS filtering stopping working periodically, however, this is something that we could probably iron out with support."

What is our primary use case?

We used the solution to provide mobile threat defense for mobile devices (predominantly Apple iPhone/iPad). We evaluated numerous solutions from competitors including IBM, Better Mobile, Trend Micro, and others. Check Point is attractive since they are a market-leading firewall vendor and therefore we trust their filtering in terms of web and link protection beyond others who may rely on smaller or third-party feeds. We also found that the breadth of protections including app analysis and WiFi spoofing validation were helpful.

How has it helped my organization?

The solution was easy to deploy and provided a useful security enhancement for mobile devices. It allowed us to extend filtering technologies that we would generally expect to be available within an edge firewall to mobile devices - such as web content filtering and URL protection. With the prevalence of mobile phishing (including SMS phish which circumvents email filters), we felt that this was a useful security layer. Check Point is also a provider that we felt we could trust when adding products to our security stack.

What is most valuable?

The integration with Microsoft Intune scoped to the security group made deployment a breeze. Certainly, once the initial configuration was in place the process was smooth and devices began to appear in the Check Point Harmony portal automatically. Adding web and link protection was considered to be a valuable security enhancement and is a key benefit of using mobile threat defense. The fact that the product can also highlight changes in public IP addresses for known corporate WiFi SSIDs also helps to alert or prevent spoofing of internal WiFi networks.

What needs improvement?

We had some issues with loopback VPN DNS filtering stopping working periodically, however, this is something that we could probably iron out with support. In the end, we ended up disabling this feature and using Umbrella (which we also use). It is of course highly possible that we could have addressed this with their support team but in our scenario, it was easier to disable the functionality and run with a separate product that we already had available. Certainly, everything else worked fine and the alerts were very useful.

For how long have I used the solution?

I first used the solution several years ago.

What do I think about the stability of the solution?

We had no stability issues with the solution save for the periodic VPN loopback internet outages with iOS agents that I'm sure could be resolved with support.

What do I think about the scalability of the solution?

We don't foresee any obvious limits with the scalability of the solution for all but the largest of organizations.

How are customer service and support?

Support engineers were friendly and communicable.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We had previously trialed better mobile but the minimum onboarding/barrier of entry costs were too steep. We are also more familiar with the Check Point brand. We've also used Trend Micro before yet found the feature set for iOS devices to be slim.

How was the initial setup?

The solution has a straightforward setup - especially with Intune integration.

What about the implementation team?

We did an in-house implementation.

What was our ROI?

ROI is impossible to compute.

What's my experience with pricing, setup cost, and licensing?

Setup and recurring costs seemed reasonable and in line with other Check Point products.

Which other solutions did I evaluate?

We did evaluate IBM, Trend Micro, Better Mobile, and others.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
William Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Jun 23, 2025
Easy to use with great URL filtering and protects from unauthorized downloads
Pros and Cons
  • "Harmony Mobile presents many innovative features."
  • "One of the improvements that can be made is that they become compatible with Google MDM."

What is our primary use case?

One of the main reasons why the implementation of Check Point Harmony Mobile was chosen was due to the fact that we needed a tool that had control and monitoring over mobile devices. Harmony Mobile provided us with that functionality. In this way, we were able to close a security gap that was affecting our organization. 

With this solution, users could connect to the organization and access the corporate data and thus comply with a more secure standard. 

Each mobile has applied policies through the Harmony Mobile panel and control the access

How has it helped my organization?

One of the great improvements that Harmony Mobile gave us is that it was possible to protect the mobile devices of each one of the users and thus not depend on the users to implement adequate security themselves. With a simple mistake or moment of carelessness, a user can accidentally cause great damage to sensitive company information.

With Harmony Mobile, users do not worry. It transmits all the security to this tool. Currently, with what has been happening in the world with Covid, many workers are working from home and with this solution, we can limit third-party access to devices.

It's important for it to have the main functions of Mobile Device Management (MDM), such as task automation, automatic application updates, they should also improve compatibility with other mobile device management (MDM) products on the market, ensuring correct operation between SandBlast Mobile and MDM. It's important for Point Harmony Mobile to be included in a broader offering so that it is not just a standalone product.

What is most valuable?

Harmony Mobile introduces many innovative features. One of them is URL filtering, which is very valuable in this tool. It offers to filter apps, protect privacy, and reject malicious or unauthorized downloads. It allows us to get an idea of how it protects the application through certain security levels that are threats, network applications and devices. Its administration and configuration is very simple. It is easy to use with its friendly interface, the solutions helped a lot to the security of the company.

What needs improvement?

Harmony Mobile is one of the first tools that we implemented in the organization when we entered into the protection of mobile devices. For many years all our staff did not have any restrictions on mobile devices. 

An improvement would be the compatibility of linking local and cloud solutions to create a hybrid scenario. They should allow adding a SIEM for additional functions. That said, in relation to the characteristics that it currently presents, it satisfactorily complies with the security of mobile devices.

One of the improvements that can be made is that they become compatible with Google MDM. 

When it comes to scanning the network, sometimes my SSI ID does not appear; it would also be a great plus if they could make a unified console where you can manage several Check Point products and thus not be opening different consoles to manage different products.

For how long have I used the solution?

I have been using about three years..

What do I think about the stability of the solution?

The stability of the product is very good and it generates an excellent amount of monitoring reports.

What do I think about the scalability of the solution?

It is a very scalable tool.

How are customer service and support?

With the support, we have had good and bad experiences. Sometimes they take time to respond. Sometimes they give an accurate solution to the error presented.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

A mobile device solution had not previously been implemented.

How was the initial setup?

One of the parts that worried us was its configuration and administration, however, it was extremely simple.

What about the implementation team?

The installation was done with a seller who demonstrated his ability and handling of the tool.

What was our ROI?

The investment made with this tool is very good. The information will be guaranteed, therefore, every penny invested is a good investment.

What's my experience with pricing, setup cost, and licensing?

The cost is affordable. It competes with other technologies and the installation is easy to implement.

Which other solutions did I evaluate?

We have not opted for other technologies since we have implemented the Check Point line into our company.

What other advice do I have?

It is a good tool that can be implemented in the organization and be sure that it will protect your mobile devices.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2026
Product Categories
Mobile Threat Defense
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.