We are following the necessary activities and communicating with the client. Check Point Harmony Mobile offers significant benefits, such as enhancing its security. The client is proud to use Harmony Mobile, which has improved their overall security posture.
Network Engineer at Insa
Provides user-friendly graphical interface with blocking capabilities and easy integration
How has it helped my organization?
What is most valuable?
The user-friendly graphical interface makes it easy to interact with Harmony Mobile. Its simplicity allows for smooth engagement with the platform.
For how long have I used the solution?
I have been using Check Point Harmony Mobile for six or seven months.
What do I think about the stability of the solution?
I rate the solution’s stability a nine out of ten.
Buyer's Guide
Check Point Harmony Mobile
September 2025

Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
What do I think about the scalability of the solution?
It is scalable.
I rate the solution’s scalability an eight out of ten.
How are customer service and support?
Check Point support has been incredible. As soon as we create the tag, we can have an engineer to support us.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
They are choosing Harmony Mobile over other vendors due to its effective blocking capabilities for threats like phishing and malware. Harmony Mobile offers these features at a lower cost than competitors like Palo Alto, Cisco, and Fortinet. Given its competitive pricing and comprehensive features, we encourage other financial institutions to adopt Harmony Mobile for enhanced security.
How was the initial setup?
The integration process is smooth and straightforward, with no difficulties, even on my new tech phone. It also integrates well with third-party systems. The installation is simple, and our professional service team is there to assist with setting up Harmony Mobile
What other advice do I have?
One of our clients has committed to deploying these features. We are working on deploying Check Point Harmony Mobile and preparing a proposal for the bank. Once they accept, we can proceed, which will enhance Harmony Mobile's security features.
Clients are very impressed with Harmony Mobile's threat intelligence capabilities, especially the live, real-time updates. The bank's administrators were particularly amazed by the features of advanced threat intelligence. Harmony Mobile adds numerous security features and simplifies the work for both administrative and security staff.
Due to its significant benefits, we encourage other microfinance and financial institutions to adopt this technology. By deploying Harmony Mobile, they gain enhanced security, reduced workload, and overall efficiency, all at a lower cost than other solutions. The technology is proving to be both valuable and cost-effective for users.
We recommend that financial institutions use Harmony Mobile because it is highly effective in blocking threats like phishing and malware, which are significant concerns in today's market. Financial institutions are major targets for these attacks, so Harmony Mobile's specialized features are precious. We are encouraging them to adopt this solution for enhanced security.
Two engineers are enough for the solution's maintenance.
Overall, I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer.

Software Tester at a tech services company with 51-200 employees
Works with mobile, protects against vulnerabilities, and offers real-time scanning
Pros and Cons
- "The simple navigation offered by the graphical user interface is excellent."
- "The ability to integrate local and cloud technologies to create a hybrid scenario would be an upgrade."
What is our primary use case?
We require a tool that could control and monitor mobile devices, which was one of the primary factors in our decision to adopt Check Point Harmony Mobile. With this tool, we had that capability. We were able to shut down a security hole that was harming our company. The user can connect to the company and access corporate data via this technology, enabling them to adhere to a more secure standard. With the help of the Harmony Mobile panel, each mobile has implemented policies that govern access. It is used by us to control mobile connections. It is a cloud-based solution that is installed on Check Point's cloud.
How has it helped my organization?
Prior to having this solution, our users were vulnerable to infections of any kind on tablets and mobile devices used for business. We have reduced these dangers by utilizing Harmony Mobile's security, which helps both the user and the administrator. With the help of Check Point Harmony, mobile users also have the same level of protection as the business's computers and laptops do and users are also secure to use on both iOS and Android. Observe Point Mobile devices used by employees are protected from dangerous software and attacks on their network or operating system.
What is most valuable?
Check Point's Sandblast Mobile solution integrates with Mobile Device Management and supports Android and iOS operating systems. Two profiles are created for each mobile device when it is configured. There are two types of profiles - personal and professional - and various security guidelines can be applied to each.
Real-time scanning is only one of the amazing capabilities offered by this tool.
The simple navigation offered by the graphical user interface is excellent.
We value the centralization it brings about.
What needs improvement?
The tool is excellent for security purposes, and it gives a lot of information. That said, there needs to be some improvement in everything related to administration and assistance.
The ability to integrate local and cloud technologies to create a hybrid scenario would be an upgrade.
Making this tool compatible with Google MDM is one of the enhancements that must be made.
The increased load on an outdated terminal, which slows them down, is another item to consider.
It would be preferable if they could incorporate application vulnerability management.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony Mobile
September 2025

Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Regional Manager at Saber1
Offers comprehensive solution for all devices but improvement is needed in user awareness
Pros and Cons
- "The ease of use, along with comprehensive protection for all devices, is a key advantage. It provides visibility into malicious applications installed on the phone."
- "The product needs to improve its user awareness."
What is most valuable?
The ease of use, along with comprehensive protection for all devices, is a key advantage. It provides visibility into malicious applications installed on the phone.
What needs improvement?
The product needs to improve its user awareness.
For how long have I used the solution?
I have been working with the product for 18 months.
What do I think about the scalability of the solution?
I rate Check Point Harmony Mobile a nine out of ten.
How was the initial setup?
I rate Check Point Harmony Mobile's deployment an eight out of ten.
What's my experience with pricing, setup cost, and licensing?
I rate the tool's pricing a three out of ten.
What other advice do I have?
I rate the overall solution an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Founder - Director (Technology Business) at a tech services company with 1-10 employees
Affordable, easy to set up, with some level of DIY capabilities and is stable
Pros and Cons
- "The solution provides us with all the information in the log."
- "The remote configuration has room for improvement."
What is our primary use case?
We mainly use this solution to detect unwanted traffic or any applications which is installed from a reliable/unreliable source. However, when we install the solution, it begins to behave differently. This software is intelligent enough to understand the user interface and interact with it, determining whether it is doing good or asking for sensitive personal information. This capability must be present in any mobile security app.
How has it helped my organization?
It gives enough confidence when we review the logs after appropriately tuning the 'tunable' parameters and then put the device on raw internet traffic and revisit its behavior/events on log files generated. It helps us in graduating our best practices to a 'Leading Practice'. It helped us in conducting critical tests in conducting our job works on Cybersecurity.
What is most valuable?
If we revisit all possible IT compliance whether it is PCI-DSS, HIPAA, GDPR, and more, they all talk about protecting the 'data' and/or leading to privacy. And mobile devices are some of the most vulnerable devices which can be misused in many ways, so protecting the device from malicious traffic is the key when it would be supported with manual configurable controls then it would be the best fit!
What needs improvement?
Documentation may need a revisit, and on additional features: The problem comes when something goes haywire and customers have changed some elements of the mobile which affects the Android software environment. For the same, we looked for remote connectivity for revisiting the consumer's device safely and securely for which we tried a couple of openly available apps (in a controlled environment) which does not look very safe for consumers. Hence, would be interested to see an add-on or an extension software to be a part of 'Check Point Harmony' and can be used for remote monitoring and controlling (keeping all possible security and compliance aspects in mind!)
For how long have I used the solution?
I have been using the solution for several months.
What do I think about the stability of the solution?
We experienced deploying this software on multiple Android devices (having varied firmware versions), however, when it comes to a few old hardware we faced challenges. Rest the product is very stable. (recommend reviewing the release notes, FAQs and recommendations, and more...)
What do I think about the scalability of the solution?
As stated discussed, this is stable software. Given the required storage, recommended memory, and live internet, it would suffice most of the business needs.
How are customer service and support?
When interacting with technical support, we have to be very clear about the issue we (including customers as well) are encountering then the support will provide assistance quickly.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We had a better experience using Zone Alarm (Antivirus and Firewall - desktop release) for a long time, and when we started getting requests on cybersecurity-related issues on mobile devices, we quickly checked Check Point 'Harmony' app. and found a perfect fit as of now.
How was the initial setup?
The initial setup is straightforward (though version to version - device to device it may vary) and the deployment takes no more than ten minutes, but when it comes to 'fine-tuning or customizations' (some specific need/business requirements) it takes time and a series of testing for its fitment.
What about the implementation team?
We did the implementation ourselves and are happy that we are able to protect our own devices (used in business) and for customers. The good part is there are lots of techno-functional documents available on their site which gives enough pragmatic exposers for technologies to understand its near-to-perfect deployment plus your past experience should kick in.
What was our ROI?
Our Revenue is organic and growing. Though unfortunately when we requested for registering our organization, we received our certificate a few days before the COVID lockdown and things have changed fundamentally, then we quickly transformed our operational machinery for remote work and successfully worked for a couple of clients in and around UAE/Saudi reign, which helped us survive and now we have enough requests coming-up for India/locally.
What's my experience with pricing, setup cost, and licensing?
We pay between 300 and 600 Rupees (around seven dollars per month) per year per license, which depends on where you are procuring it, plus a small quantum of our service charges.
What other advice do I have?
I give the solution an eight out of ten.
The reason we use this solution is primarily due to its availability in the Indian market. This plays a very important role. We then started reviewing many products based on Gartner's magic quadrants, IDC, and other big analytical companies that provide the reports and enough rationale and justification for our decision-making. We prefer to have a look at Moody's ratings for companies' performance.
We must first look at the different mobile applications consumer use. We check the type of issue/problem explained is covered by comprehensive writeups/reports/bug reports/FAQs/or on some relabel blogs or reviews matching our problem area, then we take sustainable solutions.
I recommend the product, but it has to be fine-tuned and tested by each organization.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Perimeter Security Administrator at a security firm with 51-200 employees
Provides great data security, access control, and network security
Pros and Cons
- "As a security solution for devices, it can benefit us in many ways, including providing us with data security, access control, network security, and more."
- "One thing that should be improved in the future of the ability to ensure that mobile devices are protected from connections in environments with unlimited connectivity."
What is our primary use case?
This solution is required for one of the internal needs of our organization. We need the product based on our need for the control of access to corporate resources. We were looking for a solution that allows us to generate the management of mobile network devices and something that could secure all systems in the best way possible, thus giving us a solution that allows for general device management. With this product, our organization will be able to monitor and control the devices used by each of our employees in the organization, which gives us an level of adequate security configuration and allows us to comply with internal policies.
How has it helped my organization?
As a security solution for devices, it can benefit us in many ways, including providing us with data security, access control, network security, and more. The kinds of features on offer provide us with confidential access to information, ensuring each of the different devices is protected while improving the productivity of employees. In summary, this solution can help us protect business resources in the best way possible, which can be translated into efficient and profitable security.
What is most valuable?
A very important feature that is outstanding and helps our organization is the ability to protect the business data stored on each device. This is especially important since these devices are used to create information, catalogs, products, customer information, and inventory. Every time they are outside the company, the solution provides us with a secure connection from the devices to the database, thereby keeping data safe. In addition, we can improve the productivity of each of the employees remotely. This benefits to the company in terms of sales or productivity even from different locations.
What needs improvement?
One thing that should be improved in the future of the ability to ensure that mobile devices are protected from connections in environments with unlimited connectivity.
In some cases, devices may be found in areas with little or no signal, which can make it difficult to connect to the network. That makes it difficult to use the solution. We ned to ensue we have something that allows users to work effectively even without a strong network connection. This would allow us to have a solution that adapts to the challenged presented by limited connection environments.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Soporte técnico superior at Acobo
Great for protecting data, securing non-corporate devices, and removing old user permissions
Pros and Cons
- "One of the features that have given us additional value is being able to encrypt and block how data is shared within cell phones or mobile devices."
- "I would like to see management and remote administration functions in the same portal."
What is our primary use case?
We were busy protecting many of the devices used today by managers, sales teams, and those departments that have to be moving very frequently due to all these uncertainties.
We were busy protecting the content, data, and information that was downloaded and all those objects or information that is shared with different departments to be secured in a simple way on the mobile devices to which access was given.
For this reason, we have searched for solutions that could allow us to secure the departments' devices that have permissions outside the institution (based on the role or position they have).
How has it helped my organization?
One of the features that have given us additional value is being able to encrypt and block how data is shared within cell phones or mobile devices. This means that the data that belongs to the corporation will be encrypted and protected in a portion of the phone, with access to interactions against the data further protected within the device. It's a safe way to encapsulate, within a device, security to protect an organization's information.
What is most valuable?
The most valuable feature is being able to encrypt corporate data on devices that are not company devices (like personal cell phones), and being able to manage it remotely. This way, fired users can be removed and eliminated corporate data without affecting the personal data of its other users, thus being an efficient way to safely manage and administer the information that belongs to the corporation.
We can easily secure the information of the company and the user's device so that if we find a vulnerability or some insecurity breach in these cell phones, the solution will indicate that the device is compromised and it will remove the corporate data to ensure the integrity of the data.
What needs improvement?
I would like to see management and remote administration functions in the same portal. I would like us to see it from the same centralized portal and be able to share its rules, its characteristics, and the advantages of cloud computing power. That way, we would have a more central way to manage the computers that belong to or are managed by us. Check Point Harmony Mobile is one of the features that we can see that is easy to install. We would like to have that same flexibility when it comes to managing it on the same platform where we share it with other features of Harmony Endpoint, Harmony Browser, or the NGFWs.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Consultant at ITQS
Easy to use with great URL filtering and protects from unauthorized downloads
Pros and Cons
- "Harmony Mobile presents many innovative features."
- "One of the improvements that can be made is that they become compatible with Google MDM."
What is our primary use case?
One of the main reasons why the implementation of Check Point Harmony Mobile was chosen was due to the fact that we needed a tool that had control and monitoring over mobile devices. Harmony Mobile provided us with that functionality. In this way, we were able to close a security gap that was affecting our organization.
With this solution, users could connect to the organization and access the corporate data and thus comply with a more secure standard.
Each mobile has applied policies through the Harmony Mobile panel and control the access
How has it helped my organization?
One of the great improvements that Harmony Mobile gave us is that it was possible to protect the mobile devices of each one of the users and thus not depend on the users to implement adequate security themselves. With a simple mistake or moment of carelessness, a user can accidentally cause great damage to sensitive company information.
With Harmony Mobile, users do not worry. It transmits all the security to this tool. Currently, with what has been happening in the world with Covid, many workers are working from home and with this solution, we can limit third-party access to devices.
It's important for it to have the main functions of Mobile Device Management (MDM), such as task automation, automatic application updates, they should also improve compatibility with other mobile device management (MDM) products on the market, ensuring correct operation between SandBlast Mobile and MDM. It's important for Point Harmony Mobile to be included in a broader offering so that it is not just a standalone product.
What is most valuable?
Harmony Mobile introduces many innovative features. One of them is URL filtering, which is very valuable in this tool. It offers to filter apps, protect privacy, and reject malicious or unauthorized downloads. It allows us to get an idea of how it protects the application through certain security levels that are threats, network applications and devices. Its administration and configuration is very simple. It is easy to use with its friendly interface, the solutions helped a lot to the security of the company.
What needs improvement?
Harmony Mobile is one of the first tools that we implemented in the organization when we entered into the protection of mobile devices. For many years all our staff did not have any restrictions on mobile devices.
An improvement would be the compatibility of linking local and cloud solutions to create a hybrid scenario. They should allow adding a SIEM for additional functions. That said, in relation to the characteristics that it currently presents, it satisfactorily complies with the security of mobile devices.
One of the improvements that can be made is that they become compatible with Google MDM.
When it comes to scanning the network, sometimes my SSI ID does not appear; it would also be a great plus if they could make a unified console where you can manage several Check Point products and thus not be opening different consoles to manage different products.
For how long have I used the solution?
I have been using about three years..
What do I think about the stability of the solution?
The stability of the product is very good and it generates an excellent amount of monitoring reports.
What do I think about the scalability of the solution?
It is a very scalable tool.
How are customer service and support?
With the support, we have had good and bad experiences. Sometimes they take time to respond. Sometimes they give an accurate solution to the error presented.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
A mobile device solution had not previously been implemented.
How was the initial setup?
One of the parts that worried us was its configuration and administration, however, it was extremely simple.
What about the implementation team?
The installation was done with a seller who demonstrated his ability and handling of the tool.
What was our ROI?
The investment made with this tool is very good. The information will be guaranteed, therefore, every penny invested is a good investment.
What's my experience with pricing, setup cost, and licensing?
The cost is affordable. It competes with other technologies and the installation is easy to implement.
Which other solutions did I evaluate?
We have not opted for other technologies since we have implemented the Check Point line into our company.
What other advice do I have?
It is a good tool that can be implemented in the organization and be sure that it will protect your mobile devices.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Jun 23, 2025
Flag as inappropriateDeveloper at Shavit-security
Reliable platform with efficient mobile device security features
Pros and Cons
- "It has been a reliable solution for our organization, significantly improving our mobile device security without excessive maintenance requirements."
- "The solution's false positive detection could be improved to reduce unnecessary alerts, the app's performance optimized to minimize device impact, and policy management simplified for easier deployment."
What is our primary use case?
Our primary use case for the product is to secure corporate mobile devices, particularly those containing critical information or used by VIPs within our organization.
What is most valuable?
The platform's app scanning feature is valuable as it checks app reliability and identifies potential security risks, which is crucial for maintaining secure mobile environments.
What needs improvement?
The solution's false positive detection could be improved to reduce unnecessary alerts, the app's performance optimized to minimize device impact, and policy management simplified for easier deployment.
For how long have I used the solution?
I have been using Check Point Harmony Mobile for approximately one and a half years.
What do I think about the scalability of the solution?
The platform is scalable for larger organizations, but customization complexities in policy management can make deployment more challenging for extensive device quantity.
Which solution did I use previously and why did I switch?
We used other security solutions previously but switched to Check Point Harmony Mobile due to its comprehensive feature set and reputation for effective mobile security.
How was the initial setup?
The setup was relatively straightforward but could be challenging for less technically inclined users due to policy customization requirements.
What about the implementation team?
We implemented the product with the help of our internal team, leveraging our cybersecurity and mobile device management expertise.
What was our ROI?
The improved security and reduced maintenance overhead contribute to a positive return on investment for our organization.
What's my experience with pricing, setup cost, and licensing?
The product pricing is reasonable for the security it provides.
Which other solutions did I evaluate?
We evaluated several alternatives, including SentinelOne and CrowdStrike, but ultimately chose Harmony Mobile for its robust security features and ease of deployment.
What other advice do I have?
Harmony Mobile has significantly enhanced our mobile device security by effectively scanning apps for reliability, monitoring network connections for threats, and ensuring data protection.
It has been a reliable solution for our organization, significantly improving our mobile device security without excessive maintenance requirements.
I rate it a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Product Categories
Mobile Threat DefensePopular Comparisons
Symantec Endpoint Protection Mobile
McAfee MVISION Mobile
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros
sharing their opinions.